Post quantum cryptography

Post-Quantum Cryptography | CSRC

Sep 14 by Tugar

Hidden fields equations HFE and isomorphisms of polynomials IP : two new families of asymmetric algorithms. Regev, O. Historically, it has taken almost two decades to deploy our modern public key cryptography infrastructure. This includes cryptographic systems such as the Rainbow Unbalanced Oil and Vinegar scheme which is based on the difficulty of solving systems of multivariate equations. As this technology advances over the next decade, it is expected to break some encryption methods that are widely used to protect customer data, complete business transactions, and secure communications. This is viewed as a means of preventing mass surveillance by intelligence agencies. Full details can be found in the Post-Quantum Cryptography Standardization page.