Post quantum cryptography along practical example
How are you?Hope so everyone would be safe and sound just like me as I am also safe Alhamdulillah....
Post quantum cryptography is one of the most interesting and easy topic to discuss I have choosed for today's discussion.Let me elaborate some of the points along with a practical example so that you would understand topic in more clear manner.
Post-quantum cryptography defined as some of cryptographic techniques and algorithms which are resistant to different manipulations by quantum computers. We all know about classical cryptography that is still in use is considered prone to quantum attacks like Shor's algorithm that can factor large numbers and can also break encryption of public keys.
If I talk about advent of quantum computing then it has generated a requirement for new cryptographic methods which can withstand quantum attacks. Post-quantum cryptography main motive is to providing security for long time period and integrity of data even that in post quantum world.
Post quantum cryptography algorithms are created to be secure towards classical and quantum computers both and they ensures that data remains protected and safe from any unauthorized approach. There are some of famous post quantum cryptography algorithms about which I am talking below:
Lattice-based cryptography like NTRU
Code dependent cryptography like McEliece
Multivariate cryptography like Rainbow
Hash dependent signatures like SPHINCS
Quantum key distribution
If I talk about development and standardization of some of these algorithms about which I am talking then they are developed and standardized by some of the institutions like one is one of the most famous institute which is national institute of standard and technology and main motives is always to provide smooth transition to post quantum cryptography in it also.
Now I am discussing about some of the benefits and advantages that we can obtain from post quantum cryptography.
1. Long-term security:
Post quantum cryptography give surety that data would remain safe even if there is presence of quantum computers.
2. Future-proofing:
Implementation of post quantum cryptography made us ready for future of post quantum.
3. Compliance:
Post quantum cryptography is very crucial and significant for industries that demands for high level of security inclusive finance and government industries.
Now let's discuss a practical example
Usage of lattice-based cryptography about which I have talked above already like NTRU is best example which is used for securing online transactions.
Suppose that there's a customer that wants to make an online purchase from any website. Now customer's browser is using NTRU for encryption of sensitive information like credit card numbers or other customer's personal details.Encrypted data would be sent to website's server so that would be responsible for decrypting it by use of corresponding private key.
If even a quantum computer is intercepting data, it can't break the encryption and can't manipulate anything so it gives surety of the transaction security and protection. This example is complete elaboration and demonstration of how post-quantum cryptography can be helpful in protecting online transactions from quantum attacks.
https://twitter.com/KKhursheedanwar/status/1793621101639266319?t=YbH-X5MFgbPfHd6lXpbskQ&s=19
My participation 🤗
Note:- ✅
Regards,
@theentertainer