Cryptology
Context: as one of the more mature scientific sub-areas within PACs, cryptographic algorithms are an essential tool to protect data, both at rest and in transit. Algorithms can be dimensionalised in several ways, for example in separating algorithms that ensure confidentiality of data, versus those that establish the data’s authenticity and integrity; algorithms can also be distinguished by symmetric approaches where senders and receivers share the same key, versus asymmetric methods where one key is made public and the other remains private (more commonly known as public key algorithms). Cryptographic hash functions support generation of a short string that determines if potentially much larger file is authentic; and can also be used for other functions such as password protection.
Challenge – Technical Gaps: Several ENISA reports have provided detailed technical assessments of available cryptography algorithms [ENISA13], identifying several weaknesses in legacy approaches that are still used. However much progress has been made in developing more complex algorithms leveraging simpler predecessors as a base. Key innovation improvements in the area are being driven by demands from next generation computing such as IoT, for example development of ultra-lightweight cryptography providing low power consumption, low latency and high-speeds, as well as mitigating concerns that future developments in quantum computing would render existing cryptographic algorithms ineffective, regardless of key lengths employed.
References:
[ENISA13] Recommended cryptographic measures - Securing personal data, ENISA report, https://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/recommended-cryptographic-measures-securing-personal-data
Return to SOTA
