Part 1. Grover s s Algorithm. Quantum Computing. The Grover, Shor,, and Deutsch-Jozsa. Algorithms. This work is supported by: Samuel J. Lomonaco, Jr.

Size: px
Start display at page:

Download "Part 1. Grover s s Algorithm. Quantum Computing. The Grover, Shor,, and Deutsch-Jozsa. Algorithms. This work is supported by: Samuel J. Lomonaco, Jr."

Transcription

1 uantum Computing Samuel J. Lomonaco, Jr. Dept. o Comp. Sci.. & Electrical Engineering University o Maryland Baltimore County Baltimore, MD 5 Lomonaco@UMBC.EDU Webage: Overview Four Talks Elementary A Rosetta Stone or uantum Computation Three uantum Algorithms uantum idden Subgroup Algorithms An Entangled Tale o uantum Entanglement Lecture Three uantum Algorithms The Grover, Shor,, and Deutsch-Jozsa Algorithms Samuel J. Lomonaco, Jr. Dept. o Comper Science & Electrical Engineering University o Maryland Baltimore County Baltimore, MD 5 Lomonaco@UMBC.EDU Webage: Advanced This work is supported by: The Deense Advance Research rojects Agency (DARA & Air Force Research Laboratory (AFRL, Air Force Materiel Command, USAF Agreement umber F The ational Institute or Standards and Technology (IST. The Mathematical Sciences Research Institute (MSRI. art Grover s s Algorithm L-O-O- The L-O-O- L Fund.

2 Grover s s Algorithm Searching or a eedle in a aystack Samuel J. Lomonaco, Jr. Dept. o Comper Science & Electrical Engineering University o Maryland Baltimore County Baltimore, MD 5 Lomonaco@UMBC.EDU Webage: This work is supported by: The Deense Advance Research rojects Agency (DARA & Air Force Research Laboratory (AFRL, Air Force Materiel Command, USAF Agreement umber F The ational Institute or Standards and Technology (IST. The Mathematical Sciences Research Institute (MSRI. L-O-O- The L-O-O- L Fund. Lomonaco, Samuel J., Jr., Grover s s uantum Search Algorithm,, in AMS SAM/58, (, pages 8 9. Grover s s Algorithm Finding a eedle in a aystack Consider a large unstructured database consisting o = n records labeled in random order by the integers integers,,,, E.g., the database could be stored as a linked list ead Record Record #%*!*# %#*!#* On average, we have to retrieve inding the label x. / ence, the average computational work is computational steps Record *!#%*# labels beore O( This is a practical Searching problem that appears a hone in many Book guises For example, consider a city phone book containing phone numbers. Find the name associated with the phone number x = ( The best classical algorithm or inding the associated name, say Jane Doe,, would search through / phone numbers on average beore inding the name Jane Doe. In other words, it would take on average computational steps. O More ormally, we are given a unction { } { } :,,,,, called an Oracle,, such that ( x i x = x ( YES = Otherwise YES ( O By calling it an Oracle,, we mean that we do not have immediate access to all argument- unction pairs (,. The Oracle is simply a blackbox,, which we can query as many times as we like by inputting a number x, and then observing the resulting output ( x. But each such query comes with an associated computational $$cost$$. x x ( x

3 The Search roblem or an Unstructured Database is: To ind the record labeled as x with the minimum amount o computational $$work$$, i.e., with the minimum number o queries o the oracle. Another Example Consider a plaintext/ciphertext attack by brute orce key search on a message encrypted with the Data Encryption Standard (DES, where the key K is a 56 bit number Given the plaintext/ciphertext pair laintext Ciphertext TheStolenGoldIsiddenAt xjepwvziderkqldievmsfk crack the entire cipher by encrypting the plaintext TheStolenGoldIsiddenAt with each o the keys,,,. 56 -, in turn, until the key K is ound that produces the ciphertext xjepwvziderkqldievmsfk In other words, i (, C denotes the available plaintext/ciphertext pair, and i then the Oracle is ( K K denotes the key such that (, DES K = = C i K = K Otherwise Mission Impossible Assignment Your Mission Impossible assignment, should you choose to accept it, is to devise an algorithm which inds the label in steps. O( As always, should you ail, your lecturer will disavow any association with your activities. x Mission Impossible Assignment Lov Grover has accepted this Mission Impossible challenge, and has successully created an algorithm which inds the label x in O( steps, with a total computational work o O( log The uantum Mechanical erspective -D D ilbert space with orthonormal basis {,} n -D D ilbert space with orthonormal basis {,,,, } n = Oracle is given as a blackbox unitary transormation U U x y x ( x y 3

