首页> 外文期刊>International Journal of Applied Engineering Research >A Survey on Post-Quantum Cryptography for Constrained Devices
【24h】

A Survey on Post-Quantum Cryptography for Constrained Devices

机译:受约束设备后量子密码术的调查

获取原文
获取原文并翻译 | 示例
           

摘要

The rise of Quantum computers in the recent years have given a major setback to classical and widely used cryptography schemes such as RSA(Rivest-Shamir-Adleman) Algorithm and ECC (Elliptic Curve Cryptography). RSA and ECC depends on integer factorization problem and discrete logarithm problem respectively, which can be easily solved by Quantum Computers of sufficiently large size running the infamous Shor's Algorithm. Therefore cryptography schemes which are difficult to solve in both traditional as well as Quantum Computers need to be evaluated. In our paper we provide a rigorous survey on Post-Quantum Cryptography schemes and emphasize on their applicability to provide security in constrained devices. We provide a detailed insight over the schemes which could possibly replace RSA and ECC for security in constrained deices.
机译:近年来量子计算机的崛起给了古典和广泛使用的加密方案的主要挫折,例如RSA(RIVEST-Shamir-Adleman)算法和ECC(椭圆曲线加密)。 RSA和ECC分别取决于整数分解问题和离散对数问题,其可以通过量子计算机可以容易地解决臭名昭着的避难所算法。 因此,需要评估在传统和量子计算机中难以解决的加密方案。 在我们的论文中,我们对Quantum Cryptography计划提供了严格的调查,并强调其适用性在约束设备中提供安全性。 我们提供了对可以替换RSA和ECC的方案的详细洞察,以便在受约束的脱魔中进行安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号