A tétel áttekintő adatai

Szerző
dc.contributor.author
Koczka Ferenc
Elérhetőség dátuma
dc.date.accessioned
2021-10-08T07:21:15Z
Rendelkezésre állás dátuma
dc.date.available
2021-10-08T07:21:15Z
Kiadás
dc.date.issued
2020
Issn
dc.identifier.issn
2786-0744
Issn
dc.identifier.issn
2498-5392
Uri
dc.identifier.uri
http://hdl.handle.net/20.500.12944/16744
Kivonat
dc.description.abstract
In ensuring the operation of an IT system, it is essential to maintain the data’s confidentiality and integrity, which is based on some encryption processes. Encryption procedures are based on algorithms, the theory of which is given by cryptography. Due to their complexity, they are often hardly understandable not only to an average person but also to the majority of professionals who are familiar with IT. The algorithms used are not eternal; various designs or implementation errors or even performance gains from computer hardware improvements make one time high achieving algorithms obsolete and easily hackable. Strong algorithms can be circumvented in alternative ways, the necessary software and hardware infrastructure can already be built from personal computing devices. I tested its effectiveness on two different password databases: with the success of hacking university passwords, I prove that it is possible to circumvent strong algorithms with simple methods. Modern encryption algorithms have a relatively long life cycle and they become obsolete slowly. The construction of the quantum computer creates a new situation, which requires a number of procedures to be eliminated and its parameters to be modified or protected by additional methods. As it is an impossible task to modernise the encryption algorithms of all IT systems operating today, preparations must be started as soon as possible so that the new situation can be handled, at least for critical systems. In my article, I would like to draw attention to the weaknesses of encryption methods, present a possible method of circumventing the cryptographic methods currently in use, demonstrate the operation of a quantum computer and some algorithms relevant to the topic.hu_HU
Nyelv
dc.language.iso
enhu_HU
Kiadó
dc.publisher
Ludovika Egyetemi Kiadóhu_HU
Kulcsszó
dc.subject
encryptionhu_HU
Kulcsszó
dc.subject
hash codehu_HU
Kulcsszó
dc.subject
password securityhu_HU
Kulcsszó
dc.subject
crackhu_HU
Kulcsszó
dc.subject
quantum computerhu_HU
Cím
dc.title
Security of Encryption Procedures and Practical Implications of Building a Quantum Computerhu_HU
Típus
dc.type
Folyóiratcikkhu_HU
Változat
dc.description.version
kiadóihu_HU
Doi azonosító
dc.identifier.doi
10.32565/aarms.2020.3.1
Folyóirat
dc.identifier.journalTitle
AARMShu_HU
Évfolyam
dc.identifier.journalVolume
19hu_HU

dc.identifier.page
5-22hu_HU
Füzetszám
dc.identifier.journalIssueNumber
3hu_HU


A tételhez tartozó fájlok

Security of Encryption Procedures and Practical Implications of Building a Quantum Computer
 
 

Ez a tétel a következő gyűjteményekben található meg

A tétel áttekintő adatai

Tallózás a gyűjteményekben

Kategóriák és gyűjtemények
Megjelenés dátuma
Szerző
Cím
Tárgyszó
Feltöltés dátuma
Közszolgálati Online LexikonMagyary ArchívumLudovika Gyűjtemény