4 The uantum Mechanical erspective From the Oracle U x y x ( x y we construct the unitary transormation x x i x = x I ( x = ( x x = x x otherwise as ollows x ( x x U I I ote that x is an Inversion I = I x x, since x I x x x= x x x x i x= x = x otherwise Also please note that or any unit length ket I = I is an inversion about the hyperplane to, i.e., A A Mirror Image Transormation ilbert Space Let A A Mirror Relection Right Right yperplane Mirror Let roperties o I χ χ Deinition. Let, be unit length kets in s.t... Then (, χ { χ, } = Span = a + b a b is a vector space over lying in with a real inner product induced by the bracket in. ence, i, χ are linearly independent, then is a -D Euclidean plane lying in. Inversion by I roperties o I (, χ { χ, } = Span = a + b a b I & I χ leave the plane invariant roposition. The plane is invariant under the transormations I, I χ, i.e., I I χ S = S S = S I χ χ I 4

5 Let be a ket in perpendicular to, and let L denote the line in passing through the origin and to. Then I : S S Line L And moreover, i is a unit length vector in which is to, then I = I I And inally, i is a unit length ket in, and i U : is a unitary transormation, then Relection in line L UI U = I U Summary Given two unit kets and χ living in with χ real, there is a -D D plane (i.e., -D inner product space over living in spanned by and χ s.t. I ( S = S and I χ S = S S I a relection in is or the line L an inversion about I = I or all unitary transs UI U = I U U Overview o Grover s s Algorithm Step. (Initialization Step. = j k j= Loop until ( π k= π /4sin / 4 = I I x k k+ Step. Measure with respect to the standard basis,,, to obtain the marked unknown state x with probability / What s s Going On? It s s All About this icture Let be the adamard transorm given by where The Method in Lov s Madness : n = ( ( = L x L x x 5

6 Thus, we now have living in the -D D plane Step. x (, S = Span x (Initialization This step creates a superposition o all states, i.e., = j = j= Step. The Iteration Loop Each iteration rotates (in closer to x. Let x and be unit length kets in which are to x and, respectively. Let = Angle( x, L x L x x L x L Step. With each iteration (Cont. x k+ = x where = = x ( I I I I = I I = I I = I I is the product o two inversions. k x x x x Theorem But, So, L x L x x L& L Linesin L L = point O Re Re = Rot = L L Angle ( L, L = cos x + sin x k So, = cos[ ( + ] + sin [( + ] k x k x = cos [( + ] + sin [( + ] k k x k x We seek to iterate until sin k + possible. [ ] But what is? is as large as In other words, we seek the smallest positive integer k = K such that ( k + is as close as possible to π /. This turns out to be k K π / ( = = L x L But what is? Recall that = Angle( x, We ind is complementary to x x by noting that the angle = Angle x, i.e., + = π / (, 6

7 Since = π( x + + Since ence, the number o iterations in O( Step. is π we have = x = cos = cos = sin ence, ( = sin / / π k = K = 4 and π /4sin ( / But each iteration uses the adamard transorm n = ( at the computational cost o O ( lg Since Step. is the computationaly dominant part o Grover s s algorithm, it ollows that the computational time complexity o this algorithm is O( lg The probability that the measurement perormed in Step. o Grover s s algorithm will successully retrieve the unknown label is given by x The robability o Success [( K ] robsuccess = sin + cos = Grover s s Algorithm Step. (Initialization Step. = j k j= Loop until ( π k= π /4sin / 4 = I I x k k+ Step. Measure with respect to the standard basis,,, to obtain the marked unknown state x with probability / The End o Grover s s Algorithm art Shor s Algorithm 7

