The Impact of Quantum Computing on Present Cryptography

Abstract: 

Developments in quantum computing pose threats to current encryption schemes. With the predicted computational power of this technology, cryptographic keys may be broken by exhaustively searching all secret keys. This article reviews current cryptography strategies to include symmetric and asymmetric systems, their vulnerability to quantum computing technologies, and the introduction of new cryptographic schemes. Conventional public key algorithms such as RSA, ECC, and DSA algorithms are evaluated and compared to quantum key distribution methods like the BB84 protocol. With the current pace of technological development, the deployment of quantum algorithms such as Shor’s algorithm and Grover’s algorithm will decrypt conventional public and symmetric key algorithms in the near future. To combat the threat of decryption, cryptographic schemes such as quantum key distribution methods should be introduced to create a system resilient to the abilities of quantum computing.

Author: 

Vasileios Mavroeidis

Year: 

2018

Domain: 

Dimension: 

Region: 

Data Type: