Amidst the rise of quantum computing, the objective of post-quantum cryptography is to create cryptographic schemes that are resistant to both classical and quantum computers. As cloud computing is extensively utilized globally for data transmission and retention, enhancing security schemes periodically becomes imperative. In this master's thesis, we will explore the impact of post-quantum cryptography on various widespread technologies, with a primary focus on cloud computing. This will be achieved through a multifaceted approach: firstly, by analyzing available scientific papers on the topic, and secondly, by comparing and contrasting these findings. Finally, we will engage in a critical discussion regarding the interplay between post-quantum cryptography and cloud technologies. In conclusion, we will outline potential avenues for future research in both of these fields.

The impact of post-quantum cryptography on cloud computing

Makasheva, Teili
2024/2025

Abstract

Amidst the rise of quantum computing, the objective of post-quantum cryptography is to create cryptographic schemes that are resistant to both classical and quantum computers. As cloud computing is extensively utilized globally for data transmission and retention, enhancing security schemes periodically becomes imperative. In this master's thesis, we will explore the impact of post-quantum cryptography on various widespread technologies, with a primary focus on cloud computing. This will be achieved through a multifaceted approach: firstly, by analyzing available scientific papers on the topic, and secondly, by comparing and contrasting these findings. Finally, we will engage in a critical discussion regarding the interplay between post-quantum cryptography and cloud technologies. In conclusion, we will outline potential avenues for future research in both of these fields.
2024-07-18
File in questo prodotto:
File Dimensione Formato  
893308-1283273.pdf

accesso aperto

Tipologia: Altro materiale allegato
Dimensione 1.46 MB
Formato Adobe PDF
1.46 MB Adobe PDF Visualizza/Apri

I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14247/24101