Average rating
Cast your vote
You can rate an item by clicking the amount of stars they wish to award to this item.
When enough users have cast their vote on this item, the average rating will also be shown.
Star rating
Your vote was cast
Thank you for your feedback
Thank you for your feedback
Author
Derival, PhylipReaders/Advisors
Jameson, David H.Term and Year
Spring 2023Date Published
2023
Metadata
Show full item recordAbstract
Post-quantum cryptography is designed to protect classical computers against attacks from quantum computers. This thesis covers the history of encryption and cryptographic systems. It also discusses the impact of quantum computers and Shor’s Algorithm on current encryption systems. The thesis will also discuss the different types of post-quantum cryptography and their weaknesses. The development of quantum computers along with the capabilities of Shor’s algorithm render many of these systems useless, particularly those that rely on the factorization problem and the discrete log problem. Shor’s algorithm in conjunction with the processing power of a quantum computer is easily able to solve the factorization problem and discrete log problems that make these modern encryption systems secure. The National Institute for Standards and Technology has been primarily responsible for coordinating the efforts to develop and standardize new systems that will be resistant to quantum computers. Lastly, the types of post-quantum encryption systems being studied and implemented to protect against quantum computers are described along with an analysis of their strengths and weaknesses. These types are: Lattice Based, Code Based, Hash Based, Multivariate and Isogeny based, with lattice types having the most success in the standardization process.Accessibility Statement
Purchase College - State University of New York (PC) is committed to ensuring that people with disabilities have an opportunity equal to that of their nondisabled peers to participate in the College’s programs, benefits, and services, including those delivered through electronic and information technology. If you encounter an access barrier with a specific item and have a remediation request, please contact lib.ir@purchase.edu.Collections