Giuseppe Caruso
Post-quantum algorithms support in Trusted Execution Environment.
Rel. Antonio Lioy. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2024
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (2MB) | Preview |
Abstract
With the advent of quantum computing numerous are the benefits and advancements introduced in several fields, but it also poses significant threats to cybersecurity. Current cryptosystems are endangered, given the quantum capabilities that this new technology exploits to perform computation and one of the most critical areas regards the public-key algorithms used, as they are susceptible to attacks due to the existence of Shor's algorithm, which can efficiently factorise large numbers and compute discrete logarithms, security's foundation of these algorithms. Recognizing the need for post-quantum (PQ) security, the National Institute of Standards and Technology (NIST) has issued a Call for Proposals to standardize algorithms that can provide security against both traditional and quantum computers.
Furthermore, the confidential computing concept has also made significant advancements in the last years
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Corso di laurea
Classe di laurea
URI
![]() |
Modifica (riservato agli operatori) |
