Explore tens of thousands of sets crafted by our community.
Quantum Cryptography
20
Flashcards
0/20
Digital Signature Algorithm (DSA)
Like other public-key algorithms, quantum computers can compromise DSA by solving underlying hard problems quickly.
No-Cloning Theorem
States that it is impossible to create an identical copy of an arbitrary unknown quantum state; fundamental for quantum communication security.
Quantum Superposition
Enables qubits to be in a combination of states; foundation for the power of quantum algorithms.
Quantum Teleportation
Uses entangled qubits to transmit quantum information from one location to another, although it does not allow for faster-than-light communication.
Code-Based Cryptography
Uses the hardness of decoding a general linear code, and is a candidate for secure communication against quantum adversaries.
Quantum Resistant Algorithms
Algorithms designed to run on classical computers but secure against attacks from quantum computers.
Post-Quantum Cryptography
Constructs cryptographic algorithms believed to be secure against an attack by a quantum computer.
Elliptic Curve Cryptography (ECC)
Quantum computing poses a significant threat to ECC, as its security relies on the difficulty of discrete logarithm problems.
Quantum Key Distribution (QKD)
Uses quantum mechanics to securely distribute encryption keys; invulnerable to computation-based eavesdropping.
Shor's Algorithm
Quantum algorithm that can factor large integers and compute discrete logarithms in polynomial time, threatening the security of RSA and ECC.
Grover's Algorithm
Offers a quadratic speed-up for unsorted database search problems, affecting the security of symmetric key algorithms and hash functions.
Quantum Error Correction
Required to protect quantum information against decoherence and operational errors, critical for quantum computing.
Lattice-Based Cryptography
Considered to be resistant to quantum attacks, lattice-based systems are a leading approach in post-quantum cryptography.
RSA (Rivest-Shamir-Adleman)
Quantum computing, particularly Shor’s algorithm, critically endangers RSA by enabling polynomial-time factoring.
Quantum Random Number Generation
Leverages quantum mechanics to generate truly random numbers, crucial for cryptographic applications.
Quantum Entanglement
A physical phenomenon that can be used for quantum communication protocols, such as QKD and teleportation.
BB84 Protocol
A QKD protocol that provides a way to send a private key that is secure against any attack allowed by quantum physics.
Homomorphic Encryption
Quantum-resistant encryption allowing computation on ciphertexts, which may benefit from quantum computation for performance improvements.
Symmetric Cryptography
May require larger key sizes to remain secure in the quantum era due to Grover's algorithm.
Public Key Cryptography
Mostly endangered by quantum algorithms like Shor's, necessitating the transition to post-quantum cryptography.
© Hypatia.Tech. 2024 All rights reserved.