Summary
In this chapter, we analyzed Q-Cryptography. After introducing the basic principles of Q-Mechanics and the fundamental bases of this branch of science, we took a deep dive into QKD.
After that, we explored the potential of quantum computing and Shor’s algorithm. This algorithm is a candidate for wiping out a great part of classical cryptography when it comes to implementing a quantum computer that will get enough qubits to boost its power against the factorization problem.
Finally, we saw the candidate algorithms for so-called post-Q-Cryptography; among them, we saw AES (Advanced Encryption Standard), SHA (Secure Hash Algorithm), and NTRU (N-th Degree Truncated Polynomial Ring Units).
With that, you have learned what Q-Cryptography is and how it is implemented. You have also learned what quantum computing is and, in particular, became familiar with a very disruptive algorithm that you can implement in a quantum machine: Shor’s algorithm.
Finally...