메뉴 바로가기 본문 바로가기
Security Threats

Security Threats
Quantum computer

Security Threats Posed By Quantum Computers

Post-Quantum cryptography
is needed to compensate
for the safety limitations of
current cryptographic algorithms
(AES, RSA, etc.).

Quantum computing will soon be put to practical use with the ability
to break many cryptographic algorithms.Businesses should plan
to upgrade to TLS 1.3 and quantum-safe encryption ciphers soon.

Quantum computer

Security Threat Comparison

ALGORITHM TYPE PURPOSE COMPARISON OF QUANTUM COMPUTER
AES* Symmetric key Encryption Key length need increase* (Larger key sizes needed)
SHA-2, SHA-3 - Hash functions Output length need increase (Larger output needed)
RSA* Public key Signatures, Key establishment Not secure anymore* (No longer secure)
ECDSA, ECDH (Elliptic Curve Cryptography) Public key Signatures, Key exchange Not secure anymore (No longer secure)
DSA (Finite Field Cryptography) Public key Signatures, Key exchange Not secure anymore (No longer secure)

· NIST: National Institute of Standards and Technology

The Importance Of
Post-Quantum Cryptography

The existing RSA-based encryption key can be hacked in 1 second
with a quantum computer. Quantum technology has already been commercialized
mainly in advanced countries, and the importance of Post-quantum Cryptography
technology is maximizing
to the extent that it provides quantum encryption services
through network standardization even without quantum encryption technology.

Top Button