Paradigm Shift from Classical Cryptography to Quantum Cryptography

被引:0
|
作者
Gajbhiye, Samta [1 ]
Karmakar, Sanjeev [2 ]
Sharma, Monisha [3 ]
Sharma, Sanjay [4 ]
机构
[1] SSTC, SSGI, CSE FET, Bhilai, CG, India
[2] BIT, MCA Dept, Durg, CG, India
[3] SSTC, SSGI, ETC FET, Bhilai, CG, India
[4] BIT, Dept Math, Durg, CG, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017) | 2017年
关键词
Classical Algorithms; Symmetric Key Cryptographic Algorithm; Public-Key Cryptographic Algorithm; Post Quantum Cryptography; Quantum Algorithms; Quantum Computers; PUBLIC-KEY CRYPTOSYSTEMS; MERKLE TREE TRAVERSAL; HASH-BASED SIGNATURES; DIGITAL-SIGNATURES; ALGORITHM; SCHEME;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cryptography is the technique of masking the message by means of any encryption method so that intended entity can decrypt the contents. Cryptanalysis is the art of retrieving plain text from cipher text with no prior information about technique or key used for encrypting the message. An intruder can attack in many ways to access the communication channel like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. Thus, the security of any cryptographic schemes lies on the strength of particular hard problem like the integer factorization problem, the discrete logarithm problem in the multiplicative subgroup and on an elliptic curve. Nonetheless, with increased speed and memory of computers and stronger cryptanalytic algorithms, the two problems discrete logarithm problem in the multiplicative subgroup and the integer factorization problem, earlier considered to be strong and hard can be cracked in sub exponential time. Elliptic curve DLP has advantages over the other two: it generates shorter keys and is still an exponentially hard problem for classical and traditional computers. The circumstances will change if stronger attacks are discovered or fast computers are invented. Hence, researchers are predicting, quantum computers could solve Elliptic Curve Discrete Logarithm Problem in polynomial time. Researchers are working in the area to identify hard problems for quantum computers. Thus, the focus of the papers is on various available classical and quantum cryptographic schemes and its hardness with respect to classical and quantum computers respectively.
引用
收藏
页码:548 / 555
页数:8
相关论文
共 50 条
  • [1] Quantum cryptography: a view from classical cryptography
    Buchmann, Johannes
    Braun, Johannes
    Demirel, Denise
    Geihs, Matthias
    QUANTUM SCIENCE AND TECHNOLOGY, 2017, 2 (02):
  • [3] Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
    Subramani, Shalini
    Selvi, M.
    Kannan, A.
    Svn, Santhosh Kumar
    CYBERNETICS AND SYSTEMS, 2025, 56 (03) : 302 - 320
  • [4] Influence of quantum computers on classical cryptography
    Igumnov, Vladislav S.
    Lis, Vadim N.
    EDM 2007: 8TH INTERNATIONAL WORKSHOP AND TUTORIALS ON ELECTRON DEVICES AND MATERIALS, 2007, : 220 - +
  • [5] Quantum versus classical noise cryptography
    Yuen, HP
    QUANTUM COMMUNICATION, COMPUTING, AND MEASUREMENT 2, 2000, : 399 - 404
  • [6] Quantum Cryptography Approaching the Classical Limit
    Weedbrook, Christian
    Pirandola, Stefano
    Lloyd, Seth
    Ralph, Timothy C.
    PHYSICAL REVIEW LETTERS, 2010, 105 (11)
  • [7] A Comparative Study of Classical and Quantum Cryptography
    Sehgal, Shravan Kumar
    Gupta, Rashmi
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 869 - 873
  • [8] Elliptic curve cryptography: The serpentine course of a paradigm shift
    Koblitz, Ann Hibner
    Koblitz, Neal
    Menezes, Alfred
    JOURNAL OF NUMBER THEORY, 2011, 131 (05) : 781 - 814
  • [9] Protecting Information: From Classical Error Correction to Quantum Cryptography
    Verma, Rashmi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (04): : 399 - 399
  • [10] From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography
    Wang B.
    Hu F.
    Zhang H.
    Wang C.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2112 - 2134