52, Achasan-ro 15-gil, Seongdong-gu,
Seoul, Republic of Korea
(Samhwan Digital Venture Tower 2nd floor)
Security Threats Posed By Quantum Computers
Post-Quantum cryptography
is needed to compensate
for the safety limitations of
current cryptographic algorithms
(AES, RSA, etc.).
Quantum computer
ALGORITHM | TYPE | PURPOSE | COMPARISON OF QUANTUM COMPUTER |
---|---|---|---|
AES* | Symmetric key | Encryption | Key length need increase* (Larger key sizes needed) |
SHA-2, SHA-3 | - | Hash functions | Output length need increase (Larger output needed) |
RSA* | Public key | Signatures, Key establishment | Not secure anymore* (No longer secure) |
ECDSA, ECDH (Elliptic Curve Cryptography) | Public key | Signatures, Key exchange | Not secure anymore (No longer secure) |
DSA (Finite Field Cryptography) | Public key | Signatures, Key exchange | Not secure anymore (No longer secure) |
· NIST: National Institute of Standards and Technology
The Importance Of
Post-Quantum Cryptography
The existing RSA-based encryption key can be hacked in 1 second
with a quantum computer. Quantum technology has already been commercialized
mainly in advanced countries, and the importance of Post-quantum Cryptography
technology is maximizing to the extent that it provides quantum encryption services
through network standardization even without quantum encryption technology.