Skip to main content

What Is Next in Cryptology?

  • Chapter
  • First Online:
History of Cryptography and Cryptanalysis

Part of the book series: History of Computing ((HC))

  • 2895 Accesses

Abstract

What would happen if all of the algorithms in public-key cryptography suddenly could be broken in seconds or minutes? Those algorithms, like RSA and elliptic curve cryptography are the ones that we depend on for Internet commerce. What if they were all of a sudden useless? Would society collapse? Would commerce be at an end? That is the promise and the danger of quantum computers .

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 44.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Remember Schrödinger’s cat. The cat in the closed box may either be dead or alive. Only when the box is opened do we know which state the cat is in. Qubits work the same way. Only when you observe (measure) them do you know what state they are in. Until that point there is the probability they are in any of the other possible states.

  2. 2.

    https://quantumexperience.ng.bluemix.net/qx/tutorial?sectionId=beginners-guide&page=002-Introduction~2F001-Introduction

  3. 3.

    https://www.youtube.com/watch?time_continue=2&v=9q-qoeqVVD0

  4. 4.

    For a list of many quantum computing algorithms see https://math.nist.gov/quantum/zoo/

  5. 5.

    See https://csrc.nist.gov/projects/post-quantum-cryptography/round-1-submissions

  6. 6.

    Wiesner did try to get a version of his idea with an application to quantum currency published, but his paper was rejected. He resurrected his ideas a decade later and was finally able to get them published. This is the starting point for the Bennett and Brassard research that led to their 1984 paper.

  7. 7.

    This is an admittedly over-simplified description of these physical concepts.

References

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Dooley, J.F. (2018). What Is Next in Cryptology?. In: History of Cryptography and Cryptanalysis. History of Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-90443-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-90443-6_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-90442-9

  • Online ISBN: 978-3-319-90443-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics