Zusammenfassung
Aktuell werden verschiedene Alternativen zur Halbleitertechnik diskutiert und erprobt. Eines dieser Konzepte ist der Quantencomputer, dessen Bedeutung über die reine Beschleunigung von Rechenprozessen hinausgeht, da seine Realisierung weitreichende neue Ansätze im Hinblick auf die heute eingesetzte Kryptographie mit sich bringt. Der vorliegende Beitrag diskutiert daraus resultierende Auswirkungen und skizziert Alternativen zur „klassischen“ Kryptographie, die nach heutigem Wissensstand auch in einem Zeitalter der Quantencomputer Bestand hätten.
Literatur
E. Alkim, L. Ducas, T. Pöppelmann, P. Schwabe, P.: „Post-quantum key exchange–A new hope“,.IACR ePrint Archive 2015/1092 (2015).
ANSI X9.98-2010: Lattice-Based Polynomial Public Key Establishment Algorithm for the Financial Services Industry, October 2010.
D. J. Bernstein, D. Hopwood, A. Hülsing, et al: “SPHINCS: Practical Stateless Hash-Based Signatures”, in Proceedings of Eurocrypt 2015, Springer LNCS 9056 (2015), 368–397.
J. Bos, C. Costello, L. Ducas, et al: “Frodo: Take off the ring!–Practical, Quantum-Secure Key Exchange from LWE” IACR ePrint Archive 2016/659 (2016).
C. Costello, P. Longa, M. Naehrig: “Efficient algorithms for supersingular isogeny Diffie-Hellman”, IACR ePrint Archive 2016/413.
N. Courtois, M. Finiaz, N. Sendrier: “How to achieve a McEliece-based Digital Signature Scheme”, Proceedings of Asiacrypt 2001, Springer LNCS 2248 (2001), 157–174.
L. Ducas, A. Durmus, T. Lepoint, V. Lyubashevsky: “Lattice signatures and bimodal Gaussians”, in Proceedings of Crypto 2013, Springer LNCS 8042 (2013), 40–56.
European Telecommunications Standards Institute White Paper No. 8, Quantum Safe Cryptography and Security: An Introduction, Benefits, Enablers and Challenges, October 2014.
S. Fluhrer, D.A. McGrew, P. Kampanakis: Postquantum Preshared Keys for IKEv2, Internet-Draft 2016-02-05, expires 2016-08-06.
A. Huelsing, D. Butin, S. Gazdag, A. Mohaisen: “XMSS: Extended Hash-Based Signatures”, Internet-Draft 2016-07-06, expires 2017-01-07.
IEEE P1363.1: Public-Key Cryptographic Techniques Based on Hard Problems over Lattices, 2008.
D. Jao; L. DeFeo: “Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies”, in Proceedings PQCrypto 2011, Springer LNCS 7071 (2011), 19–34.
D. A. McGrew, M. Curcio: Hash-Based Signatures, Internet-Draft 2016-03-21, expires 2016-09-22.
NIST Interagency Report (NISTIR) 8105: Report on Post-Quantum Cryptography, April 2016.
NIST: Proposed Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process, August 2016.
C. Peikert: “A decade of lattice cryptography”, IACR ePrint Archive 2015/939 (2015).
PQCRYPTO: Initial recommendations of long-term secure post-quantum systems, September 2015.
J. M. Schanck, W. Whyte, Z. Zhang: “Quantum-Safe Hybrid (QSH) Cipher-suite for Transport Layer Security (TLS) version 1.3”, Internet-Draft 2016-04-04, expires 2016-10-04.
J. M. Schanck, W. Whyte, Z. Zhang: “Criteria for selection of public-key cryptographic algorithms for quantum-safe hybrid cryptography”, Internet-Draft 2016-04-04, expires 2016-10-04.
Author information
Authors and Affiliations
Corresponding author
Additional information
Dr. Walter Fumy Chief Scientist, Bundesdruckerei GmbH, Chairman ISO/IEC JTC 1/SC 27 IT Security Techniques
Rights and permissions
About this article
Cite this article
Fumy, W. Quantencomputer und die Zukunft der Kryptographie. Datenschutz Datensich 41, 13–16 (2017). https://doi.org/10.1007/s11623-017-0717-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-017-0717-z