Quantum-safe cryptography: crossroads of coding theory and cryptography
نویسندگان
چکیده
Abstract We present an overview of quantum-safe cryptography (QSC) with a focus on post-quantum (PQC) and information-theoretic security. From cryptographic point view, lattice code-based schemes are among the most promising PQC solutions. Both approaches based hardness decoding problems linear codes different metrics. lattices can be constructed to achieve certain secrecy quantities for wiretap channels as is intrinsically classical- quantum-safe. Historically, coding theory intimately connected since Shannon’s pioneering studies but have somehow diverged later. QSC offers opportunity rebuild synergy two areas, hopefully leading further development beyond NIST standardization process. In this paper, we provide survey code designs that believed in area or theory. The interplay similarities between areas discussed. also conclude our understandings prospects future research after standardisation.
منابع مشابه
Curves, Cryptography and Coding theory
2 Basic Cryptography 3 2.1 Preliminaries: Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Modern Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2.1 Block Ciphers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2.2 Moving forward . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
متن کاملGeneralised Jacobians in Cryptography and Coding Theory
The use of generalised Jacobians in discrete logarithm based cryptosystems has so far been rather limited since they offer no advantage over traditional discrete logarithm based systems. In this paper we continue the search for possible applications in two directions. Firstly, we investigate pairings on generalised Jacobians and show that these are insecure. Secondly, generalising and extending...
متن کاملSome Applications of Coding Theory in Cryptography
The applicability of techniques in coding theory to problems in cryptography is illustrated by examples concerning secret-sharing schemes with tailored access priveleges, the design of perfect local randomizers, the construction of t-resilient functions, and the quantization of the nonlinearity of boolean functions. Some novel coding concepts, in particular the notions of minimal codewords in l...
متن کاملPublic key cryptography based on coding theory
In this thesis we view the statistical decoding algorithm, which tries to solve the general decoding problem as well as the variants of the McEliece cryptosystem based on Gabidulin codes. The first part of the thesis is dedicated to the general concept of public key cryptography on the basis of coding theory and the security of the underlying problems. Thus after presenting the basic principles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science China Information Sciences
سال: 2021
ISSN: ['1869-1919', '1674-733X']
DOI: https://doi.org/10.1007/s11432-021-3354-7