Explore tens of thousands of sets crafted by our community.
Post-Quantum Cryptography
30
Flashcards
0/30
NTRU Cryptosystem
A lattice-based cryptosystem that remains secure under the assumption that certain lattice problems are hard for quantum computers.
Lattice-based Cryptography
Utilizes the computational hardness of lattice problems that are believed to be difficult for both classical and quantum computers.
Quantum Key Distribution (QKD)
Employs the principles of quantum mechanics, ensuring security through the detection of eavesdropping, as eavesdropping alters quantum states.
Boson Sampling
While not itself a cryptographic algorithm, Boson Sampling could demonstrate quantum advantage; post-quantum cryptography aims to resist such potential advancements.
Ring Learning with Errors (Ring-LWE)
A variant of LWE that uses ring structures, providing efficiency while maintaining hardness against quantum attacks.
Cryptographic Hash Functions
These functions are used in hash-based cryptography and, due to their one-way property, are not directly broken by quantum computers.
Supersingular Isogeny Diffie-Hellman (SIDH)
A key exchange protocol based on the difficulty of computing isogenies between supersingular elliptic curves, resisting quantum computer attacks.
Binary Field Cryptography
A form of code-based cryptography that uses binary Goppa codes to achieve quantum resistance.
Peikert's Cryptosystem
A lattice-based cryptosystem designed to be secure against both classical and quantum computing threats.
Learning with Errors (LWE)
A problem in lattice-based cryptography that involves solving linear equations with noisy solutions, resistant to known quantum attacks.
Hash-based Cryptography
Relies on the security of hash functions, which quantum computers can't efficiently reverse due to the one-way property.
Sidelnikov Cryptosystem
A code-based cryptosystem that resists quantum attacks due to the difficulty of the syndrome decoding problem for classical and quantum computers alike.
Quantum Resistant Ledger (QRL)
A blockchain designed with post-quantum cryptography algorithms to be secure against an adversary using quantum computers.
Module Learning with Errors (Module-LWE)
An extension of Ring-LWE that further increases efficiency and aims to retain resistance against quantum computers.
Learning with Rounding (LWR)
A deterministic variant of LWE offering resistance to quantum attacks and often enjoys performance improvements.
Isogeny-based Cryptography
Rests on the challenge of finding isogenies between elliptic curves, which is a problem not yet solved by quantum algorithms.
Code-based Cryptography
Builds on the hardness of the decoding problem for general linear codes, which hasn't been efficiently solved by quantum algorithms.
Multivariate Quadratic Polynomials (MQP)
Based on the difficulty of solving systems of multivariate quadratic equations, a problem which remains hard for quantum computers.
HFE (Hidden Field Equations)
A cryptosystem based on the difficulty of solving systems of multivariate polynomial equations, considered to be secure against quantum adversaries.
Kyber Cryptosystem
A key encapsulation mechanism that is part of the NIST post-quantum cryptography standardization process, designed to resist quantum cryptanalysis.
Rainbow Cryptosystem
A multivariate public key cryptosystem (MPKC) designed to be secure against quantum attacks based on the hardness of the MQP problem.
FrodoKEM
A key encapsulation mechanism based on the Learning with Errors (LWE) problem that aims to offer quantum resistance.
McEliece Cryptosystem
Centered around the trapdoor one-way function nature of Goppa codes which resist quantum attacks due to the intractability of decoding an arbitrary linear code.
Dilithium Cryptosystem
A lattice-based digital signature scheme that is considered to be resilient to quantum computer-based attacks.
Quantum-Secure Symmetric Key Algorithms
While no symmetric algorithm is specifically quantum-proof, increasing key sizes can offer resistance to brute-force attacks from quantum computers.
Homomorphic Encryption
While not inherently quantum-resistant, some lattice-based homomorphic encryption schemes are designed to be secure against quantum computers.
Picnic Signature Scheme
A post-quantum digital signature scheme that is secure under the assumption that certain symmetric key primitives are quantum-resistant.
Saber Cryptosystem
A lattice-based key encapsulation mechanism aiming for quantum resistance, predicated on the Module Learning with Rounding (Module-LWR) problem.
NewHope
A key exchange protocol based on the Ring-LWE problem, designed to withstand threats posed by quantum computers.
Sphincs+
An advanced stateful hash-based post-quantum signature scheme that offsets the limitations of earlier hash-based approaches.
© Hypatia.Tech. 2024 All rights reserved.