Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The long road ahead to transition to post-quantum cryptography: NULL
LaMacchia B. Communications of the ACM65 (1):28-30,2022.Type:Article
Date Reviewed: Jul 14 2022

In this article, the author asserts the following:

(1) Cryptographic algorithms are widely used to maintain the safety and privacy of communications. Many modern technologies, including mobile telephones, would fail if the applied cryptographic algorithm was “broken” by attackers. Private and public keys are often used in a typical cryptographic implementation.
(2) An attacker’s capacity for successful invasion depends upon the availability of fast-enough-to-decipher private keys. The recent advent of quantum computers based on multiple states instead of binary states heralds forthcoming faster computers with the capacity to break current algorithms. This would surely require reworking with regards to cryptographic algorithms and their implementing systems. Given the spread of cryptosystems, it is a mammoth task.
(3) As progress in computer technologies and the development of cryptosystems are independent of each other, the National Institute of Standards and Technology (NIST) has started work on post-quantum cryptography (PQC) system standardization.

The author subsequently identifies several known and unknown issues. As the title suggests, this will certainly be a long march to the end goal.

Reviewer:  Anoop Malaviya Review #: CR147472
Bookmark and Share
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
ABYSS: An Architecture for Software Protection
White S., Comerford L. IEEE Transactions on Software Engineering 16(6): 619-629, 1990. Type: Article
Feb 1 1991
Cybercryptography: applicable cryptography for cyberspace security
Yan S., Springer International Publishing, New York, NY, 2019.  436, Type: Book (978-3-319725-34-5), Reviews: (1 of 2)
May 3 2019
Security analysis of the SAML single sign-on browser/artifact profile
Gross T.  Computer security applications (Proceedings of the 19th Annual Computer Security Applications Conference, Dec 8-12, 2003)2982003. Type: Proceedings
Feb 3 2005
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 2004 Reviews.com™
Terms of Use
| Privacy Policy