COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Quantum cryptography
|
|
Symmetric-key cryptography
|
|
Post-quantum cryptography
|
|
Asymmetric-key cryptography
|
|
Public-key cryptography
|
Detailed explanation-1: -Experts predict that large-scale quantum computers capable of breaking current algorithms could be available by the end of the decade. Encrypted data stored today could also be decrypted later using quantum computers, so it is important to move to quantum-safe solutions.
Detailed explanation-2: -The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks.
Detailed explanation-3: -Post-quantum cryptography, also known as quantum encryption, is the development of cryptographic systems for classical computers that can prevent attacks launched by quantum computers.
Detailed explanation-4: -Post Quantum cryptography is catching up and different types of cryptosystems such as multivariate, elliptic curves, lattices, isogenies, hash, hybrid based signatures are grabbing attention in academia and NIST. McEliece with Goppa codes is the reliable cryptosystem.