Optimize IAS
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
      • Prelims Test Series 2025
    • CSE Integrated Guidance 2025
      • ARJUNA PRIME 2025
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
  • Portal Login
  • Home
  • About Us
  • Courses
    • Prelims Test Series
      • LAQSHYA 2026 Prelims Mentorship
      • Prelims Test Series 2025
    • CSE Integrated Guidance 2025
      • ARJUNA PRIME 2025
    • Mains Mentorship
      • Arjuna 2026 Mains Mentorship
  • Portal Login

POST QUANTUM CRPTOGRAPHY

  • December 6, 2020
  • Posted by: OptimizeIAS Team
  • Category: DPN Topics
No Comments

Subject: Science & tech

Concept:

  • Classical computers use classical bits that can take the value 0 or 1, allowing for a binary system to be set up and the lowest level of computer language is done manipulating these bits.
  • A Quantum Computer uses qubit on the other hand can exist as a superposition of two states 0 and 1. So if you have an n-qubit number, it can exist as a superposition of 2n states. This also allows for immense amount of parallel processing.
  • Post quantum cryptography – a field which deals with additional possibilities offered by a quantum system, which goes beyond being able to break the integer factor code.

Enter lattices

  • One of the main contenders for a mathematical problem that is hard for the quantum computer to crack is the so-called shortest vector problem.
  • This involves lattices. Lattices are regular arrangement of points in space; examples in nature include honeycombs and all crystalline solids, like common salt.
  • A line of regularly spaced points is a lattice in one dimension, and a crystal of salt is a three-dimensional lattice. Mathematically, we can extend this construction to 5, 10 or even 500 dimensions.
  • At this magnitude, it becomes in theory a “hard” problem for a quantum computer to calculate the shortest vector from one point to any other point. This problem can therefore be used to construct “locks” that can even withstand a quantum attack.
  • Post Quantum Cryptography provides new methods to construct such encryption schemes which are secure against quantum computers.
POST QUANTUM CRPTOGRAPHY Science and tech

Recent Posts

  • Daily Prelims Notes 23 March 2025 March 23, 2025
  • Challenges in Uploading Voting Data March 23, 2025
  • Fertilizers Committee Warns Against Under-Funding of Nutrient Subsidy Schemes March 23, 2025
  • Tavasya: The Fourth Krivak-Class Stealth Frigate Launched March 23, 2025
  • Indo-French Naval Exercise Varuna 2024 March 23, 2025
  • No Mismatch Between Circulating Influenza Strains and Vaccine Strains March 23, 2025
  • South Cascade Glacier March 22, 2025
  • Made-in-India Web Browser March 22, 2025
  • Charting a route for IORA under India’s chairship March 22, 2025
  • Mar-a-Lago Accord and dollar devaluation March 22, 2025

About

If IAS is your destination, begin your journey with Optimize IAS.

Hi There, I am Santosh I have the unique distinction of clearing all 6 UPSC CSE Prelims with huge margins.

I mastered the art of clearing UPSC CSE Prelims and in the process devised an unbeatable strategy to ace Prelims which many students struggle to do.

Contact us

moc.saiezimitpo@tcatnoc

For More Details

Work with Us

Connect With Me

Course Portal
Search