Kvanttilaskenta ja salausmenetelmät

Kvanttilaskenta ja Shorin algoritmi rikkovat useita nykyisin yleisessä käytössä olevia julkisen avaimen salausmenetelmiä, kuten RSA-menetelmän. Tässä tutkielmassa tarkastellaan kvanttilaskennan vaikutusta salausmenetelmiin sekä erityisesti salausmenetelmiä, jotka ovat murtamattomia myös kvanttilaske...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Vanas, Linus
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Kandityö
Kieli:fin
Julkaistu: 2019
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/64461
_version_ 1826225803825774592
author Vanas, Linus
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Vanas, Linus Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Vanas, Linus Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Vanas, Linus
datasource_str_mv jyx
description Kvanttilaskenta ja Shorin algoritmi rikkovat useita nykyisin yleisessä käytössä olevia julkisen avaimen salausmenetelmiä, kuten RSA-menetelmän. Tässä tutkielmassa tarkastellaan kvanttilaskennan vaikutusta salausmenetelmiin sekä erityisesti salausmenetelmiä, jotka ovat murtamattomia myös kvanttilaskennalla. Koodipohjainen McEliecen salausmenetelmä on turvallisuuden puolesta vakuuttavin vaihtoehto RSA-menetelmän korvaajaksi. NTRU-salausmenetelmä ja Lyubashevskyn allekirjoitusjärjestelmä käyttävät hiloihin liittyviä kvanttilaskennallakin vaikeita tehtäviä. Yksisuuntaisia funktiota, kuten hajautusfunktioita, voidaan käyttää kvanttilaskennan kestävänä allekirjoitusjärjestelmänä Lamportin kehittämällä ja Merklen parantamalla menetelmällä. Tällä hetkellä monet organisaatiot pyrkivät standardisoimaan kvanttilaskennalla murtumattomia salausmenetelmiä. Quantum computing and Shor's algorithm break several encryption methods currently in use. In this thesis, the effect of quantum computing to encryption methods and encryption methods that are unbroken even with quantum computing are studied. McEliece's code-based encryption is the most confidence-inspiring alternative. The NTRU-encryption method and the Lyubashevsky signature system use lattice-related problems that are computationally difficult even for a quantum computer. One-way functions, like hash functions, can be used as a quantum-proof signature system by using a method developed by Lamport and improved by Merkle. Several organizations are currently in the process of standardizing quantum-resistant encryption methods.
first_indexed 2019-08-19T08:21:11Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "M\u00f6nk\u00f6l\u00e4, Sanna", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Vanas, Linus", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2019-06-10T08:34:32Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2019-06-10T08:34:32Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2019", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/64461", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Kvanttilaskenta ja Shorin algoritmi rikkovat useita nykyisin yleisess\u00e4\nk\u00e4yt\u00f6ss\u00e4 olevia julkisen avaimen salausmenetelmi\u00e4, kuten RSA-menetelm\u00e4n. T\u00e4ss\u00e4 tutkielmassa tarkastellaan kvanttilaskennan vaikutusta salausmenetelmiin sek\u00e4 erityisesti salausmenetelmi\u00e4, jotka ovat murtamattomia my\u00f6s kvanttilaskennalla. Koodipohjainen McEliecen salausmenetelm\u00e4 on turvallisuuden puolesta vakuuttavin vaihtoehto RSA-menetelm\u00e4n korvaajaksi. NTRU-salausmenetelm\u00e4 ja Lyubashevskyn allekirjoitusj\u00e4rjestelm\u00e4 k\u00e4ytt\u00e4v\u00e4t hiloihin liittyvi\u00e4 kvanttilaskennallakin vaikeita teht\u00e4vi\u00e4. Yksisuuntaisia funktiota, kuten hajautusfunktioita, voidaan k\u00e4ytt\u00e4\u00e4 kvanttilaskennan kest\u00e4v\u00e4n\u00e4 allekirjoitusj\u00e4rjestelm\u00e4n\u00e4 Lamportin kehitt\u00e4m\u00e4ll\u00e4 ja Merklen parantamalla menetelm\u00e4ll\u00e4. T\u00e4ll\u00e4 hetkell\u00e4 monet organisaatiot pyrkiv\u00e4t standardisoimaan kvanttilaskennalla murtumattomia salausmenetelmi\u00e4.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Quantum computing and Shor's algorithm break several encryption methods currently in use. In this thesis, the effect of quantum computing to encryption methods and encryption methods that are unbroken even with quantum computing are studied. McEliece's code-based encryption is the most\nconfidence-inspiring alternative. The NTRU-encryption method\nand the Lyubashevsky signature system use lattice-related problems that are computationally difficult even for a quantum computer. One-way functions, like hash functions, can be used as a quantum-proof signature system by using a method developed by Lamport and improved by Merkle. Several organizations are currently in the process of standardizing quantum-resistant encryption methods.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2019-06-10T08:34:32Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2019-06-10T08:34:32Z (GMT). No. of bitstreams: 0\n Previous issue date: 2019", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "21", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "kvanttilaskenta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "salausmenetelm\u00e4t", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "digitaaliset allekirjoitukset", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kvanttilaskenta ja salausmenetelm\u00e4t", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201906103093", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "s\u00e4hk\u00f6inen allekirjoitus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kryptologia", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kryptografia", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_64461
language fin
last_indexed 2025-02-18T10:54:20Z
main_date 2019-01-01T00:00:00Z
main_date_str 2019
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/43463927-7f11-4a9c-b4a2-ff4a3e2a3318\/download","text":"URN:NBN:fi:jyu-201906103093.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2019
record_format qdc
source_str_mv jyx
spellingShingle Vanas, Linus Kvanttilaskenta ja salausmenetelmät kvanttilaskenta salausmenetelmät digitaaliset allekirjoitukset Tietotekniikka Mathematical Information Technology 602 salaus sähköinen allekirjoitus kryptologia kryptografia
title Kvanttilaskenta ja salausmenetelmät
title_full Kvanttilaskenta ja salausmenetelmät
title_fullStr Kvanttilaskenta ja salausmenetelmät Kvanttilaskenta ja salausmenetelmät
title_full_unstemmed Kvanttilaskenta ja salausmenetelmät Kvanttilaskenta ja salausmenetelmät
title_short Kvanttilaskenta ja salausmenetelmät
title_sort kvanttilaskenta ja salausmenetelmät
title_txtP Kvanttilaskenta ja salausmenetelmät
topic kvanttilaskenta salausmenetelmät digitaaliset allekirjoitukset Tietotekniikka Mathematical Information Technology 602 salaus sähköinen allekirjoitus kryptologia kryptografia
topic_facet 602 Mathematical Information Technology Tietotekniikka digitaaliset allekirjoitukset kryptografia kryptologia kvanttilaskenta salaus salausmenetelmät sähköinen allekirjoitus
url https://jyx.jyu.fi/handle/123456789/64461 http://www.urn.fi/URN:NBN:fi:jyu-201906103093
work_keys_str_mv AT vanaslinus kvanttilaskentajasalausmenetelmät