Future trends of cryptography

Where will be the cryptography after few decades?

Not like in the past, modern technologies become modified very quickly. Because there are more resources to exploit in this era to make things change and modify according to the world's needs. And the whole of the world accepts that the country that has more new technological assets and people who can handle those new technologies are the key things to be a powerful country. Because of that, the same thing also will happen to cryptography. After the arrival of quantum computing, there will be a lot of changes in the computer fields. Since those quantum computers are the ones which very powerful and can go beyond any kinds of technological power now we have. So, according to those things the power of all the other assets should be modified, otherwise, there will be lots of problems. Hence there will be a new cryptography method that will be suitable for quantum computing and it will rock the world.  



Elliptic Curve Cryptography (ECC) is a cryptographic method that has been already invented. But it is still being tested in labs and not yet available for general use because its advantages and disadvantages are not yet fully examined. Normally, ECC uses the same type of algorithms as the Diffie-Hellman Key Exchange and RSA encryption. But the difference is, the numbers are chosen from the finite field combined with elliptic curve expression. Although it is very fast, it should prove its safety and speed to get accepted for commercial, governmental, and private use.



Quantum computation is a method that performs through a quantum computer or processer. It is used quantum phenomena, such as quantum superposition and quantum entanglement.   Likewise, modern computers store data using the bit, which is 1 and 0, the computation also uses bit by bit fashion. But quantum computers store data using the quantum superposition of multiple states. And these multivalued states are stored in “quantum bits” or “qubits”. This makes the computation of numbers faster than the older processors. This quantum computation is being developed by scientists and not yet has reached the performance level which modern processors have.  And people fear that one day these quantum computers will break modern cryptographic algorithms. Because these modern methods only have the capabilities to stay unbreakable against modern computer power. Then it will be a challenge for modern cryptographic methods and there will be more powerful full cryptographic methods that suit quantum computers. Scientists predict that this well-developed quantum computer will take less than 17 seconds to break the RSA method. And it will compute any calculation within few hours or few days which typically takes billions of years to compute.



Honey encryption is a different kind of encryption mechanism which cheats the attacker with fake data. It is being developed by Ari Juels and Thomas Ristenpart. It offers a bunch of fake data which looks like real data, whenever someone enters a wrong password. So, the attacker cannot be able to justify whether these data are fake or not.  But the problem is how to offer fake data instead of real data. If it will become successful, then it will reduce the threat surface in our data.


Digital signature is a technology we have already experience many years. But we expect lots of new Changements will happen for this technology. It will have new and more secure methods to verify the sender, so, the non-repudiation can be mitigated by using this new featured method. Although it has new and strong secured features, it will take less time to generate a digital signature for a document, transaction, or contract. Then it will be beneficial for all the users by working efficiently and securely.


All the credits of these images go to their original owners.     

Comments

  1. Keep up the good work❤

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete

Post a Comment

Popular posts from this blog

Introduction to Cryptography

Ancient Cryptography

GDPR (General Data Protection Regulation)