Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The long road ahead to transition to post-quantum cryptography
LaMacchia B. Communications of the ACM65 (1):28-30,2022.Type:Article
Date Reviewed: Jul 14 2022

In this article, the author asserts the following:

(1) Cryptographic algorithms are widely used to maintain the safety and privacy of communications. Many modern technologies, including mobile telephones, would fail if the applied cryptographic algorithm was “broken” by attackers. Private and public keys are often used in a typical cryptographic implementation.
(2) An attacker’s capacity for successful invasion depends upon the availability of fast-enough-to-decipher private keys. The recent advent of quantum computers based on multiple states instead of binary states heralds forthcoming faster computers with the capacity to break current algorithms. This would surely require reworking with regards to cryptographic algorithms and their implementing systems. Given the spread of cryptosystems, it is a mammoth task.
(3) As progress in computer technologies and the development of cryptosystems are independent of each other, the National Institute of Standards and Technology (NIST) has started work on post-quantum cryptography (PQC) system standardization.

The author subsequently identifies several known and unknown issues. As the title suggests, this will certainly be a long march to the end goal.

Reviewer:  Anoop Malaviya Review #: CR147472 (2209-0133)
Bookmark and Share
 
Cryptographic Controls (D.4.6 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
Cryptology: machines, history and methods
Deavours C., Kahn D., Kruh L., Mellen G. (ed), Winkel B. (ed) Artech House, Inc., Norwood, MA,1989. Type: Divisible Book
Jan 1 1992
Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal 30(2): 206-229, 1991. Type: Article
Mar 1 1992
Cryptography for computer security: making the decision
Fisher W. Computers and Security 3(3): 229-233, 1984. Type: Article
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 2004 Reviews.com™
Terms of Use
| Privacy Policy