Anthony O Otiko
Department of Computer Science, Cross River State University of Technology, Cross-River State

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

DATA LOSS PREVENTION USING POST QUANTUM CRYPTOGRAPHY: OVERVIEW OF ROUND-3 ALGORITHMS Augustine Chidiebere Onuora; Prince Ana; Anthony O Otiko; Chibuike Ezeocha Madubuike
IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science)
Publisher : STMIK Pringsewu Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v5i3.1061

Abstract

The current hype of quantum computing has necessitated the need for computer security stakeholders to call for the design of security algorithms that will be quantum efficient when quantum computers finally grace our computing sphere. Recent advancements in quantum computing have made cryptographic schemes more vulnerable to quantum attacks like Shor’s algorithm and Grove’s algorithm. Therefore NIST call for a new set of algorithms known as Post-Quantum cryptography that would be quantum proof is imminent.  Many Post quantum algorithms have been designed and tested. But only few of them made it to the round 3 (the final round). This paper reviewed these post quantum candidates. Literatures highlighting their scheme, properties, implementation and areas of security coverage was reviewed. Recommendations on future research areas in this field was itemized for this novel security paradigm as we await the final standardization of this cryptosystems.
DATA LOSS PREVENTION USING POST QUANTUM CRYPTOGRAPHY: OVERVIEW OF ROUND-3 ALGORITHMS Augustine Chidiebere Onuora; Prince Ana; Anthony O Otiko; Chibuike Ezeocha Madubuike
IJISCS (International Journal of Information System and Computer Science) Vol 5, No 3 (2021): IJISCS (International Journal of Information System and Computer Science)
Publisher : Bakti Nusantara Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/ijiscs.v5i3.1061

Abstract

The current hype of quantum computing has necessitated the need for computer security stakeholders to call for the design of security algorithms that will be quantum efficient when quantum computers finally grace our computing sphere. Recent advancements in quantum computing have made cryptographic schemes more vulnerable to quantum attacks like Shor’s algorithm and Grove’s algorithm. Therefore NIST call for a new set of algorithms known as Post-Quantum cryptography that would be quantum proof is imminent.  Many Post quantum algorithms have been designed and tested. But only few of them made it to the round 3 (the final round). This paper reviewed these post quantum candidates. Literatures highlighting their scheme, properties, implementation and areas of security coverage was reviewed. Recommendations on future research areas in this field was itemized for this novel security paradigm as we await the final standardization of this cryptosystems.