How quantum computers would affect

Assignment Help Computer Network Security
Reference no: EM133112648

Task: Post-Quantum Ciphers (Research Task)

It is well-known that some of the currently deployed cryptographic constructs used in protecting communication cannot withstand attacks by quantum computers and thus as soon as a high-scale quantum computer sees light, such protocols will be immediately rendered insecure. This task requires you to undertake some research regarding how quantum computers would affect currently deployed symmetric encryption ciphers.

Task Requirements
Write a short report (750 words max) discussing how would quantum computers affect currently deployed symmetric encrypting schemes and what measures need to be taken to offer protection against quantum computers in the context of symmetric encryption. Your report should include relevant references from the literature and your discussion should cover efficiency and security aspects, e.g. key sizes.

Reference no: EM133112648

Questions Cloud

Assignment on confusion matrix : Assuming that we are running an experiment on Hong Kong tourists by showing them photos of the popular sights in Hong Kong and then asking them which the direct
What is minimum expected starting salary : Suppose that the post-graduation salary increases at a 5% per year and that the discount rate is 8%. What is minimum expected starting salary
What is the price of each of the four bonds : The yield to maturity(YTM) on 1-year zero-coupon(discount) bonds is 4%,the YTM on 2-year zero-coupon bonds is 5% and the YTM on 3-year zero-coupon bonds is 6%.
How much money will heather have after years : Heather will invest $200 per month for the next 8 years. At a rate of 7.5% per year, how much money will Heather have after 8 years
How quantum computers would affect : Discussing how would quantum computers affect currently deployed symmetric encrypting schemes and what measures need to be taken to offer protection
What is the price of the two-year zero-coupon bond : Consider that the one-year coupon bond with 5% coupon rate is trading at $99.06; and that the two-year coupon bond with 6% coupon rate is trading at $98.19.
What is expect return if you invest in bond : Consider a two-year zero coupon bond with face value of $100. The YTM of the bond is 30%. Assume that there is a 50% chance that the company will default, and i
How much was the original loan amount : Andy is paying $625 every month on his business loan. If the loan lasts 6 years and has a 8% interest rate, how much was the original loan amount
Creating just a generic savings psa : As a group, brainstorm ideas for your PSA. Remember, you want your PSA to inspire people in your target market to save for their goals, rather than creating jus

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd