Post-quantum cryptography

D.J. Bernstein, T. Lange

Research output: Contribution to journalReview articleAcademicpeer-review

18 Citations (Scopus)

Abstract

Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

LanguageEnglish
Pages188-194
Number of pages7
JournalNature
Volume549
Issue number7671
DOIs
StatePublished - 13 Sep 2017

Cite this

Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature, 549(7671), 188-194. DOI: 10.1038/nature23461
Bernstein, D.J. ; Lange, T./ Post-quantum cryptography. In: Nature. 2017 ; Vol. 549, No. 7671. pp. 188-194
@article{5bbd4ea6f4a5452cb9aaf535cd8f4a50,
title = "Post-quantum cryptography",
abstract = "Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.",
author = "D.J. Bernstein and T. Lange",
year = "2017",
month = "9",
day = "13",
doi = "10.1038/nature23461",
language = "English",
volume = "549",
pages = "188--194",
journal = "Nature",
issn = "0028-0836",
publisher = "Nature Publishing Group",
number = "7671",

}

Bernstein, DJ & Lange, T 2017, 'Post-quantum cryptography' Nature, vol. 549, no. 7671, pp. 188-194. DOI: 10.1038/nature23461

Post-quantum cryptography. / Bernstein, D.J.; Lange, T.

In: Nature, Vol. 549, No. 7671, 13.09.2017, p. 188-194.

Research output: Contribution to journalReview articleAcademicpeer-review

TY - JOUR

T1 - Post-quantum cryptography

AU - Bernstein,D.J.

AU - Lange,T.

PY - 2017/9/13

Y1 - 2017/9/13

N2 - Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

AB - Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.

UR - http://www.scopus.com/inward/record.url?scp=85030779264&partnerID=8YFLogxK

U2 - 10.1038/nature23461

DO - 10.1038/nature23461

M3 - Review article

VL - 549

SP - 188

EP - 194

JO - Nature

T2 - Nature

JF - Nature

SN - 0028-0836

IS - 7671

ER -

Bernstein DJ, Lange T. Post-quantum cryptography. Nature. 2017 Sep 13;549(7671):188-194. Available from, DOI: 10.1038/nature23461