Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
The long road ahead to transition to post-quantum cryptography
LaMacchia B. Communications of the ACM65 (1):28-30,2022.Type:Article
Date Reviewed: Jul 14 2022

In this article, the author asserts the following:

(1) Cryptographic algorithms are widely used to maintain the safety and privacy of communications. Many modern technologies, including mobile telephones, would fail if the applied cryptographic algorithm was “broken” by attackers. Private and public keys are often used in a typical cryptographic implementation.
(2) An attacker’s capacity for successful invasion depends upon the availability of fast-enough-to-decipher private keys. The recent advent of quantum computers based on multiple states instead of binary states heralds forthcoming faster computers with the capacity to break current algorithms. This would surely require reworking with regards to cryptographic algorithms and their implementing systems. Given the spread of cryptosystems, it is a mammoth task.
(3) As progress in computer technologies and the development of cryptosystems are independent of each other, the National Institute of Standards and Technology (NIST) has started work on post-quantum cryptography (PQC) system standardization.

The author subsequently identifies several known and unknown issues. As the title suggests, this will certainly be a long march to the end goal.

Reviewer:  Anoop Malaviya Review #: CR147472 (2209-0133)
Bookmark and Share
Would you recommend this review?
Other reviews under "Cryptographic Controls": Date
Security analysis of the SAML single sign-on browser/artifact profile
Gross T.  Computer security applications (Proceedings of the 19th Annual Computer Security Applications Conference, Dec 8-12, 2003)2982003. Type: Proceedings
Feb 3 2005
Cybercryptography: applicable cryptography for cyberspace security
Yan S., Springer International Publishing, New York, NY, 2019.  436, Type: Book (978-3-319725-34-5), Reviews: (2 of 2)
Aug 24 2020
Cryptology: machines, history and methods
Deavours C., Kahn D., Kruh L., Mellen G. (ed), Winkel B. (ed) Artech House, Inc., Norwood, MA,1989. Type: Divisible Book
Jan 1 1992

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 2004™
Terms of Use
| Privacy Policy