2017
DOI: 10.15604/ejbm.2017.05.01.002
|View full text |Cite
|
Sign up to set email alerts
|

Some Aspects of Post-Quantum Cryptosystems

Abstract: The article describes alternatives to RSA system, resistant to quantum attacks. There are described Hash-based Digital Signature Schemes and McEliece system, based on the theory of algebraic coding. We analyzed their advantages and disadvantages, and considered some of the attacks on these systems. It is shown that today we are not prepared to transfer cryptosystems to post-quantum era.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Aware of this difficulty, post-quantum cryptosystems that can safely and successfully withstand quantum attacks must be developed and put into use [4,5]. With the development of quantum computing, conventional asymmetric methods like RSA could not be adequate to protect private data.…”
Section: Of 13mentioning
confidence: 99%
“…Aware of this difficulty, post-quantum cryptosystems that can safely and successfully withstand quantum attacks must be developed and put into use [4,5]. With the development of quantum computing, conventional asymmetric methods like RSA could not be adequate to protect private data.…”
Section: Of 13mentioning
confidence: 99%
“…The authors of paper [2] are working on the creation of quantum computers, which can easily solve the problem of factoring large numbers and they are able to crack the crypto RSA system. In [3][4][5], several pseudo random number generators are considered, that use a different methods to ensure the randomness of the sequences and higher level of security.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Where α is a complex number and n is the number of photons. The average number of photons in the state is represented by the amplitude |α| 2 . The weak laser's light is very near to being coherent.…”
Section: Optical Quantum Random Number Generatorsmentioning
confidence: 99%
See 1 more Smart Citation
“…On this basis the RSA destruction will entail easy hacking of most products that can grow into a complete chaos [2].…”
Section: Introductionmentioning
confidence: 99%