Goodbye to John Napier and Hello to Robert McEliece

--

Many of our public key methods are based on discrete logarithms and which build on the theories created by the John Napier. Bitcoin, Tor, smart cards, Wif-fi, and many other applications use discrete logarithms. But these methods, and other public key methods, are at risk from quantum computers. One contender is the McEliece Cryptography method, and which has reached the final round for the NIST competition for PCQ (Post Quantum Cryptography):

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.