c01

PQC_for_Dummies

IN THIS CHAPTER Cryptography today ................................................................................................................................................ Quantum computers ................................................................................................................................................ Grover’s algorithm ................................................................................................................................................ Shor’s algorithm ................................................................................................................................................ Chapter 1 Quantum Computing Threat Within the last three decades, digital communication has become a fundamental technology for modern society all around the globe. Its applications reach from human-to-human communication in telephony, mobile communication, email, and online chat via human-to-machine communication in Internet Commerce, online banking, telemedicine, and Industry 4.0 to machine-to-machine communication in aviation, automotive technology, and the Internet of things. These applications rely on the security of the communication, for example on its authenticity, privacy, and integrity. These security goals are achieved by the use of cryptography. Cryptography Today The most important cryptographic primitives used today are: ✔ AES for symmetric encryption, ✔ RSA and ECC for public-key encryption, ✔ DSA and ECDSA for signatures, ✔ DHand ECDH for key exchange, and ✔ SHA-1, SHA-2, or SHA-3 for hashing.


PQC_for_Dummies
To see the actual publication please follow the link above