8 Shor s Factoring Algorithm Samuel J. Lomonaco, Jr. Dept. o Comper Science & Electrical Engineering University o Maryland Baltimore County Baltimore, MD 5 Lomonaco@UMBC.EDU Webage: This work is supported by: The Deense Advance Research rojects Agency (DARA & Air Force Research Laboratory (AFRL, Air Force Materiel Command, USAF Agreement umber F The ational Institute or Standards and Technology (IST. The Mathematical Sciences Research Institute (MSRI. L-O-O- The L-O-O- L Fund. This talk is loosely based on the paper Lomonaco, Samuel J., Jr., Shor s uantum Factoring Algorithm,, in AMS SAM/58, (, pages A Crytanalyst s Dream I m m going to crack the RSA Cryto System by inding a Superast Factoring Algorithm!! I ll be rich & amous!!! Code Breaker roblem. Given an integer which is the product o two unknown primes p & q,, i.e., =pq, ind p and q, i.e., actor. Step. Step. Simpliied Shor s Algorithm Choose an integer a s.t. o the unction: x x = a mod gcd a, = Step 3. 3 I is not even, then goto Step. Step 4. 4 Use a uantum Computer to determine the period I is even, then / / a = a a + mod So use the Euclidean algorithm to compute / / ( a and cd( a +, gcd, g Step 5. 5 Simpliied I the above gcd s are & or q & p, then we have actored. I not, goto Step. p q 8

9 Step. Step. Simpliied Shor s Algorithm Choose an integer a s.t. gcd a, = Step 3. 3 I is not even, then goto Step. Step 4. 4 Use a uantum Computer to determine the period o the unction: I ( x = a x mod is even, then / / a = a a + mod So use the Euclidean algorithm to compute / / ( a and cd( a +, gcd, g uantum art o Algorithm {,,, } = ± ± The Integers roblem. Given a periodic unction : Find the period o. Choose a suiciently large positive integer, and restrict to the set S = {,,,, } and ocus on the restricted unction : S Simpliication. To avoid minor technicalities, we assume that is a multiple o, i.e.,, Choose an integer n s.t. < n & Max(< n Construct two n-qubit registers, i.e., Reg and Reg. Reg Reg = an an a bn bn b Arguments o Arguments o n a a a = a Convention. n n j= j For example, = 3 j The -oint Fourier Transorm ω = rimitive -th root o unity, e.g., e πi/ S {,,,, } = The Fourier Transorm is: where F : S : S y = x ω x Remark. We will implement transormation. F xy as a unitary Step.. Initialize = F Step.. Apply to Reg F I i j ω j j= j= = = j Step.. Let U be a unitary transormation ence, that Reg takes now j holds to all the j integers ( j. Apply U,,,., - in superposition U j x ( x j= j= Reg Reg = j= j ( j = j + j ( j + j j= j= j= j= = j + j ( j = j j + ( j j= j= 9

10 Step.3. Reg Reg = j j + ( j j= j= r {,,,, } Measure Reg rob(j rob(j =r =r =/ =/ Reg Reg = j+ r ( r j = Whoosh Whoosh! F Step.4. Apply to Reg F I ( j+ r k j+ r r ω k r j= j= k= ( j+ r k ω k But =! k= j = = ω rk k= j = k ( ω j ( r k ( r But! k j ( ω ence, j = / i y= mod / = otherwise Reg Re = rk ω k ( r k λ : λ=,,, = rλ ω λ ( r λ = g Step.4. r λ Reg Reg = ω λ ( r λ = Measure Reg rob( rob(λ=λ Reg Reg = λ ( r ence, we have obtained λ or some =λ =/ =/ Whoosh Whoosh! λ { },,, Repeat steps through 5 until there are enough multiples o / to recover /, and hence. Remark. We should remind the reader that the above description is a simpliication o Shor s actoring algorithm which contains most o the key eatures o the actual algorithm. A more detailed and thorough can be ound in the ollowing two papers: Shor s quantum actoring algorithm,, in uantum Computation, AMS SAM/58, (, pages 6-79 uantum idden Subgroup Algorithms: A Mathematical espective,, in uantum Computation and Inormation, AMS COM/35, (, pages

