Loading...
Journal Title
Readers/Advisors
Jameson, David H.
Journal Title
Term and Year
Spring 2023
Publication Date
2023
Book Title
Publication Volume
Publication Issue
Publication Begin
Publication End
Number of pages
Collections
Files
Loading...
6435_Phylip_Derival.pdf
Adobe PDF, 1.29 MB
Research Projects
Organizational Units
Journal Issue
Abstract
Post-quantum cryptography is designed to protect classical computers against attacks from quantum computers. This thesis covers the history of encryption and cryptographic systems. It also discusses the impact of quantum computers and Shor’s Algorithm on current encryption systems. The thesis will also discuss the different types of post-quantum cryptography and their weaknesses. The development of quantum computers along with the capabilities of Shor’s algorithm render many of these systems useless, particularly those that rely on the factorization problem and the discrete log problem. Shor’s algorithm in conjunction with the processing power of a quantum computer is easily able to solve the factorization problem and discrete log problems that make these modern encryption systems secure. The National Institute for Standards and Technology has been primarily responsible for coordinating the efforts to develop and standardize new systems that will be resistant to quantum computers. Lastly, the types of post-quantum encryption systems being studied and implemented to protect against quantum computers are described along with an analysis of their strengths and weaknesses. These types are: Lattice Based, Code Based, Hash Based, Multivariate and Isogeny based, with lattice types having the most success in the standardization process.
Citation
DOI
Description
Accessibility Statement
Purchase College - State University of New York (PC) is committed to ensuring that people with disabilities have an opportunity equal to that of their nondisabled peers to participate in the College’s programs, benefits, and services, including those delivered through electronic and information technology. If you encounter an access barrier with a specific item and have a remediation request, please contact lib.ir@purchase.edu.
