-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cryptography Algorithms
By :

In this chapter, we analyzed Q-Cryptography. After introducing the basic principles of Q-Mechanics and the fundamental bases of this branch of science, we deep-dived into QKD.
After that, we explored the potential of quantum computing and Shor's algorithm. This algorithm is a candidate for wiping out a great part of classical cryptography when it comes to implementing a quantum computer that will get enough qubits to boost its power against the factorization problem.
Finally, we saw the candidate algorithms for the so-called post-Q-Cryptography; among them, we saw AES, SHA (hash), and NTRU.
With that, you have learned what Q-Cryptography is and how it is implemented. You have also learned what quantum computing is and, in particular, became familiar with a very disruptive algorithm that you can implement in a quantum machine: Shor's algorithm.
Finally, you learned which algorithms are quantum-resistant to the power of the quantum computer and why.
...Change the font size
Change margin width
Change background colour