Anatoly Stojko | Dreamstime.com
Quantum Computing Promo 5f9c20341a83d 63d9261f37c6e

Dealing with Post-Quantum Cryptography Issues

Jan. 31, 2023
Quantum computing can address many difficult applications including cryptographic attacks that need to be mitigated.

This article series is in the Quantum Computing section of the Electronic Design Library as well as the Quantum Computing and Security and Cybersecurity TechXchanges.

Public key cryptography is one of the major components of online security. Prior to the advent of quantum computing, this approach was deemed to be very secure when properly implemented. Unfortunately, the current crop of crypto techniques are susceptible to attack by quantum computers but this has more to do with the approach chosen originally rather than a fault of public key encryption. 

About the Author

Helena Handschuh | Security Technologies Fellow, Rambus Inc.

Helena Handschuh is a Security Technologies Fellow at Rambus Inc. Her research and responsibilities include managing the foundational security technologies team in charge of research in crypto and post-quantum crypto; research in power analysis and side-channel attacks and countermeasures; building prototypes; and showcasing.

Sponsored Recommendations

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!