Research Catalog

Report on post-quantum cryptography

Title
Report on post-quantum cryptography / Lily Chen; Stephen Jordan; Yi-Kai Liu; Dustin Moody; Rene Peralta; Ray Perlner; Daniel Smith-Tone.
Author
Chen, Lily.
Publication
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2016.

Available Online

https://purl.fdlp.gov/GPO/gpo98834

Details

Additional Authors
  • Chen, Lily.
  • Jordan, Stephen.
  • Liu, Yi-Kai.
  • Moody, Dustin.
  • Peralta, René.
  • Perlner, Ray.
  • Smith-Tone, Daniel.
  • Information Technology Laboratory (National Institute of Standards and Technology)
Description
1 online resource (15 pages) : illustrations (black and white).
Summary
In recent years, there has been a substantial amount of research on quantum computers machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. This Internal Report shares the National Institute of Standards and Technology (NIST) s current understanding about the status of quantum computing and post-quantum cryptography, and outlines NIST s initial plan to move forward in this space. The report also recognizes the challenge of moving to new cryptographic infrastructures and therefore emphasizes the need for agencies to focus on crypto agility.
Series Statement
NISTIR ; 8105
Uniform Title
NISTIR ; 8105.
Subject
  • Public key cryptography
  • Quantum computing
Note
  • April 2016.
  • Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.
  • Title from PDF title page (viewed April 30, 2016).
Bibliography (note)
  • Includes bibliographical references.
Call Number
GPO Internet C 13.58:8105
LCCN
GOVPUB-C13-66f65bb634f7b9bd29d708a92c419dec
OCLC
marcive958885692
Author
Chen, Lily.
Title
Report on post-quantum cryptography / Lily Chen; Stephen Jordan; Yi-Kai Liu; Dustin Moody; Rene Peralta; Ray Perlner; Daniel Smith-Tone.
Publisher
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2016.
Type of Content
text
Type of Medium
computer
Type of Carrier
online resource
Series
NISTIR ; 8105
NISTIR ; 8105.
Bibliography
Includes bibliographical references.
Connect to:
https://purl.fdlp.gov/GPO/gpo98834
Added Author
Chen, Lily.
Jordan, Stephen.
Liu, Yi-Kai.
Moody, Dustin.
Peralta, René.
Perlner, Ray.
Smith-Tone, Daniel.
Information Technology Laboratory (National Institute of Standards and Technology)
Other Standard Identifier
GOVPUB-C13-66f65bb634f7b9bd29d708a92c419dec
Gpo Item No.
0247-D (online)
Sudoc No.
C 13.58:8105
View in Legacy Catalog