Research in the field of quantum-safe cryptography
DOI: 10.31673/2409-7292.2024.020013
DOI:
https://doi.org/10.31673/2409-7292.2024.020013Abstract
Quantum computing, based on the principles of quantum mechanics, is rapidly gaining momentum as a promising field of information technology. However, with the growing capabilities of quantum computing comes a new level of cybersecurity. Quantum-secure cryptography is emerging as a response to the potential threats posed by quantum computers to traditional cryptographic methods. The main goal of quantum-secure cryptography is to ensure the security of data in information systems, as quantum computing becomes more and more accessible. In this study, we thoroughly studied the essence of quantum-secure cryptography, its fundamental principles and applications. We have explored the advantages and limitations of this new cryptographic paradigm and discussed the potential challenges that arise in the context of its implementation. In addition, we analyzed the current state of research in the field of quantum-secure cryptography and highlighted the prospects for further development of this intriguing technology. We have researched potential threats and possible ways to solve them. Additionally, we reviewed a quantum risk assessment methodology that helps identify and manage threats in the context of quantum security. Finally, we trace existing examples and recent developments in the field of quantum-secure cryptography, revealing their potential to improve information security in the future. Overall, the research allows for a better understanding of the importance and prospects of quantum-secure cryptography in today’s digital world.
Keywords: Quantum computing, cryptography, encryption, Quantum Key Distribution.
References
1. What is Cryptography? https://aws.amazon.com/what-is/cryptography/
2. Brett, Daniel. (2021). Symmetric vs. Asymmetric Encryption: What’s the Difference? https://www.trentonsystems.com/en-us/resource-hub/blog/symmetric-vs-asymmetric-encryption
3. Nikita, Gupta. (2022). Symmetric vs. Asymmetric Encryption – What are differences? https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences
4. What Are The Differences between Classical, Quantum and Post-Quantum Cryptography? https://www.quantropi.com/differences-between-classical-quantum-post-quantum-cryptography/
5. Quantum Resistance and the Signal Protocol. https://signal.org/blog/pqxdh/
6. Post-Quantum Cryptography in Blockchain Security. https://www.gate.io/uk/learn/articles/post-quantum-cryptography-in-blockchain-security/1061
7. Strategy: Quantum Risk Assessment And Data Protection. https://cybersecurityventures.com/strategy-quantum-risk-assessment-and-data-protection/
8. Michele Mosca, John Mulholland. A Methodology for Quantum Risk Assessment. (2017) https://globalriskinstitute.org/publication/a-methodology-for-quantum-risk-assessment/
9. Secure socket layer application program apparatus and method. https://patents.google.com/patent/US5657390
10. iMessage with PQ3: The new state of the art in quantum-secure messaging at scale. (2024) https://security.apple.com/blog/imessage-pq3/
11. Trond, Andersen, Yuri, Lensky. (2023). An important step towards improved quantum computers. https://blog.google/technology/research/an-important-step-towards-improved-quantum-computers/
12. Jason, Zander. (2024). Advancing science: Microsoft and Quantinuum demonstrate the most reliable logical qubits on record with an error rate 800x better than physical qubits. https://blogs.microsoft.com/blog/2024/04/03/advancing-science-microsoft-and-quantinuum-demonstrate-the-most-reliable-logical-qubits-on-record-with-an-error-rate-800x-better-than-physical-qubits/