March 19, 2024, 4:11 a.m. | Dr. G S Mamatha, Namya Dimri, Rasha Sinha

cs.CR updates on arXiv.org arxiv.org

arXiv:2403.11741v1 Announce Type: new
Abstract: The advent of quantum computing poses a profound threat to traditional cryptographic systems, exposing vulnerabilities that compromise the security of digital communication channels reliant on RSA, ECC, and similar classical encryption methods. Quantum algorithms, notably Shor's algorithm, exploit the inherent computational power of quantum computers to efficiently solve mathematical problems underlying these cryptographic schemes. In response, post-quantum cryptography (PQC) emerged as a critical field aimed at developing resilient cryptographic algorithms impervious to quantum attacks. This …

algorithm algorithms arxiv communication compromise computational computers computing cryptographic cryptography cs.cr digital ecc encryption exploit exposing post-quantum post-quantum cryptography power quantum quantum algorithms quantum computers quantum computing quantum cryptography rsa security shor systems threat vulnerabilities

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Technical Support Specialist (Cyber Security)

@ Sigma Software | Warsaw, Poland

OT Security Specialist

@ Adani Group | AHMEDABAD, GUJARAT, India

FS-EGRC-Manager-Cloud Security

@ EY | Bengaluru, KA, IN, 560048