An Introduction to Post-Quantum Cryptography Algorithms
By Christos Kasparis, EnSilica
EETimes (May 15, 2024)
The rise of quantum computing paints a significant challenge for the cryptography we rely on today. The modern encryption standards we currently use to safeguard sensitive data and communications, such as DSA, public key RSA and those based on elliptic curves, will eventually be broken by quantum computers. Estimates vary on when, but at current rates of improvement, this is predicted by some to happen towards the end of the next decade.
Michele Mosca, co-founder of the Institute for Quantum Computing at Canada’s University of Waterloo, has estimated that there is a 50% chance of a quantum computer powerful enough to break standard public-key encryption materializing in the next 15 years. This means many embedded systems in development now stand a reasonable chance of encountering such an attack by the end of their production run’s working lives. It has also been posited that sensitive data can be stored today and decrypted once quantum computers become powerful enough.
E-mail This Article | Printer-Friendly Page |
|
EnSilica Ltd. Hot IP
Related Articles
- Intrinsic ID PUFs: An Antidote to Post-Quantum Uncertainty
- ASICs Bring Back Control to Supply Chains
- Performance Evaluation of machine learning algorithms for cyber threat analysis SDN dataset
- Understanding the Deployment of Deep Learning algorithms on Embedded Platforms
- Securing Memory Will Take More Than Cryptography Alone
New Articles
- 现代系统中的 8051:与 AMBA 总线接口
- Shift Left for More Efficient Block Design and Chip Integration
- Certifying RISC-V: Industry Moves to Achieve RISC-V Core Quality
- Speeding Derivative SoC Designs With Networks-on-Chips
- Procrastination Is All You Need: Exponent Indexed Accumulators for Floating Point, Posits and Logarithmic Numbers
Most Popular
- System Verilog Assertions Simplified
- System Verilog Macro: A Powerful Feature for Design Verification Projects
- Dynamic Memory Allocation and Fragmentation in C and C++
- Understanding Logic Equivalence Check (LEC) Flow and Its Challenges and Proposed Solution
- Enhancing VLSI Design Efficiency: Tackling Congestion and Shorts with Practical Approaches and PnR Tool (ICC2)