11 The End o Shor s Algorithm art 3 The Deutsch-Jozsa Algorithm The Deutsch-Jozsa Algorithm Samuel J. Lomonaco, Jr. Dept. o Comp. Sci. & Electrical Engineering University o Maryland Baltimore County Baltimore, MD 5 Lomonaco@UMBC.EDU Webage: Deense Advanced Research rojects Agency (DARA & Air Force Research Laboratory, Air Force Materiel Command, USAF Agreement umber F This work is supported by: The Deense Advance Research rojects Agency (DARA & Air Force Research Laboratory (AFRL, Air Force Materiel Command, USAF Agreement umber F The ational Institute or Standards and Technology (IST The Mathematical Sciences Research Institute (MSRI. L-O-O- The L-O-O- Fund. Deutsch s s Algorithm Deinition.. A coin is air (or balanced i it has heads on one side and tails on the other side. It is unair (or constant i either it has tails on both sides, or heads on both sides. Side T T Side Fair (Balanced Side Side T Side T Side Unair (Constant Side Side Observation Observation. In the classical world, we need to observe both sides o the coin to determine whether or not it is air? But what about in the quantum world? Fair (Balanced Unair (Constant

12 We represent a coin mathematically as a Boolean unction: Side { } { } :,, Side T Let then The Unitary Implementation o U be the unitary transormation x U x y x ( x y U ( ( x x Moreover, U ( + ( ( ( + ( (. is air,, i.e., balanced ( ( ( ( Outpu t = i + =±. is unair,, i.e., constant ( ( ( + ( Output = + i =± Case. Case. ( ( So I we only make one observation, i.e., i we observe the let register, then we can determine whether or not is air or unair. uantum Computation: A Grand Mathematical Mathematical Challenge or the Twenty-First Century Century and the Millennium, Samuel J. Lomonaco, Jr. (editor, AMS SAM/58, (. The End

13 uantum Computation and Inormation, Samuel J. Lomonaco, Jr. and oward E. Brandt (editors, AMS COM/35, (. 3

11/16/2008 Quantum Computing Quantum Algorithms & Beyond D p e t p. of Comp. p S. c S i. &

11/16/2008 Quantum Computing Quantum Algorithms & Beyond D p e t p. of Comp. p S. c S i. & /6/28 uantum Computing? uantum s & Beyond amuel J. Lomonaco, Jr. Dept. of Comp. ci. & Electrical Engineering University of Maryland Baltimore County Baltimore, MD 225 Email: Lomonaco@UMBC.EDU Webage: http://www.csee.umbc.edu/~lomonaco

More information

Quantum Computing. Continuous Quantum Hidden Subgroup Algorithms. This work is in collaboration with. Louis H. Kauffman. Samuel J. Lomonaco, Jr.

Quantum Computing. Continuous Quantum Hidden Subgroup Algorithms. This work is in collaboration with. Louis H. Kauffman. Samuel J. Lomonaco, Jr. Quantum Computing amuel J. Lomonaco, Jr. Dept. of Comp. ci.. & Electrical Engineering University of Maryland Baltimore County Baltimore, MD 225 Email: Lomonaco@UMBC.EDU WebPage: http://www.csee.umbc.edu/~lomonaco

More information

Quantum Computing Lecture 6. Quantum Search

Quantum Computing Lecture 6. Quantum Search Quantum Computing Lecture 6 Quantum Search Maris Ozols Grover s search problem One of the two most important algorithms in quantum computing is Grover s search algorithm (invented by Lov Grover in 1996)

More information

WebPage: lomonaco A LECTURE ON SHOR S QUANTUM FACTORING ALGORITHM VERSION 1.1. Contents. 1. Preamble to Shor s algorithm

WebPage:   lomonaco A LECTURE ON SHOR S QUANTUM FACTORING ALGORITHM VERSION 1.1. Contents. 1. Preamble to Shor s algorithm Webage: http://www.csee.umbc.edu/ lomonaco A LECTURE ON SHOR S QUANTUM FACTORING ALGORITHM VERSION 1.1 SAMUEL J. LOMONACO, JR. Abstract. This paper is a written version of a one hour lecture given on eter

More information

Ma/CS 6a Class 4: Primality Testing

Ma/CS 6a Class 4: Primality Testing Ma/CS 6a Class 4: Primality Testing By Adam Sheffer Reminder: Euler s Totient Function Euler s totient φ(n) is defined as follows: Given n N, then φ n = x 1 x < n and GCD x, n = 1. In more words: φ n is

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Quantum Knots & Mosaics

Quantum Knots & Mosaics Quantum nots??? Quantum nots & Mosaics Samuel Lomonaco University of Maryland Baltimore County (UMBC) Email: Lomonaco@UMBC.edu Webage: www.csee.umbc.edu/~lomonaco L-O-O- This talk was motivated by a number

