A Guide to Post-Quantum #cryptography
▻https://hackernoon.com/a-guide-to-post-quantum-cryptography-d785a70ea04b?source=rss----3a8144ea
This article was written by Ben Perez and originally appeared on the Trail of Bits Blog. It is being republished with permission of the author and includes additional notes & comments from researchers at the RI lab.For many high-assurance applications such as TLS traffic, medical databases, and blockchains, forward secrecy is absolutely essential. It is not sufficient to prevent an attacker from immediately decrypting sensitive information. Here the threat model encompasses situations where the adversary may dedicate many years to the decryption of ciphertexts after their collection. One potential way forward secrecy might be broken is that a combination of increased computing power and number-theoretic breakthroughs make attacking current cryptography tractable. However, unless (...)
#security #quantum-cryptography #quantum-computing #post-quantum-cryptography