Cryptology Management in a Quantum Computing Era
Rosenberg, Nathanial Owen
MetadataShow full item record
Todays most efficient and widely used cryptographic standards such as RSA rely on the difficulty of factoring large numbers to resist cryptanalysis. Asymmetric cryptography is used in a plethora of sensitive operations from online bank transactions to international e-commerce, and the Department of Defense also uses asymmetric cryptography to transmit sensitive data. Quantum computers have the potential to render obsolete widely deployed asymmetric ciphers essential to the secure transfer of information. Despite this, alternatives are not in place. The goal of this study is to understand the alternatives to classical asymmetric cryptography that can be used as substitutes should quantum computers be realized. This study explores quantum-resistant alternatives to traditional ciphers and involves experimenting with available implementations of ciphers described the post-quantum literature as well as developing our own implementations based on descriptions of algorithms in the literature. This study provides an original implementation of hash-based digital signature and detailed instructions on its use as well as customization of the NTRU lattice-based cryptography suite, including the use of NTRU and AES together in a hybrid cryptographic protocol. This thesis will make recommendations on future work necessary to prepare for the emergence of large-scale, fault-tolerant quantum computers.
Showing items related by title, author, creator and subject.
Michelsen, Christopher J. (Monterey, California. Naval Postgraduate School, 1996-09);Information assurance (IA) within DoD is becoming an increasingly difficult task as information resources are moving toward a web-based environment to counter this problem, DoD is mandating that all services implement DoD ...
Gangopadhyay, Sugata; Gangopadhyay, Aditi Kar; Pollatos, Spyridon; Stănică, Pantelimon (2015-07-31);While performing cryptanalysis, it is of interest to approximate a Boolean function in n variables f : Fn → F2 by affine functions. Usually, it is assumed that all the input vectors to a Boolean function are equiprobable ...
Cyber Security and Tactical Implications with Mr. Dave Luber, National Security Agency SGL [video] Luber, David (Monterey, California: Naval Postgraduate School., 2021-10-19);An NPS Special Guest Lecture (SGL). Topics covered NSA encryption, zero-trust practices, quantum-resistant cryptography, and cybersecurity systems approach. With an Introduction by NPS President Ann E. Rondeau, Ed.D., Vice ...