1,995 research outputs found
From Quantum Cheating to Quantum Security
For thousands of years, code-makers and code-breakers have been competing for
supremacy. Their arsenals may soon include a powerful new weapon: quantum
mechanics. We give an overview of quantum cryptology as of November 2000.Comment: 14 pages, 4 figures. Originally appeared in Physics Today:
. This article may be
downloaded for personal use only. Any other use requires prior permission of
both the author and the American Institute of Physic
From quantum-codemaking to quantum code-breaking
This is a semi-popular overview of quantum entanglement as an important
physical resource in the field of data security and quantum computing. After a
brief outline of entanglement's key role in philosophical debates about the
meaning of quantum mechanics I describe its current impact on both cryptography
and cryptanalysis. The paper is based on the lecture given at the conference
"Geometric Issues in the Foundations of Science" (Oxford, June 1996) in honor
of Roger Penrose.Comment: 21 pages, LaTeX2e, psfig, multi3.cls, 1 eps figur
Security Estimates for Quadratic Field Based Cryptosystems
We describe implementations for solving the discrete logarithm problem in the
class group of an imaginary quadratic field and in the infrastructure of a real
quadratic field. The algorithms used incorporate improvements over
previously-used algorithms, and extensive numerical results are presented
demonstrating their efficiency. This data is used as the basis for
extrapolations, used to provide recommendations for parameter sizes providing
approximately the same level of security as block ciphers with
and -bit symmetric keys
- …