• Home
  • E-cash
  • E-Idendity
  • Plus
    • Home
    • E-cash
    • E-Idendity
  • Connectez-vous
  • Créer un compte

  • Réservations
  • Mon compte
  • Connecté en tant que :

  • filler@godaddy.com


  • Réservations
  • Mon compte
  • Se déconnecter

Connecté en tant que :

filler@godaddy.com

  • Home
  • E-cash
  • E-Idendity

Compte


  • Réservations
  • Mon compte
  • Se déconnecter


  • Connectez-vous
  • Réservations
  • Mon compte

Secure Hash

what is it and how it works ?

an electronic signature that is aimed at preventing the modification of documents to fight the power of quantum computers

a secret shared with the recipient is mixed to the document

the secret may be a one time key shared by both the sender and the recipient

A hash of the document mixed to the secret is computed and encrypted

this guarentees the identity of the sender

the document and the encrypted hash are sent


Why is it secure ?

even with a powerful quantum computer that can forge a document

as the neither the hashed document  nor the encyption key that should be  replicated are known .

When used with One Time keys

as, being used once,  the one time key used for hash encyption can not be guessed , even with a quantum computer. 



How big are the keys

33 bits keys and secrets can be used

 will lead to an odd of  1/ 8 500  000   000 for a forged document not  to be  detected as such.

How many keys can I fit on a memory card

a  1Gbyte card can fit  8bn  33bit keys, enough to power transactions with or e-cash system for  150 million devices.


What can it be used for ?

e-mails

the process can be used to secure emails between the client and the mail server.

file storage

Files can be stored and their integrity checked .

web sites securing

Web pages integrity ,  including their embeded  pictures,  can be checked while being downloaded.


What are the other quantum safe encryptions and signatures ?

Encryptions

  to be quantum safe, the encryption key needs to be made of Qbits as otherwise, a quantum computer may compute at once all the encryptions of a document with all possible keys, save for one bit that remains set for instance to zero , store them in a quantum memory, and then check whether the official document encryption is comprised in the quantum memory. It can thus find out all the bits of the encryption key one by one, whereas, with a quantum key, this mechanism is not possible. 

complex algorithms

  However an  encryption algorithm that would need considerably more Qbits than present quantum computers have to recompute the secret keys could be considered as momentarily quantum safe.  

Signatures

 Traditionally, signatures are made of encrypted hash of a file. This method would need to apply an encryption of the hash with a quantum key to be quantum safe.

patents FR3092923B1 - US20210165914A1 US11956367B2 US20200351100A1 US11914754B2 US20240111717A1 JP2022521525A

Optimisé par

  • Quantum Safe Hash
  • Secured OTK
  • Secured QKD
  • Entangled Photons Trans
  • Photonic Radar
  • Secure Data Transmission
  • Teleportation
  • Indoor GPS
  • OTK Distribution
  • Spying Protection
  • Photonic Router

Ce site Web utilise les cookies.

Nous utilisons des cookies pour analyser le trafic du site Web et optimiser votre expérience du site. Lorsque vous acceptez notre utilisation des cookies, vos données seront agrégées avec toutes les autres données utilisateur.

RefuserAccepter