Post-kvanttisalausten standardoinnin nykytilanne

Nykyisten salausmenetelmien turvallisuus on asetettu kyseenalaiseksi kvanttitietokoneiden kehityksen myötä. Vuonna 1994 Peter Shor kehitti algoritmin, joka kykenee murtamaan nykyiset salausmenetelmät riittävän tehokkaan kvanttitietokoneen avulla. Tämä kehityssuunta on herättänyt huolta asiantuntijoi...

Täydet tiedot

Bibliografiset tiedot
Päätekijä: Seppänen, Edvard
Muut tekijät: Informaatioteknologian tiedekunta, Faculty of Information Technology, Informaatioteknologia, Information Technology, Jyväskylän yliopisto, University of Jyväskylä
Aineistotyyppi: Kandityö
Kieli:fin
Julkaistu: 2024
Aiheet:
Linkit: https://jyx.jyu.fi/handle/123456789/96693
_version_ 1826225812187119616
author Seppänen, Edvard
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_facet Seppänen, Edvard Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Seppänen, Edvard Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä
author_sort Seppänen, Edvard
datasource_str_mv jyx
description Nykyisten salausmenetelmien turvallisuus on asetettu kyseenalaiseksi kvanttitietokoneiden kehityksen myötä. Vuonna 1994 Peter Shor kehitti algoritmin, joka kykenee murtamaan nykyiset salausmenetelmät riittävän tehokkaan kvanttitietokoneen avulla. Tämä kehityssuunta on herättänyt huolta asiantuntijoiden keskuudessa. Vastauksena tietoturvan uusiin tarpeisiin useat kansainväliset standardointiorganisaatiot ovat ryhtyneet kehittämään uusia standardeja. NIST (National Institute of Standards and Technology) järjesti viiden vuoden kilpailun sopivien salausalgoritmien löytämiseksi. NIST valitsi neljä algoritmia 82 eri kilpailevan algoritmin joukosta, jotka se sisällytti omiin luonnosvaiheen standardeihin. Lukuisat muut merkittävät kansainväliset standardointiorganisaatiot harkitsevat näiden post-kvanttiturvallisten salausalgoritmien integroimista omiin standardeihin. Standardointiprosessin odotetaan jatkuvan tulevina vuosina. Onnistunut siirtyminen post-kvanttisalauksiin voi olla maailmanlaajuisesti ratkaiseva tekijä tietoturvallisuuden kannalta The security of current encryption methods has been called into question by the development of quantum computers. In 1994, Peter Shor developed an algorithm capable of breaking existing encryption methods with a sufficiently powerful quantum computer. This development has raised concerns among experts. Several standardisation organisations around the world are developing standards to meet future security needs. NIST (National Institute of Standards and Technology) organised a five-year competition to find suitable encryption algorithms. NIST selected four algorithms from 82 different competing algorithms to include in its own draft standards. Several other major international standards organizations are considering integrating these post-quantum security cryptographic algorithms into their standards. The standardisation process is expected to continue in the coming years. A successful transition to post-quantum encryption can be a decisive factor for information security worldwide.
first_indexed 2024-08-21T20:07:38Z
format Kandityö
free_online_boolean 1
fullrecord [{"key": "dc.contributor.advisor", "value": "Tiihonen, Timo", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Sepp\u00e4nen, Edvard", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2024-08-21T05:42:06Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2024-08-21T05:42:06Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2024", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/96693", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Nykyisten salausmenetelmien turvallisuus on asetettu kyseenalaiseksi kvanttitietokoneiden kehityksen my\u00f6t\u00e4. Vuonna 1994 Peter Shor kehitti algoritmin, joka kykenee murtamaan nykyiset salausmenetelm\u00e4t riitt\u00e4v\u00e4n tehokkaan kvanttitietokoneen avulla. T\u00e4m\u00e4 kehityssuunta on her\u00e4tt\u00e4nyt huolta asiantuntijoiden keskuudessa. Vastauksena tietoturvan uusiin tarpeisiin useat kansainv\u00e4liset standardointiorganisaatiot ovat ryhtyneet kehitt\u00e4m\u00e4\u00e4n uusia standardeja. NIST (National Institute of Standards and Technology) j\u00e4rjesti viiden vuoden kilpailun sopivien salausalgoritmien l\u00f6yt\u00e4miseksi. NIST valitsi nelj\u00e4 algoritmia 82 eri kilpailevan algoritmin joukosta, jotka se sis\u00e4llytti omiin luonnosvaiheen standardeihin. Lukuisat muut merkitt\u00e4v\u00e4t kansainv\u00e4liset standardointiorganisaatiot harkitsevat n\u00e4iden post-kvanttiturvallisten salausalgoritmien integroimista omiin standardeihin. Standardointiprosessin odotetaan jatkuvan tulevina vuosina. Onnistunut