








Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
The implications of quantum computing on traditional cryptography systems. It discusses how hypothetical quantum computers have the potential to crack widely used encryption algorithms such as rsa, diffie-helman key exchange, and elliptic curve cryptography. The document also introduces the concept of the hidden kernel problem and its relationship to quantum algorithms. Furthermore, it explains how quantum mechanics can be used to design secure key exchange protocols.
Typology: Slides
1 / 14
This page cannot be seen from the preview
Don't miss anything!
2
All well studied computationally-secure crypto-systems cracked with hypothetical quantum computers ( Q = QUANTUM below)
Rabin cracked
RSA cracked
Dlog hash function cracked
El-Gamal cracked
Diffie-Helman key exchange cracked
Elliptic curve cryptography cracked
4
THM: If a QPT algorithm exists for carrying out the transformation U for a given ψ, then there is a QPT algorithm for solving the associated hidden kernel problem for ψ. For a proof see [Nielsen & Chuang §5.4.3] Necessary condition: For this to make sense, U needs to be carried out by a quantum algorithm, so must be a unitary transformation. LEMMA: U is a unitary transformation.
5
INPUT: Prime p , primitive , any OUTPUT: ψ for which solving Hidden-Kernel gives d = Use index-calculus. Let I = {indices mod p - 1 } =
Z
p − 1
∗ p
∗ p
!
Z ∗ p
x
y
x
dy
= {( x , y ) |! x + dy = 1 } = subgroup generated by (− d , 1 )
x
y
7
STAGE 2) Order of a is the generator of following kernel K :
H = image of ψ in
K = ker(ψ) = subgroup generated by ord( a ) Z Z ∗ n
x
8
Using Heisenberg’s uncertainty principle can design a key exchange protocol provably secure against eavesdropping. Basic set-up:
10
Suppose require k expected rand. secret bits.
Alice prepares 8 k random secret bits.
First 4 k rand. bits represent random phases
Second 4 k bits represent spins
Alice prepares and transmits 4 k photons: 1 0 1 1 0 1 0 0 1 0 1 1 0 1 1 1 0 1 0 0 0 1 0 0 1 0 1 1 0 1 0 0 1 0 1 1 ×^ +^ ×^ ×^ +^ ×^ +^ +^ ×^ +^ ×^ × 0 1 1 1 0 1 0 0 0 1 0 0 × + × × + × + + × + × ×
11
Prepares 4 k random phases:
Reads Alice’s photons with respect to phase guesses:
Sends his phase-guess information to Alice:
13
Bob checks the detection bits against his corresponding measurements:
If all bits agree, sends “ACCEPT” signal and uses remaining error-free bits for shared key: K = “ 100” **? 1 1?? 1? 0 0? 0?
14
If Eve observed quantum channel, when she guesses the wrong phase has 50% probability of re-transmitting the wrong bit (e.g. guesses alternating phases “+×+×...”)
Eve has 50% prob. of guessing wrong phase for each detection bit.
Bob has 25% prob. of detecting wrong bit, per eavesdropped bit. If so sends “FAIL” 0 1 1 1 0 1 0 0 0 1 0 0 × + × × + × + + × + × ×