National Repository of Grey Literature 5 records found  Search took 0.00 seconds. 
Quantum-safe cryptography
Hovanová, Tatiana ; Člupek, Vlastimil (referee) ; Zeman, Václav (advisor)
This bachelor thesis deals with the possibilities of quantum computatutions and their use in cryptanalytic algorithms. The introductory chapters are devoted to explaining the basic concepts of quantum theory and quantum operations. Part of the thesis describes effects, that affect DiVincenzo’s criteria, such as superposition, quantum entanglement, quantum interference, decoherence, and quantum error correction. The current quantum computer chapter deals with the current stage of the quantum computer development by IBM, D-Wave and Intel. Shor’s and Grover’s algorithm are described from cryptoanalytical algorithms, and their impact on security is also described. Post-quantum cryptography is represented by cryptosystems from four basic directions: hash-based cryptography (Lamport’s scheme, Merkle’s scheme), cryptography based on coding theory (McEliece cryptosystem), grid-based cryptography (NTRU cryptosystem) and cryptography based on polynomial equations (stream cipher QAUD). The next part of the thesis is devoted to the design of a web-based educational application that includes, among other things, laboratory tasks demonstrating the current possibilities of quantum circuits. The website explains the principles of selected operations, cryptosystems and algorithms in the form of animations. The first laboratory task deals with the introduction to quantum computations. It contains five partial tasks explaining the basics of quantum operation (Hadamard, X-rotation, Z-rotation, Y-rotation, etc.). The second task includes instructions for constructing the Grover’s algorithm using the Quirk simulator.
Quantum-based cryptography methods
Pajtinová, Mária ; Hajný, Jan (referee) ; Zeman, Václav (advisor)
Bachelor's thesis analyzes quantum-based cryptography methods, specially there are described mostly used transport protocols of QC based on open communication channel. These methods are practically explained by simulation program, that is included. In another section, corporations research concerned on quantum cryptography and communication are performed.
Quantum cryptography
Turčanová, Klára ; Dejdar, Petr (referee) ; Münster, Petr (advisor)
The bachelor thesis focuses on quantum cryptography. In the theoretical part, there is an analysis of secure key distribution in the fiber-optic infrastructure. Methods such as quantum key distribution (QKD) or physical layer secret key generation for fiber-optic networks are analyzed, including a description of the security and technical limitations of the methods. The thesis also attempts to interpret some basic principles of the optic infrastructure used in QKD. In addition to the distribution of keys, the thesis also tries to approximate the basic principles of the optic infrastructure used in QKD and, last but not least, post-quantum cryptography (including a comparison with quantum cryptography and current protocols). In the practical part, the effect of the macrobending of the fiber and the reflectivity of the connectors on the operation of the quantum system was demonstrated. It was also demonstrated that temperature and light acting on the QKD optic infrastructure do not have a fundamental effect.
Quantum-safe cryptography
Hovanová, Tatiana ; Člupek, Vlastimil (referee) ; Zeman, Václav (advisor)
This bachelor thesis deals with the possibilities of quantum computatutions and their use in cryptanalytic algorithms. The introductory chapters are devoted to explaining the basic concepts of quantum theory and quantum operations. Part of the thesis describes effects, that affect DiVincenzo’s criteria, such as superposition, quantum entanglement, quantum interference, decoherence, and quantum error correction. The current quantum computer chapter deals with the current stage of the quantum computer development by IBM, D-Wave and Intel. Shor’s and Grover’s algorithm are described from cryptoanalytical algorithms, and their impact on security is also described. Post-quantum cryptography is represented by cryptosystems from four basic directions: hash-based cryptography (Lamport’s scheme, Merkle’s scheme), cryptography based on coding theory (McEliece cryptosystem), grid-based cryptography (NTRU cryptosystem) and cryptography based on polynomial equations (stream cipher QAUD). The next part of the thesis is devoted to the design of a web-based educational application that includes, among other things, laboratory tasks demonstrating the current possibilities of quantum circuits. The website explains the principles of selected operations, cryptosystems and algorithms in the form of animations. The first laboratory task deals with the introduction to quantum computations. It contains five partial tasks explaining the basics of quantum operation (Hadamard, X-rotation, Z-rotation, Y-rotation, etc.). The second task includes instructions for constructing the Grover’s algorithm using the Quirk simulator.
Quantum-based cryptography methods
Pajtinová, Mária ; Hajný, Jan (referee) ; Zeman, Václav (advisor)
Bachelor's thesis analyzes quantum-based cryptography methods, specially there are described mostly used transport protocols of QC based on open communication channel. These methods are practically explained by simulation program, that is included. In another section, corporations research concerned on quantum cryptography and communication are performed.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.