siirtyminen post-kvanttisalauksiin voi olla maailmanlaajuisesti ratkaiseva tekij\u00e4 tietoturvallisuuden kannalta", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "The security of current encryption methods has been called into question by the development of quantum computers. In 1994, Peter Shor developed an algorithm capable of breaking existing encryption methods with a sufficiently powerful quantum computer. This development has raised concerns among experts. Several standardisation organisations around the world are developing standards to meet future security needs. NIST (National Institute of Standards and Technology) organised a five-year competition to find suitable encryption algorithms. NIST selected four algorithms from 82 different competing algorithms to include in its own draft standards. Several other major international standards organizations are considering integrating these post-quantum security cryptographic algorithms into their standards. The standardisation process is expected to continue in the coming years. A successful transition to post-quantum encryption can be a decisive factor for information security worldwide.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Paivi Vuorio (paelvuor@jyu.fi) on 2024-08-21T05:42:06Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2024-08-21T05:42:06Z (GMT). No. of bitstreams: 0\n Previous issue date: 2024", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "64", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "Post-kvanttisalaus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kvanttilaskenta", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "NIST", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Shorin algoritmi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Groverin algoritmi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "PQC", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "Post-kvanttistandardointi.", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Post-kvanttisalausten standardoinnin nykytilanne", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202408215587", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "602", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "algoritmit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "salaus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietotekniikka", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kvanttitietokoneet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "standardointi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "standardit", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kryptografia", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
id jyx.123456789_96693
language fin
last_indexed 2025-02-18T10:56:21Z
main_date 2024-01-01T00:00:00Z
main_date_str 2024
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstreams\/c5799164-ea93-4e62-8de0-db5926e133c0\/download","text":"URN:NBN:fi:jyu-202408215587.pdf","source":"jyx","mediaType":"application\/pdf"}
publishDate 2024
record_format qdc
source_str_mv jyx
spellingShingle Seppänen, Edvard Post-kvanttisalausten standardoinnin nykytilanne Post-kvanttisalaus kvanttilaskenta NIST Shorin algoritmi Groverin algoritmi PQC Post-kvanttistandardointi. Tietotekniikka Mathematical Information Technology 602 algoritmit salaus tietoturva tietotekniikka kvanttitietokoneet standardointi standardit kryptografia
title Post-kvanttisalausten standardoinnin nykytilanne
title_full Post-kvanttisalausten standardoinnin nykytilanne
title_fullStr Post-kvanttisalausten standardoinnin nykytilanne Post-kvanttisalausten standardoinnin nykytilanne
title_full_unstemmed Post-kvanttisalausten standardoinnin nykytilanne Post-kvanttisalausten standardoinnin nykytilanne
title_short Post-kvanttisalausten standardoinnin nykytilanne
title_sort post kvanttisalausten standardoinnin nykytilanne
title_txtP Post-kvanttisalausten standardoinnin nykytilanne
topic Post-kvanttisalaus kvanttilaskenta NIST Shorin algoritmi Groverin algoritmi PQC Post-kvanttistandardointi. Tietotekniikka Mathematical Information Technology 602 algoritmit salaus tietoturva tietotekniikka kvanttitietokoneet standardointi standardit kryptografia
topic_facet 602 Groverin algoritmi Mathematical Information Technology NIST PQC Post-kvanttisalaus Post-kvanttistandardointi. Shorin algoritmi Tietotekniikka algoritmit kryptografia kvanttilaskenta kvanttitietokoneet salaus standardit standardointi tietotekniikka tietoturva
url https://jyx.jyu.fi/handle/123456789/96693 http://www.urn.fi/URN:NBN:fi:jyu-202408215587
work_keys_str_mv AT seppänenedvard postkvanttisalaustenstandardoinninnykytilanne