Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Quantum Cryptography

20

Flashcards

0/20

Still learning
StarStarStarStar

Digital Signature Algorithm (DSA)

StarStarStarStar

Like other public-key algorithms, quantum computers can compromise DSA by solving underlying hard problems quickly.

StarStarStarStar

No-Cloning Theorem

StarStarStarStar

States that it is impossible to create an identical copy of an arbitrary unknown quantum state; fundamental for quantum communication security.

StarStarStarStar

Quantum Superposition

StarStarStarStar

Enables qubits to be in a combination of states; foundation for the power of quantum algorithms.

StarStarStarStar

Quantum Teleportation

StarStarStarStar

Uses entangled qubits to transmit quantum information from one location to another, although it does not allow for faster-than-light communication.

StarStarStarStar

Code-Based Cryptography

StarStarStarStar

Uses the hardness of decoding a general linear code, and is a candidate for secure communication against quantum adversaries.

StarStarStarStar

Quantum Resistant Algorithms

StarStarStarStar

Algorithms designed to run on classical computers but secure against attacks from quantum computers.

StarStarStarStar

Post-Quantum Cryptography

StarStarStarStar

Constructs cryptographic algorithms believed to be secure against an attack by a quantum computer.

StarStarStarStar

Elliptic Curve Cryptography (ECC)

StarStarStarStar

Quantum computing poses a significant threat to ECC, as its security relies on the difficulty of discrete logarithm problems.

StarStarStarStar

Quantum Key Distribution (QKD)

StarStarStarStar

Uses quantum mechanics to securely distribute encryption keys; invulnerable to computation-based eavesdropping.

StarStarStarStar

Shor's Algorithm

StarStarStarStar

Quantum algorithm that can factor large integers and compute discrete logarithms in polynomial time, threatening the security of RSA and ECC.

StarStarStarStar

Grover's Algorithm

StarStarStarStar

Offers a quadratic speed-up for unsorted database search problems, affecting the security of symmetric key algorithms and hash functions.

StarStarStarStar

Quantum Error Correction

StarStarStarStar

Required to protect quantum information against decoherence and operational errors, critical for quantum computing.

StarStarStarStar

Lattice-Based Cryptography

StarStarStarStar

Considered to be resistant to quantum attacks, lattice-based systems are a leading approach in post-quantum cryptography.

StarStarStarStar

RSA (Rivest-Shamir-Adleman)

StarStarStarStar

Quantum computing, particularly Shor’s algorithm, critically endangers RSA by enabling polynomial-time factoring.

StarStarStarStar

Quantum Random Number Generation

StarStarStarStar

Leverages quantum mechanics to generate truly random numbers, crucial for cryptographic applications.

StarStarStarStar

Quantum Entanglement

StarStarStarStar

A physical phenomenon that can be used for quantum communication protocols, such as QKD and teleportation.

StarStarStarStar

BB84 Protocol

StarStarStarStar

A QKD protocol that provides a way to send a private key that is secure against any attack allowed by quantum physics.

StarStarStarStar

Homomorphic Encryption

StarStarStarStar

Quantum-resistant encryption allowing computation on ciphertexts, which may benefit from quantum computation for performance improvements.

StarStarStarStar

Symmetric Cryptography

StarStarStarStar

May require larger key sizes to remain secure in the quantum era due to Grover's algorithm.

StarStarStarStar

Public Key Cryptography

StarStarStarStar

Mostly endangered by quantum algorithms like Shor's, necessitating the transition to post-quantum cryptography.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.