{"title":"安全与抗量子密钥交换密码方法的比较","authors":"Smita Bansod, L. Ragha","doi":"10.1109/irtm54583.2022.9791580","DOIUrl":null,"url":null,"abstract":"The field of Cybersecurity methods and algorithms looks like a huge ocean. The selection of suitable methods is a challenging job based on the application. In the light of emerging new technologies, the selected cryptographic algorithm should be compatible with the new technology. This study helps in the selection of the appropriate key exchange cryptography method for a given application which requires secured communication. The strong, efficient, fast and quantum safe method chosen should further be analyzed, tested and verified for providing the desired throughput under heavy load conditions. The vulnerability of major cryptography algorithms to security attacks by Quantum algorithms is discussed in this study. The security level status of a few popular cryptography methods are compared with the post quantum resistant method of cryptography.","PeriodicalId":426354,"journal":{"name":"2022 Interdisciplinary Research in Technology and Management (IRTM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secured and Quantum Resistant Key Exchange Cryptography Methods – A Comparison\",\"authors\":\"Smita Bansod, L. Ragha\",\"doi\":\"10.1109/irtm54583.2022.9791580\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The field of Cybersecurity methods and algorithms looks like a huge ocean. The selection of suitable methods is a challenging job based on the application. In the light of emerging new technologies, the selected cryptographic algorithm should be compatible with the new technology. This study helps in the selection of the appropriate key exchange cryptography method for a given application which requires secured communication. The strong, efficient, fast and quantum safe method chosen should further be analyzed, tested and verified for providing the desired throughput under heavy load conditions. The vulnerability of major cryptography algorithms to security attacks by Quantum algorithms is discussed in this study. The security level status of a few popular cryptography methods are compared with the post quantum resistant method of cryptography.\",\"PeriodicalId\":426354,\"journal\":{\"name\":\"2022 Interdisciplinary Research in Technology and Management (IRTM)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Interdisciplinary Research in Technology and Management (IRTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/irtm54583.2022.9791580\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Interdisciplinary Research in Technology and Management (IRTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/irtm54583.2022.9791580","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secured and Quantum Resistant Key Exchange Cryptography Methods – A Comparison
The field of Cybersecurity methods and algorithms looks like a huge ocean. The selection of suitable methods is a challenging job based on the application. In the light of emerging new technologies, the selected cryptographic algorithm should be compatible with the new technology. This study helps in the selection of the appropriate key exchange cryptography method for a given application which requires secured communication. The strong, efficient, fast and quantum safe method chosen should further be analyzed, tested and verified for providing the desired throughput under heavy load conditions. The vulnerability of major cryptography algorithms to security attacks by Quantum algorithms is discussed in this study. The security level status of a few popular cryptography methods are compared with the post quantum resistant method of cryptography.