Tag Archives: encryption

Final Proposal: Cryptology and Quantum

My final research proposal dove into the topics of quantum computing power and its effects on cryptology and then compared that topic with the effects that would have on societies willingness to still utilize information sharing platforms, such as the internet, in an environment where data security has a lower likelihood. The hypothesis that I … Continue reading Final Proposal: Cryptology and Quantum

Quantum and Cryptology Cause and Effect: Final Post

In the final blog post of this semester, I will be presenting the structure of my research proposal. I will start off with a flow chart overview of my proposal, and then discuss my final hypothesis. The conclusion of this post will be spent discussing methods of measurement that will be utilized in my proposal. … Continue reading Quantum and Cryptology Cause and Effect: Final Post

Suitability of Algorithms

Hypothesis Quantum resistant cryptography algorithms can be as secure and fast as current RSA and Diffie-Hellman based algorithms. This will result in an economical transition once new standards are set by the appropriate governing bodies. Research Approach Research on this subject will be primarily conducted using quantitative data collected from a variety of algorithms. This … Continue reading Suitability of Algorithms

Last Two Search Types: Quantum & Encryption

The database that I utilized for the search was ABI/INFORM. I utilized the subject search function first and then followed on by utilizing the citation traces. The information I have found should definitely be beneficial in gathering the necessary information to conduct well informed research in reference to quantum computing and the effects it will … Continue reading Last Two Search Types: Quantum & Encryption

Advanced Searching: Quantum and Cryptography

The database that I utilized for the search was Computer Source through EBSCOhost. I added and altered several different combinations of Boolean operators in order to try and find the best results for my proposal. The information I have found should steer me in the right direction to conduct a deep dive into the effects … Continue reading Advanced Searching: Quantum and Cryptography

Quantum, More Power but Less Privacy

Your initial research idea and your current research idea. If there are changes, tell us how they are different and why. What led you to change your focus? I have chosen to make a complete topic change from what I was considering in week one. The main driver behind this change is that after doing … Continue reading Quantum, More Power but Less Privacy

NEJATOLLAHI, H., DUTT, N., RAY, S., REGAZZONI, F., BANERJEE, I., & CAMMAROTA, R. (2018). Post-Quantum Lattice-Based Cryptography

  Provide the citation for the study here. NEJATOLLAHI, H., DUTT, N., RAY, S., REGAZZONI, F., BANERJEE, I., & CAMMAROTA, R. (2018). Post-Quantum Lattice-Based Cryptography Implementations: A Survey. ACM Computing Surveys, 51(6), 1–41. https://doi.org/10.1145/3292548 Post-Quantum Lattice-Based Cryptography   What is the abstract of the article? The advent of quantum computing threatens to break many classical … Continue reading NEJATOLLAHI, H., DUTT, N., RAY, S., REGAZZONI, F., BANERJEE, I., & CAMMAROTA, R. (2018). Post-Quantum Lattice-Based Cryptography