Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
The long road ahead to transition to post-quantum cryptography
LaMacchia B.  Communications of the ACM 65 (1): 28-30, 2022. Type: Article
Date Reviewed: Jul 14 2022

In this article, the author asserts the following:

(1) Cryptographic algorithms are widely used to maintain the safety and privacy of communications. Many modern technologies, including mobile telephones, would fail if the applied cryptographic algorithm was “broken” by attackers. Private and public keys are often used in a typical cryptographic implementation.
(2) An attacker’s capacity for successful invasion depends upon the availability of fast-enough-to-decipher private keys. The recent advent of quantum computers based on multiple states instead of binary states heralds forthcoming faster computers with the capacity to break current algorithms. This would surely require reworking with regards to cryptographic algorithms and their implementing systems. Given the spread of cryptosystems, it is a mammoth task.
(3) As progress in computer technologies and the development of cryptosystems are independent of each other, the National Institute of Standards and Technology (NIST) has started work on post-quantum cryptography (PQC) system standardization.

The author subsequently identifies several known and unknown issues. As the title suggests, this will certainly be a long march to the end goal.

Reviewer:  Anoop Malaviya Review #: CR147472
Bookmark and Share
Cryptographic Controls (D.4.6 ... )
Would you recommend this review?
Other reviews under "Cryptographic Controls": Date
Secure and effective implementation of an IOTA light node using STM32
Stucchi D., Susella R., Fragneto P., Rossi B.  BlockSys 2019 (Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, New York, NY,  Nov 10, 2019) 28-29, 2019. Type: Proceedings
Mar 15 2021
 Foundations of information security: a straightforward introduction
Andress J.,  No Starch Press, San Francisco, CA, 2019. 248 pp. Type: Book (978-1-718500-04-4)
Feb 2 2021
Cybercryptography: applicable cryptography for cyberspace security
Yan S.,  Springer International Publishing, New York, NY, 2019. 436 pp. Type: Book (978-3-319725-34-5), Reviews: (2 of 2)
Aug 24 2020

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy