Quantum key distribution technologies promise information-theoretic security and are currently being deployed in com-mercial applications. We review new frontiers in information security technologies in communications and distributed storage applications with the use of classical, quantum, hybrid classical-quantum, and post-quantum cryptography. We analyze the cur-rent state-of-the-art, critical characteristics, development trends, and limitations of these techniques for application in enterprise information protection systems. An approach concerning the selection of practical encryption technologies for enterprises with branched communication networks is discussed.
Topics
Quantum information
REFERENCES
1.
P.W.
Shor
, SIAM J. Comput.
26
, 1484
(1997
).2.
3.
Quantum Safe Cryptography V1.0.0 (2014-10). ETSI White Paper.
4.
C.R.
Monroe
, R.J.
Schoelkopf
, and M.D.
Lukin
, Sci. Am.
314
, 50
(2016
).5.
C.E.
Shannon
, Bell Syst. Tech. J.
27
, 379
(1948
).6.
M.N.
Wegman
and J.L.
Carter
, J. Comp. Syst. Sci.
22
, 265
(1981
).7.
N.
Gisin
, G.
Ribordy
, W.
Tittel
, and H.
Zbinden
, Rev. Mod. Phys.
74
, 145
(2002
).8.
ID Quantique
, www.idquantique.com9.
D.J.
Bernstein
, Introduction to post-quantum cryptography (Springer-Verlag Berlin Heidelberg
, 2009
).10.
E.O.
Kiktenko
, A.S.
Trushechkin
, Y.V.
Kurochkin
, and A.K.
Fedorov
, J. Phys. Conf. Ser.
741
, 012081
(2016
).11.
E.O.
Kiktenko
, A.S.
Trushechkin
, C.C.W.
Lim
, Y.V.
Kurochkin
, and A.K.
Fedorov
, Phys. Rev. Applied
8
, 044017
(2017
).12.
V.
Scarani
, H.
Bechmann-Pasquinucci
, N.J.
Cerf
, M.
Dusek
, N.
Lütkenhaus
, and M.
Peev
, Rev. Mod. Phys.
81
, 1301
(2009
).13.
14.
15.
D.J.
Lum
, M.S.
Allman
, T.
Gerrits
, C.
Lupo
, V.B.
Verma
, S.
Lloyd
, S.W.
Nam
, and J.C.
Howell
, Phys. Rev. A
94
, 022315
(2016
).16.
17.
A.
Herzberg
, S.
Jarecki
, H.
Krawczyk
, and M.
Yung
, Lect. Notes Comp. Sci.
963
, 339
(1995
).18.
19.
E.O.
Kiktenko
, N.O.
Pozhar
, M.N.
Anufriev
, A.S.
Trushechkin
, R.R.
Yunusov
, Y.V.
Kurochkin
, A.I.
Lvovsky
, and A.K.
Fedorov
, arXiv:1705.09258.
This content is only available via PDF.
© 2018 Author(s).
2018
Author(s)