In this paper, we evaluate the crypto resistance of known cryptographic methods and methods based on the use of noise-like signals, similar in properties to "limited" white noise and used to spread spectrum of transmitted messages, to the destructive effect of "viewing transmitted data" (decipher), based on the search of code structures (brute force), in the case of quantum computers. It’s established that the required value of the number of code structures (key space), taking into account the constantly improving and developing computing power of quantum computers, for the next few years should be considered a value of 1032 of the number of code structures (key space) and higher, providing crypto resistance for a minimum of 3 years. It’s shown that the Grover algorithm is similar to the destructive effect of "viewing transmitted data" (decipher), based on a complete search of all code structures (brute force) using modern super- computers. It’s established that well-known symmetric cryptographic methods can potentially be used in the post-quantum era and methods based on noise-like signals potentially, provided they are detected and aware of the methods underlying them (without knowledge of the key), cannot be applied in the post-quantum era. According to the authors, a promising approach in the post-quantum era for information security issues is the use of chaotic signals.
quantum computers, crypto resistance, number of code structures (key space), full search (brute force), information security