Fourth Year, Research Methods in Computing and IT, Software Development.
With the arrival of quantum computing, one must acknowledge the security implications. The integrity of many common cryptographic systems, namely discrete logarithm and factoring based systems, are at risk. Examining the pre-quantum state of cryptography, we will discuss how quantum is predicted to affect cryptography. Although there are quantum computers that exist today, all are far from capable of performing operations complex enough to break cyptographic algorithms widely used today. This does not mean an impact has not yet been felt. The threat of quantum computing has already lead to the creation a new cryptographic field - post-quantum crytography. The attempts of this field are in contention with the emerging technology, pursuing to implement a feasible, flexible and computationally efficient solution before a pertinent quantum computer can be built.
Section | Heading | Count |
---|---|---|
I | INTRODUCTION | 145 |
II | INTRODUCTION TO CRYPTOGRAPHY | 345 |
II.A | Rivest Shamir Adleman | 191 |
II.B | Elliptic Curve Cryptography | 229 |
III | QUANTUM COMPUTING | 264 |
III.A | Shor’s Algorithm | 157 |
III.B | Grover’s Algorithm | 159 |
III.C | Security Implications | 424 |
III.D | Post-Quantum Cryptography | 279 |
IV | CONCLUSION | 198 |
Total | 2391 |
Assessment | Marks |
---|---|
Literature Review | 60% |
Presentation | 40% |
Tara O'Kelly - G00322214@gmit.ie