# Exploring Quantum-Resistant Encryption

UniAPT's focus on quantum-resilient encryption stems from the need to prepare for the advent of quantum computing, which poses a significant threat to conventional cryptographic algorithms. Our project incorporates research and implementation of cryptographic methods that are believed to be resistant to quantum computing attacks.

**Key Aspects of Quantum-Resilient Encryption**

**Key Aspects of Quantum-Resilient Encryption**

**Implementation Strategy**

**Implementation Strategy**

**Quantum-Resilient Encryption Implementation Table**

**Quantum-Resilient Encryption Implementation Table**

**Core Problem (Shortest Vector Problem - SVP)**

**Core Problem (Shortest Vector Problem - SVP)**

**Mathematical Representation**:**Quantum Resistance**: The complexity of solving SVP scales exponentially with lattice dimension, making it infeasible for quantum computers.

**Security of Hash Functions**

**Security of Hash Functions**

**Mathematical Representation**:**Quantum Resistance**: Hash functions are considered quantum-resistant because finding a collision requires a brute-force search, which, even with a quantum computer, would only be quadratically faster than classical computers.

**Mathematical Background**

**Mathematical Background**

**Lattice-Based Cryptography**: The security of lattice-based systems often relies on the hardness of the Shortest Vector Problem (SVP) or the Closest Vector Problem (CVP).**Hash-Based Cryptography**: Uses cryptographic hash functions to create one-time signatures.

The diagram above represents the Quantum-Resilient Encryption Workflow in UniAPT’s project. It visually outlines the sequential stages of how data is processed using quantum-resilient encryption methods. The workflow can be described as follows:

**Data Input**: The initial stage where raw or plaintext data is received as input.**Lattice-Based Encryption**: In this stage, the data undergoes encryption using lattice-based cryptographic methods. This step ensures that the data is secured against potential quantum computing threats by leveraging the hardness of lattice problems.**Hash-Based Encryption**: Following lattice-based encryption, the data is further processed with hash-based cryptographic methods, adding an additional layer of security and ensuring the integrity of the data.**Encrypted Data Storage**: Once encrypted, the data is stored securely. This storage is designed to be safe from both conventional and quantum decryption attempts.**Data Use/Transmission**: The encrypted data is either used within the system or transmitted to its intended destination. The encryption ensures that the data remains secure during transmission or usage.**Decryption Process**: At the receiving end or when the data needs to be used, it undergoes a decryption process. This step reverses the encryption using the corresponding decryption algorithms, ensuring that only authorized parties can access the original data.**Data Output**: The final stage where the decrypted data is output for authorized use, completing the encryption-decryption cycle.

This workflow demonstrates UniAPT's commitment to data security, particularly in preparing for the era of quantum computing, by implementing advanced quantum-resilient encryption techniques.

Last updated