Cryptographic algorithms

Mathematical procedures used to secure information via encryption, decryption, or authentication.

Core Classifications

  • Symmetric-key-algorithms: Utilizes a single shared key for both encryption and decryption (e.g., AES).
  • Asymmetric-key-algorithms: Uses a public/private key pair (e.g., RSA, ECC); highly vulnerable to future quantum-based cryptanalysis.
  • Hash-functions: One-way mathematical transformations used to ensure data integrity (e.g., SHA-256).

Post-Quantum Cryptography (PQC)

The development of cryptographic primitives designed to remain secure against the computational power of quantum-computing.

  • Post-quantum encryption (PQC) is a critical area of research and development.
  • Focused on addressing the security threats posed by the evolution of quantum-computing to existing digital security frameworks.
  • Reference: Post-Quantum Cryptography: Addressing Quantum Computer Threats to Digital Security (via Computerphile).