Authors:
Olaf Grote
1
;
Andreas Ahrens
2
and
César Benavente-Peces
1
Affiliations:
1
ETS de Ingeniería y Sistemas de Telecomunicación, University Politécnica de Madrid, Campus Sur, Ctra. Valencia, 28031 Madrid and Spain
;
2
Hochschule Wismar, University of Applied Sciences - Technology, Business and Design, Philipp-Müller-Straße 14, 23966 Wismar and Germany
Keyword(s):
Post-quantum Cryptography, Crypto-agility, Quantum-safe, Quantum Algorithms, Quantum Computer Science.
Related
Ontology
Subjects/Areas/Topics:
Localization and Positioning Schemes
;
Modeling, Algorithms, and Performance Evaluation
;
Sensor, Mesh and Ad Hoc Communications and Networks
;
Telecommunications
;
Wireless Information Networks and Systems
Abstract:
General security protocols use cryptographic schemes which are not prepared against quantum attacks. Asymmetric public key cryptographic schemes based on well researched methods are defined as broken, from quantum computer perspective. In contrast, symmetric cryptographic schemes and there methods are considered quantum-safe. A new effective strategy is necessary with focusing on post-quantum cryptography for evaluating and researching new quantum-safe cryptographic principles and crypto-agility to update vulnerable security protocols.