Bibliographic Details
| Title: |
Quantum permutation pad for universal quantum-safe cryptography. |
| Authors: |
Kuang, Randy, Barbeau, Michel |
| Source: |
Quantum Information Processing; Jun2022, Vol. 21 Issue 6, p1-22, 22p |
| Subject Terms: |
QUANTUM logic, INTERNET protocols, QUANTUM computing, PERMUTATIONS, QUANTUM gates, CRYPTOGRAPHY, IMAGE encryption, QUANTUM computers |
| Abstract: |
Classical cryptographic techniques are currently under the growing quantum computing threat. New techniques that quantum computing algorithms cannot break are urgently needed. We present such an encryption method. It builds upon quantum permutation logic gates or quantum permutation pads. It is universal in that it can be equally employed on classical computers, today's Internet, and the upcoming quantum Internet. While the cryptographic technique is formulated in a quantum computing framework, it does not rely on physical properties uniquely present at the quantum level, such as no-cloning or entanglement of data. It achieves with today's technology a level of security comparable to what will be possible to attain with tomorrow's quantum technology. The mathematics behind the cryptographic technique, quantum representations of a symmetric group over a computational basis, is surprisingly simple. However, the challenge faced by an adversary wishing to break the code is intractable and uninterpretable, a property of Shannon's perfect secrecy. We believe that the cryptographic technique presented in this article can be used in several different ways and modes. It can be integrated into numerous current Internet protocols, or the Internet of Things, making them quantum safe. In addition, it can be used to transition to the upcoming Internet quantum technology smoothly. [ABSTRACT FROM AUTHOR] |
|
Copyright of Quantum Information Processing is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) |
| Database: |
Complementary Index |