Post-Quantum Crypto

Revision as of 20:14, 16 July 2014 by Administrator (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

by Bernd Fix

The security of asymmetric crypto algorithms today like RSA and ECC is based on mathematical operations, that have no computable "reverse function" in classical mathematics. Shor (1994) has shown that both algorithms can be broken by using a quantum computer – and the development in this field has speed up during the last years
commercial systems today work with 500 and more Qbits (although adiabatic and not as an ideal quantum computer). Therefore it is time to focus our attention on post-quantum cryptology that is not compromised by quantum computers. If we don't start today, we will probably not be ready if we really need the new algorithms…