Post-quantum cryptography is inevitable. National Institute of Standards and Technology (NIST) starts standardizing quantum-resistant public-key cryptography (aka post-quantum cryptography). The reason is that investment in quantum computing is blooming which poses significant threats to our currently deployed cryptographic algorithms. As a security engineer, to prepare for the apocalypse in advance, I've been watching the development of quantum computers and post-quantum cryptography closely. Never mind, I simply made up an excuse to study these fascinating scientific fields. However, they are extremely hard to understand, at least to an amateur like me. This article shares with you my notes with the hope that you will have an intuitive understanding of the beautiful and mind-blowing quantum algorithms and post-quantum cryptography. Update: Multivariate signature scheme Rainbow is broken by Ward Beullens. Supersingular Isogeny Diffie-Hellman protocol (SIDH) is broken by Wouter Castryck and Thomas Decru
翻译:分子后加密法是不可避免的。 国家标准和技术研究所(NIST)开始标准化抗量公用钥匙加密法( Qa- Qa- Qa- 后加密法 ) 。 原因是量子计算投资正在激增, 对我们目前部署的加密算法构成了重大威胁。 作为一名安全工程师, 我一直在密切观察量子计算机和量子后加密法的开发。 不用担心, 我只不过是编造了一个借口来研究这些迷人的科学领域。 但是, 它们非常难以理解, 至少像我这样的业余爱好者是如此。 文章与你们分享我的笔记, 希望你们能够直观地了解美丽和可思维的量子算法和量子后加密法。 更新: 由贝伦沃德打破了多变的签字计划。 超异族的异种Diffie- Hellman 协议( SIDH) 被沃特· 斯特里克和托马斯· 德鲁打破了。