NEWS: 公告在东京证券交易所JASDAQ标准市场新上市

市场调查报告书

量子运算的时代的加密技术

Cryptography in the Quantum Computing Era

出版商 ABI Research 商品编码 569152
出版日期 内容资讯 英文 27 Pages, 8 Tables, 1 Figure
商品交期: 最快1-2个工作天内
价格
如有价格方面的疑问请按下「询问」键来信查询
量子运算的时代的加密技术 Cryptography in the Quantum Computing Era
出版日期: 2017年10月23日内容资讯: 英文 27 Pages, 8 Tables, 1 Figure
简介

在资讯理论的领域,活用量子力学的成果,这个50年间达成了大幅度的成长。并且现在,以量子理论为基础量子运算的实用化为目标,在全球各国透过公私合作推动研究开发。另一方面,若量子运算发展,容易突破传统的加密技术,对应量子电脑 (或有抗性的) 加密技术的开发很紧迫。

本报告提供量子运算的时代的新加密技术的应有状态相关分析,量子运算的特征,其对传统的加密技术带来的影响,新的加密技术 (密码鑰匙作成、经销技术)的概要,主要供应商的配合措施情形等调查。

第1章 量子运算的登场

  • 濒临危机的加密技术
  • 理论成为现实时
  • 新的扩充军备竞争

第2章 后量子密码

  • 密码的阅读和理解
  • 技术规格的研究、开发
  • 在量子电脑中有抗性的演算法
  • 加密方式的指定

第3章 量子金鑰传输

  • 理论上的估计
  • 实际的活用状况
  • 普及再生手的课题
  • 市场上的实用化

第4章 供应商的生态系统

  • CipherQ
  • Crypta Labs
  • CryptoExperts
  • ID Quantique
  • ISARA
  • MagiQ Technologies.
  • Post-Quantum Solutions
  • Qubitekk
  • QuintessenceLabs
  • QuNu Labs
  • SecureRF

相关分析

目录
Product Code: AN-2477

QUANTUM COMPUTING TO COME OF AGE

Quantum mechanics, the branch of physics dealing with elementary particles at the atomic level and the revolutionary principles of superposition and entanglement, has come a long way from the discovery of the initial fundamentals in the early nineteenth century. The field of quantum computing has since emerged from the physics, finding theoretical application in modern computation systems.

Research in quantum computing is closely tied to the discipline of information theory, a mathematical concept concerned with communication, coding, and encryption, pioneered by the likes of Turing, von Neumann, and Shannon in the mid-twentieth century. Various applications of quantum information theory were developed in the last 50 years, and laboratory testing has shown promise in converting some of the theories into reality. As a result, quantum computing has been high on the research agenda of governments and tech organizations worldwide.

In a quantum computing model, the basic unit of information is called the quantum bit (qubit), which can be represented by photons, for example (the quantum equivalent of binary digits in classical computing). Using qubits and quantum gates (a type of logic gate), the development of a quantum circuit model of computation has been made possible, enabling the use of algorithms to theoretically solve highly complex mathematical problems in a much shorter time frame than is currently possible.

Over the years, researchers have managed to develop improved hardware with ever lower error rates per quantum gate that can carry out arbitrarily long quantum computations. Quantum computing and information theory could therefore create powerful computers, capable of staggering processing speeds and incredibly accurate measurements, as well as enabling the foundation of a highly secure communication infrastructure. However, this same type of power presents dangers as well in that it could just as easily break many of the cryptographic technologies in use today.

CRYPTOGRAPHY IN DANGER

In 1994, Peter Shor developed an algorithm capable of efficient quantum factorization of large prime numbers. Prime numbers underpin the encryption algorithms used in public key infrastructures (PKI). Such algorithms are secure today because such factorization (decomposition) is practically impossible, even using supercomputers. But Shor's algorithm, if applied using a quantum computer, could easily crack even the latest, most complex asymmetric encryption algorithms, such as elliptic curve cryptography (ECC).

Table of Contents

1. QUANTUM COMPUTING TO COME OF AGE

  • 1.1. Cryptography in Danger
  • 1.2. When Theory Becomes Reality
  • 1.3. A New Arms Race

2. POST-QUANTUM CRYPTOGRAPHY

  • 2.1. Breaking Encryption
  • 2.2. Research and Standards Development8
  • 2.3. Quantum-Resistant Algorithms
  • 2.4. Crypto-Agility

3. QUANTUM KEY DISTRIBUTION

  • 3.1. In Theory
  • 3.2. Practical Applications
  • 3.3. Deployment Challenges
  • 3.4. Market Commercialization

4. VENDOR ECOSYSTEM

  • 4.1. CipherQ
  • 4.2. Crypta Labs
  • 4.3. CryptoExperts
  • 4.4. ID Quantique
  • 4.5. ISARA
  • 4.6. MagiQ Technologies.
  • 4.7. Post-Quantum Solutions
  • 4.8. Qubitekk
  • 4.9. QuintessenceLabs
  • 4.10. QuNu Labs
  • 4.11. SecureRF

RELATED RESEARCH