Quantum computing’s impact on present cryptography
Ait Ider, Sara (2024)
Ait Ider, Sara
2024
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2024121837076
https://urn.fi/URN:NBN:fi:amk-2024121837076
Tiivistelmä
The progress made in technology greatly influences the security of information systems. This is because, with the advancement in technology, demand for cryptographic techniques for protection of communication and information has increased significantly. This leads to a growing reliance on cryptographic techniques to encrypt modern day information exchange and personal information.
However, the prior conventional cryptographic networks are observed to be vulnerable to quantum computers. This makes one wonder whether in the future the existing security measures will be able to protect the nodes from such attacks.
Hence, there is a need to have new cryptography that is immune to such quantum styles of attack. This thesis looks at how quantum computing impacts traditional security techniques and the progress to what is called post-quantum cryptography. As it will be demonstrated in this thesis through an analysis of current literature and recent research on quantum-resistant algorithms, there is still much that can be done to protect valuable information in the future.
However, the prior conventional cryptographic networks are observed to be vulnerable to quantum computers. This makes one wonder whether in the future the existing security measures will be able to protect the nodes from such attacks.
Hence, there is a need to have new cryptography that is immune to such quantum styles of attack. This thesis looks at how quantum computing impacts traditional security techniques and the progress to what is called post-quantum cryptography. As it will be demonstrated in this thesis through an analysis of current literature and recent research on quantum-resistant algorithms, there is still much that can be done to protect valuable information in the future.