Отрывок: Quantum computing challenges this assumption because it offers a new and powerful set of tools under which many of these cryptosystems may collapse. Any data that has been encrypted using many cryptosystems whose security were based on the computational intractability of the so-called “hard problems” of the discrete log and integer factorization is under threat to both eavesdrop and attacks by future...
Название : Date Science: Post Quantum Safe Cryptography
Авторы/Редакторы : Aktayeva, A.
Niyazova, R.
Davletkireeva, L.
Baikenov, A.
Дата публикации : Май-2019
Издательство : Новая техника
Библиографическое описание : Aktayeva A. Date Science: Post Quantum Safe Cryptography / Aktayeva A., Niyazova R., Davletkireeva L., Baikenov A. // Сборник трудов ИТНТ-2019 [Текст]: V междунар. конф. и молодеж. шк. "Информ. технологии и нанотехнологии": 21-24 мая: в 4 т. / Самар. нац.-исслед. ун-т им. С. П. Королева (Самар. ун-т), Ин-т систем. обраб. изобр. РАН-фил. ФНИЦ "Кристаллография и фотоника" РАН; [под ред. В.А. Фурсова]. - Самара: Новая техника, 2019. – Т. 4: Науки о данных. - 2019. - С. 361-371.
Аннотация : New cryptographic techniques have emerged in recent decades that do provide protection against quantum threats. These techniques are termed “postquantum cryptography” and consist of techniques based on quantum properties of light that prevent interception of messages, as well as classic computational techniques, all of which were designed to resist quantum attacks emerging from the rapidly accelerating research field of quantum computation. This paper provides background information on post-quantum security. It explores the security threats against communication security and particularly against key exchange that are enabled by the development of quantum computers. The applied and theoretical aspects of quantum-cryptographic technologies are considered, which is designed to be a reference for those operating in the ICT space in fields other than information security and postquantum cryptography. The interrelated elements that make up the concept and content determined by the application of quantum cryptography are analyzed. The systematic analysis of quantum algorithms, quantum cryptography and quantum hashing are presented. The proper concept vehicle over is brought, in particular the concepts of singularity and supersingularity are determined for elliptic curves and theoretical positions, lyings in their basis, are examined. Terms which must be taken into account at the selection of elliptic curves for cryptographic applications are determined.
URI (Унифицированный идентификатор ресурса) : http://repo.ssau.ru/handle/Informacionnye-tehnologii-i-nanotehnologii/Date-Science-Post-Quantum-Safe-Cryptography-75667
Другие идентификаторы : Dspace\SGAU\20190421\75667
Располагается в коллекциях: Информационные технологии и нанотехнологии

Файлы этого ресурса:
Файл Описание Размер Формат  
paper45.pdfОсновная статья497.15 kBAdobe PDFПросмотреть/Открыть



Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.