nec-license
search
⌘Ctrlk
Computerchevron-downCivilchevron-downMechchevron-downElectricalchevron-downArchichevron-downLoksewa GK IQ
nec-license
  • Introduction
  • General Subject(Paper I)
    • Part (I) General Awareness & General Ability Test
    • Part (II) General Technical Subject
  • Technical Subject(Paper II)
    • Part (I) :- Subjects
    • Part (II) Technical Writing
  • Top Organizations
    • IT
    • NRB
      • NRB - 6th
        • Paper I (Information Technology – I)
        • Paper II (Information Technology – II)
        • Paper III (IT Security)
          • Introduction
          • 1. Fundamentals of Information Security / Cybersecurity
          • 2. Network and System Security
          • 3. Software and Application Security
          • 4. Security Models and Architecture
          • 5. Cryptography
            • 5.1 Introduction to Cryptography
            • 5.2 Symmetric Key Cryptography
            • 5.3 Asymmetric Key Cryptography
            • 5.4 Key Exchange and Number Theory
            • 5.5 Message Authentication and Digital Signatures
            • 5.6 Quantum Security
          • 6. Hacking Techniques, Tools, and Incident Handling
          • 7. Information Security and IS Risk Management
          • 8. Information Security Law, Regulations, Policies, and Best Practices
      • NRB - 5th
    • NEA
    • CAAN
    • NTC
    • NOC
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Top Organizationschevron-right
  2. NRBchevron-right
  3. NRB - 6thchevron-right
  4. Paper III (IT Security)chevron-right
  5. 5. Cryptography

5.6 Quantum Security

Previous5.5 Message Authentication and Digital Signatureschevron-leftNext6. Hacking Techniques, Tools, and Incident Handlingchevron-right