Journal "Software Engineering"
a journal on theoretical and applied science and technology
ISSN 2220-3397
Issue N7-8 2019 year
Every year quantum computing and quantum computer becomes more and more actual topic of the world scientific researches. In case of its appearance such а device will be able to compromise most of the asymmetric schemes used today. To ensure а proper level of security in single-key (symmetric) schemes and hash functions organizations will have to use so long keys and hash values, respectively, that will make it impossible to realize such schemes in real information and communication systems. The post-quantum cryptography began to rapidly develop after the sensational appearance of quantum Shors algorithm in 1994. This direction includes a number of approaches, however from the authors point of view, the most promising approach is a lattices-based cryptography. Unfortunately, in the Russian literature there are very few manuals devoted to post-quantum cryptography, in particular the lattice theory. The goal of this article is to fill this gap. The article deals with the main provisions, definitions and main lattice problems. The background information about the history as well as the latest trends is given. The studied question is relevant because the most part of popular cryptographic protocols, schemes and algorithms based on the number theory will become unsecure in the case of the quantum computer appearance.