Chapter 7iii: RSA, DH and Beyond Flashcards
RSA, DH and Beyond| Public Key Cryptography
Quantum computers (QCs) use qubits, enabling faster problem-solving than classical computers. Grover’s and Shor’s algorithms threaten cryptographic security, compromising RSA and key exchanges. While QCs exist, qubit capacity is limited, but experts predict a major breakthrough by the mid-2030s.
Post-Quantum Cryptography (PQC) vs. Quantum Cryptography
Sum up the main differences.
Why Does PQC Matter Now?
Why should we care about a problem that may become relevant in the more (or less) distant future? Let us assume the so-called “quantum leap” has ocurred and we are not prepared.
What effects would it have?
- long term data security
- Public Key Infrastructures and similar structures
- competition
Challenges in Transitioning to PQC
Explain them.
What is being shown in this slide?
NIST defined five security levels for cryptographic algorithms based on the hardness to break various AES and SHA variants. For each of the security levels, NIST also recommends a certain (public) key size for asymmetric algorithms to achieve similar strength.
NIST Security Levels vs. Key Sizes of “Classic” Asymmetric Algorithms
What is being shown in this slide?
NIST Security Levels vs. Key Sizes of PQC Algorithms
The novel and standardized PQC schemes can be parameterized with different key sizes to achieve security according to the five NIST security levels.