Quantum Attacks on Public-Key Cryptosystems
Book Details:
Publisher: | Springer |
Series: |
Springer
|
Author: | Song Y. Yan |
Edition: | 1 |
ISBN-10: | 144197721X |
ISBN-13: | 9781441977212 |
Pages: | 207 |
Published: | May 14 2013 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 3.5 MB |
Book Description:
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems.This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.
Applications and Attacks
This book covers publickey cryptography, describing in depth all major publickey cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using publickey systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Security Professional)....
Developing Secret and Public Key Techniques with Java
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest public network, the Internet. Many Internet applications such as e-mail, databases, and browsers store a tremendous amount of personal and financial information, but frequently the data is left unprotected. Traditional network security is frequently less effective at preventing hackers from accessing this data. For instance, once-private databases are now completely exposed on the Internet. It turns out that ge...
From Quantum Chemistry to Condensed Matter Physics
Electronic Structure Calculations on Graphics Processing Units: From Quantum Chemistry to Condensed Matter Physics combines an accessible introduction to GPUs and GPU programming with a comprehensive overview of the present state of GPU accelerated quantum mechanical methods, their implementation, as well as representative applications. The book begins with an introduction to parallel computing and the massively parallel hardware design underlying modern GPUs, contrasting this to modern central processing units (CPUs). This is followed by an overview of programming models and software libraries that are available for GPU software development as required for quantum mechanical applications, as well as the considerations that have to be kept in mind w...
2007 - 2021 © eBooks-IT.org