LEADER 02990aam 2200517I 450 001 9910709596903321 005 20160926090653.0 024 8 $aGOVPUB-C13-66f65bb634f7b9bd29d708a92c419dec 035 $a(CKB)5470000002479027 035 $a(OCoLC)958885692 035 $a(EXLCZ)995470000002479027 100 $a20160921d2016 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aReport on post-quantum cryptography /$fLily Chen; Stephen Jordan; Yi-Kai Liu; Dustin Moody; Rene Peralta; Ray Perlner; Daniel Smith-Tone 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d2016. 215 $a1 online resource (15 pages) $cillustrations (black and white) 225 1 $aNISTIR ;$v8105 300 $aApril 2016. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page (viewed April 30, 2016). 320 $aIncludes bibliographical references. 330 3 $aIn recent years, there has been a substantial amount of research on quantum computers machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks. This Internal Report shares the National Institute of Standards and Technology (NIST) s current understanding about the status of quantum computing and post-quantum cryptography, and outlines NIST s initial plan to move forward in this space. The report also recognizes the challenge of moving to new cryptographic infrastructures and therefore emphasizes the need for agencies to focus on crypto agility. 606 $aPublic key cryptography 606 $aQuantum computing 615 0$aPublic key cryptography. 615 0$aQuantum computing. 700 $aChen$b Lily$01396971 701 $aChen$b Lily$01396971 701 $aJordan$b Stephen$01396972 701 $aLiu$b Yi-Kai$01396973 701 $aMoody$b Dustin$01396974 701 $aPeralta$b Rene?$01396975 701 $aPerlner$b Ray$01396976 701 $aSmith-Tone$b Daniel$01396977 712 02$aInformation Technology Laboratory (National Institute of Standards and Technology) 801 0$bNBS 801 1$bNBS 801 2$bGPO 801 2$bNBS 906 $aBOOK 912 $a9910709596903321 996 $aReport on post-quantum cryptography$93457995 997 $aUNINA