• Login
    View Item 
    •   Home
    • University Colleges
    • Purchase College
    • Purchase College Student Projects
    • View Item
    •   Home
    • University Colleges
    • Purchase College
    • Purchase College Student Projects
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of SUNY Open Access RepositoryCommunitiesPublication DateAuthorsTitlesSubjectsDepartmentThis CollectionPublication DateAuthorsTitlesSubjectsDepartmentAuthor ProfilesView

    My Account

    LoginRegister

    Campus Communities in SOAR

    Alfred State CollegeBrockportBroomeCantonDownstateDutchessEmpireFarmingdaleFinger LakesFredoniaHerkimerMaritimeNew PaltzNiagaraOld WestburyOneontaOnondagaOptometryOswegoPlattsburghPurchase CollegePolytechnic InstituteSUNY Office of Workforce Development and Upward MobilitySUNY PressUpstate Medical

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Post Quantum Encryption

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    Name:
    6435_Phylip_Derival.pdf
    Size:
    1.287Mb
    Format:
    PDF
    Download
    Average rating
     
       votes
    Cast your vote
    You can rate an item by clicking the amount of stars they wish to award to this item. When enough users have cast their vote on this item, the average rating will also be shown.
    Star rating
     
    Your vote was cast
    Thank you for your feedback
    Author
    Derival, Phylip
    Keyword
    First Reader David H. Jameson
    Senior Project
    Semester Spring 2023
    Readers/Advisors
    Jameson, David H.
    Term and Year
    Spring 2023
    Date Published
    2023
    
    Metadata
    Show full item record
    URI
    http://hdl.handle.net/20.500.12648/11803
    Abstract
    Post-quantum cryptography is designed to protect classical computers against attacks from quantum computers. This thesis covers the history of encryption and cryptographic systems. It also discusses the impact of quantum computers and Shor’s Algorithm on current encryption systems. The thesis will also discuss the different types of post-quantum cryptography and their weaknesses. The development of quantum computers along with the capabilities of Shor’s algorithm render many of these systems useless, particularly those that rely on the factorization problem and the discrete log problem. Shor’s algorithm in conjunction with the processing power of a quantum computer is easily able to solve the factorization problem and discrete log problems that make these modern encryption systems secure. The National Institute for Standards and Technology has been primarily responsible for coordinating the efforts to develop and standardize new systems that will be resistant to quantum computers. Lastly, the types of post-quantum encryption systems being studied and implemented to protect against quantum computers are described along with an analysis of their strengths and weaknesses. These types are: Lattice Based, Code Based, Hash Based, Multivariate and Isogeny based, with lattice types having the most success in the standardization process.
    Accessibility Statement
    Purchase College - State University of New York (PC) is committed to ensuring that people with disabilities have an opportunity equal to that of their nondisabled peers to participate in the College’s programs, benefits, and services, including those delivered through electronic and information technology. If you encounter an access barrier with a specific item and have a remediation request, please contact lib.ir@purchase.edu.
    Collections
    Purchase College Student Projects

    entitlement

     

    DSpace software (copyright © 2002 - 2025)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.