NEWS: 公告在東京證券交易所JASDAQ標準市場新上市

市場調查報告書

量子運算的時代的加密技術

Cryptography in the Quantum Computing Era

出版商 ABI Research 商品編碼 569152
出版日期 內容資訊 英文 27 Pages, 8 Tables, 1 Figure
商品交期: 最快1-2個工作天內
價格
如有價格方面的疑問請按下「詢問」鍵來信查詢
量子運算的時代的加密技術 Cryptography in the Quantum Computing Era
出版日期: 2017年10月23日內容資訊: 英文 27 Pages, 8 Tables, 1 Figure
簡介

在資訊理論的領域,活用量子力學的成果,這個50年間達成了大幅度的成長。並且現在,以量子理論為基礎量子運算的實用化為目標,在全球各國透過公私合作推動研究開發。另一方面,若量子運算發展,容易突破傳統的加密技術,對應量子電腦 (或有抗性的) 加密技術的開發很緊迫。

本報告提供量子運算的時代的新加密技術的應有狀態相關分析,量子運算的特徵,其對傳統的加密技術帶來的影響,新的加密技術 (密碼鑰匙作成、經銷技術)的概要,主要供應商的配合措施情形等調查。

第1章 量子運算的登場

  • 瀕臨危機的加密技術
  • 理論成為現實時
  • 新的擴充軍備競爭

第2章 後量子密碼

  • 密碼的閱讀和理解
  • 技術規格的研究、開發
  • 在量子電腦中有抗性的演算法
  • 加密方式的指定

第3章 量子金鑰傳輸

  • 理論上的估計
  • 實際的活用狀況
  • 普及再生手的課題
  • 市場上的實用化

第4章 供應商的生態系統

  • CipherQ
  • Crypta Labs
  • CryptoExperts
  • ID Quantique
  • ISARA
  • MagiQ Technologies.
  • Post-Quantum Solutions
  • Qubitekk
  • QuintessenceLabs
  • QuNu Labs
  • SecureRF

相關分析

目錄
Product Code: AN-2477

QUANTUM COMPUTING TO COME OF AGE

Quantum mechanics, the branch of physics dealing with elementary particles at the atomic level and the revolutionary principles of superposition and entanglement, has come a long way from the discovery of the initial fundamentals in the early nineteenth century. The field of quantum computing has since emerged from the physics, finding theoretical application in modern computation systems.

Research in quantum computing is closely tied to the discipline of information theory, a mathematical concept concerned with communication, coding, and encryption, pioneered by the likes of Turing, von Neumann, and Shannon in the mid-twentieth century. Various applications of quantum information theory were developed in the last 50 years, and laboratory testing has shown promise in converting some of the theories into reality. As a result, quantum computing has been high on the research agenda of governments and tech organizations worldwide.

In a quantum computing model, the basic unit of information is called the quantum bit (qubit), which can be represented by photons, for example (the quantum equivalent of binary digits in classical computing). Using qubits and quantum gates (a type of logic gate), the development of a quantum circuit model of computation has been made possible, enabling the use of algorithms to theoretically solve highly complex mathematical problems in a much shorter time frame than is currently possible.

Over the years, researchers have managed to develop improved hardware with ever lower error rates per quantum gate that can carry out arbitrarily long quantum computations. Quantum computing and information theory could therefore create powerful computers, capable of staggering processing speeds and incredibly accurate measurements, as well as enabling the foundation of a highly secure communication infrastructure. However, this same type of power presents dangers as well in that it could just as easily break many of the cryptographic technologies in use today.

CRYPTOGRAPHY IN DANGER

In 1994, Peter Shor developed an algorithm capable of efficient quantum factorization of large prime numbers. Prime numbers underpin the encryption algorithms used in public key infrastructures (PKI). Such algorithms are secure today because such factorization (decomposition) is practically impossible, even using supercomputers. But Shor's algorithm, if applied using a quantum computer, could easily crack even the latest, most complex asymmetric encryption algorithms, such as elliptic curve cryptography (ECC).

Table of Contents

1. QUANTUM COMPUTING TO COME OF AGE

  • 1.1. Cryptography in Danger
  • 1.2. When Theory Becomes Reality
  • 1.3. A New Arms Race

2. POST-QUANTUM CRYPTOGRAPHY

  • 2.1. Breaking Encryption
  • 2.2. Research and Standards Development8
  • 2.3. Quantum-Resistant Algorithms
  • 2.4. Crypto-Agility

3. QUANTUM KEY DISTRIBUTION

  • 3.1. In Theory
  • 3.2. Practical Applications
  • 3.3. Deployment Challenges
  • 3.4. Market Commercialization

4. VENDOR ECOSYSTEM

  • 4.1. CipherQ
  • 4.2. Crypta Labs
  • 4.3. CryptoExperts
  • 4.4. ID Quantique
  • 4.5. ISARA
  • 4.6. MagiQ Technologies.
  • 4.7. Post-Quantum Solutions
  • 4.8. Qubitekk
  • 4.9. QuintessenceLabs
  • 4.10. QuNu Labs
  • 4.11. SecureRF

RELATED RESEARCH