Published: April 14, 2009
Author(s)
Ray Perlner, David Cooper
Conference
Name: 8th Symposium on Identity and trust on the Internet (IDtrust '09)
Dates: April 14-16, 2009
Location: Gaithersburg, Maryland, United States
Citation: Proceedings of the 8th Symposium on Identity and trust on the Internet (IDtrust '09), pp. 85-93
Announcement
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper, we provide a survey of some of the public key cryptographic algorithms that have been developed that, while not currently in widespread use, are believed to be resistant to quantum computing based attacks and discuss some of the issues that protocol designers may need to consider if there is a need to deploy these algorithms at some point in the future.
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper, we provide a survey of some of the public key...
See full abstract
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper, we provide a survey of some of the public key cryptographic algorithms that have been developed that, while not currently in widespread use, are believed to be resistant to quantum computing based attacks and discuss some of the issues that protocol designers may need to consider if there is a need to deploy these algorithms at some point in the future.
Hide full abstract
Keywords
public key cryptography; quantum computing
Control Families
None selected