How long can public key encryption stay secure? introducing the implications of the Riemann Hypothesis and quantum computing

Mo Adda, Amanda Peart, A. McKeever

Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

174 Downloads (Pure)

Abstract

As the power of computing increases, public key cryptography adapts by increasing the size of the prime numbers used by the underlying cryptographic algorithms. Public-key algorithms have been in use since the 1970s, but how long can these algorithms remain secure? In light of the emergence of quantum computing together with the prospect that the Riemann Hypothesis has been proved, this paper will investigate the possible impact on the security of current encryption algorithms. If these theoretical technological advancements become reality, what will be necessary to maintain the security of the global system? It is imperative that the security of communication is not compromised. Therefore to overcome the problem of the exponential increase in computational power of quantum computing is to use it to bolster the potential insecurities of current algorithms by developing a cryptographic system based on quantum mechanics. The Quantum Key Exchange approach demonstrates the strength of such a system. It is believed from our current understanding of quantum physics that this method is very secure and that an eavesdropper cannot intercept the key without both sender and receiver having knowledge that the key had been compromised, as the polarization will have been altered. The limitation with this system is if the intruder has connected to the channel before the communication has begun, neither sender nor receiver will be aware of the interception. Current encryption algorithms will not remain secure permanently; therefore it is essential that to maintain a secure system that cryptology constantly evolve. There are many technologies that could be used in cryptology but either of the advancements above could destroy the safeguards of current methods.
Original languageEnglish
Title of host publicationComputer science and information system
EditorsP. Petratos, D. Michalopoulos
Place of PublicationAthens, Greece
PublisherAtiner
Pages135-143
Number of pages9
ISBN (Print)9608867231
Publication statusPublished - 2005
EventInternational Conference on Computer Science & Information Systems - Athens, Greece
Duration: 16 Jun 200518 Jun 2005

Conference

ConferenceInternational Conference on Computer Science & Information Systems
Country/TerritoryGreece
CityAthens
Period16/06/0518/06/05

Fingerprint

Dive into the research topics of 'How long can public key encryption stay secure? introducing the implications of the Riemann Hypothesis and quantum computing'. Together they form a unique fingerprint.

Cite this