Pietro Mazza
Temporal Resource Comparison Between Classical Asymmetric Cryptosystems and Post-Quantum Alternatives.
Rel. Danilo Bazzanella, Andrea Balistreri, Giulia Bracco. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2025
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (1MB) | Preview |
Abstract
The study examines the temporal efficiency of cryptographic schemes amid the accelerating advances in quantum computing capabilities and the consequent threat to the security foundations of modern asymmetric cryptography. Driven by the rapid evolution of quantum hardware and the prospect of large-scale quantum attacks on widely deployed public-key infrastructures, the objective is to quantify performance implications associated with transitioning from conventional asymmetric algorithms to the post-quantum alternatives selected through NIST’s extensive standardization process. To this end, a comprehensive review of current asymmetric systems is first conducted, covering underlying hardness assumptions such as integer factorization and discrete logarithms in various algebraic groups, typical parameter selections for RSA and elliptic-curve schemes, and practical deployment characteristics including key-generation costs, encryption/encapsulation and decryption/decapsulation latencies, signature-generation and verification times, memory footprints, and side-channel considerations under classical threat models.
Foundations of quantum computation—qubit representation, superposition, entanglement, and quantum circuit abstractions—are then introduced to frame how Shor’s polynomial-time algorithms for factorization and discrete logarithms and Grover’s quadratic-speedup for unstructured search undermine these assumptions, with attention to theoretical complexity reductions and projected quantum-resource requirements
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Corso di laurea
Classe di laurea
Aziende collaboratrici
URI
![]() |
Modifica (riservato agli operatori) |
