Cryptographic algorithms
Mathematical procedures used to secure information via encryption, decryption, or authentication.
Core Classifications
- Symmetric-key-algorithms: Utilizes a single shared key for both encryption and decryption (e.g., AES).
- Asymmetric-key-algorithms: Uses a public/private key pair (e.g., RSA, ECC); highly vulnerable to future quantum-based cryptanalysis.
- Hash-functions: One-way mathematical transformations used to ensure data integrity (e.g., SHA-256).
Post-Quantum Cryptography (PQC)
The development of cryptographic primitives designed to remain secure against the computational power of quantum-computing.
- Post-quantum encryption (PQC) is a critical area of research and development.
- Focused on addressing the security threats posed by the evolution of quantum-computing to existing digital security frameworks.
- Reference: Post-Quantum Cryptography: Addressing Quantum Computer Threats to Digital Security (via Computerphile).