What is POST-QUANTUM CRYPTOGRAPHY? What does POST-QUANTUM CRYPTOGRAPHY mean? POST-QUANTUM CRYPTOGRAPHY meaning - POST-QUANTUM CRYPTOGRAPHY definition - POST-QUANTUM CRYPTOGRAPHY explanation.
Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license.
SUBSCRIBE to our Google Earth flights channel - https://www.youtube.com/channel/UC6UuCPh7GrXznZi0Hz2YQnQ
Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true for the most popular public-key algorithms, which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several workshops on Quantum Safe Cryptography hosted by the European Telecommunications Standards Institute (ETSI) and the Institute for Quantum Computing.
In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography.
Discover how Box can solve simple and complex challenges, from sharing and accessing files on mobile devices to sophisticated business processes like data governance and retention.
Box and Office 365.
See how Box and Office 365 make collaboration more powerful, productive and secure.
Box for Office Online.
Create a Word document, PowerPoint presentation or Excel spreadsheet right from Box. Co-edit a file with others and see changes in real-time.
Box for Digital Asset Management.
With Box, brand and creative teams can securely manage, share and collaborate on their digital assets in a single unified workspace.
Box and Salesforce.
Box for Salesforce streamlines the sales process. Access, manage and share contracts, presentations and more--all from within Salesforce.
Box for iPhone and iPad.
How Marketers Use Box.
Learn how Box helps Marketing teams send large files, work with agencies and create campaigns quickly and productively.
Box Capture lets you snap photos, videos, document scans and audio recordings and upload them automatically to the cloud, bypassing your camera roll.
Box Notes makes it easy to create meeting notes, share status updates and plan projects together - and have it instantly available on every device.
Microsoft and Azure Active Directory partner with Box to transform the way people and companies work with their most important content.
Introducing Box Drive.
Learn how General Electric uses Box to drive productivity and empower security, improving value for their employees and customers.
Explore how Box helped AstraZeneca reinforce its cloud strategy and drive innovation.
See how Box and Office 365 help Flex improve collaboration across 130 locations worldwide, while also reducing operational overhead.