394 research outputs found

    The Impact of Quantum Computing on Present Cryptography

    Full text link
    The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor's and Grover's), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography.Comment: 10 pages, 1 figure, 3 tables, journal article - IJACS

    AUTHENTICATION SCHEME ON FRACTAL SETS

    Get PDF
    Implementation of authentication tools is the requirement for secured information system in open networks. Known authentication protocols are based on some secret knowledge (key or password) checking. Preferable scheme for checking procedure is client-server dialog without transferring of secret knowledge, even in ciphered form, also known as zero-knowledge protocol. Such protocols, as a rule, use mathematically complex problems without known simple solution for inverse calculation. This obscurity case a weakness of protocols – discovering solution of the problem impairs the secrecy of protocol. It is proposed the authentication schemes built on complex fractal sets including distant knowledge diagnostic methods. Fractal sets suitable for posed problem due to properties of finiteness and infiniteness combination. Property of finiteness allows set construction; infiniteness ensures multiple usage of the scheme. The algorithm of client-server communication is shown. Usage of authentication scheme could improve the network information resource securit
    corecore