More information

arxiv:quant-ph/ v1 31 Mar 2004

arxiv:quant-ph/ v1 31 Mar 2004 Quantum Hidden Subgroup Algorithms: The Devil Is in the Details Samuel J. Lomonaco, Jr. a and Louis H. Kauffman b a Department of Computer Science and Electrical Engineering, University of Maryland arxiv:quant-ph/0403229v1

More information

Throughout this talk: Knot means either a knot or a link

Throughout this talk: Knot means either a knot or a link ??? Quantum nots??? Quantum nots & Mosaics Samuel Lomonaco University of Maryland Baltimore County (UMBC) Email: Lomonaco@UMBC.edu Webage: www.csee.umbc.edu/~lomonaco Throughout this talk: not means either

More information

C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21

C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21 C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21 1 Readings Benenti et al, Ch 310 Stolze and Suter, Quantum Computing, Ch 84 ielsen and Chuang, Quantum Computation and Quantum

More information

Grover Algorithm Applied to Four Qubits System

Grover Algorithm Applied to Four Qubits System www.ccsenet.org/cis Computer and Inormation Science Vol., No. ; May Grover Algorithm Applied to Four Qubits System Z. Sakhi (Corresponding author) Laboratory o Inormation Technology and Modelisation, and

More information

Quantum Computation and Communication

Quantum Computation and Communication Tom Lake tswsl1989@sucs.org 16/02/2012 quan tum me chan ics: The branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles - OED quan tum me

More information

Ma/CS 6a Class 4: Primality Testing

Ma/CS 6a Class 4: Primality Testing Ma/CS 6a Class 4: Primality Testing By Adam Sheffer Send anonymous suggestions and complaints from here. Email: adamcandobetter@gmail.com Password: anonymous2 There aren t enough crocodiles in the presentations

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Part II Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 13, 2011 Overview Outline Grover s Algorithm Quantum search A worked example Simon s algorithm

More information

Exercise Sheet Cryptography 1, 2011

Exercise Sheet Cryptography 1, 2011 Cryptography 1 http://www.cs.ut.ee/~unruh/crypto1-11/ Exercise Sheet Cryptography 1, 2011 Exercise 1 DES The Data Encryption Standard (DES) is a very famous and widely used block cipher. It maps 64-bit

More information

Lecture note 8: Quantum Algorithms

Lecture note 8: Quantum Algorithms Lecture note 8: Quantum Algorithms Jian-Wei Pan Physikalisches Institut der Universität Heidelberg Philosophenweg 12, 69120 Heidelberg, Germany Outline Quantum Parallelism Shor s quantum factoring algorithm

More information

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2 School of Mathematics Spring 017 QUANTUM COMPUTATION Exercise sheet 1 Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1. The quantum circuit model. (a) Consider the following quantum

More information

On High-Rate Cryptographic Compression Functions

On High-Rate Cryptographic Compression Functions On High-Rate Cryptographic Compression Functions Richard Ostertág and Martin Stanek Department o Computer Science Faculty o Mathematics, Physics and Inormatics Comenius University Mlynská dolina, 842 48

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013 1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Introduction to Quantum Information Processing

Introduction to Quantum Information Processing Introduction to Quantum Information Processing Lecture 6 Richard Cleve Overview of Lecture 6 Continuation of teleportation Computation and some basic complexity classes Simple quantum algorithms in the

More information

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut

More information

5199/IOC5063 Theory of Cryptology, 2014 Fall

5199/IOC5063 Theory of Cryptology, 2014 Fall 5199/IOC5063 Theory of Cryptology, 2014 Fall Homework 2 Reference Solution 1. This is about the RSA common modulus problem. Consider that two users A and B use the same modulus n = 146171 for the RSA encryption.

More information

Chapter 10. Quantum algorithms

Chapter 10. Quantum algorithms Chapter 10. Quantum algorithms Complex numbers: a quick review Definition: C = { a + b i : a, b R } where i = 1. Polar form of z = a + b i is z = re iθ, where r = z = a 2 + b 2 and θ = tan 1 y x Alternatively,

More information

An Architectural Framework For Quantum Algorithms Processing Unit (QAPU)

An Architectural Framework For Quantum Algorithms Processing Unit (QAPU) An Architectural Framework For Quantum s Processing Unit (QAPU) Mohammad Reza Soltan Aghaei, Zuriati Ahmad Zukarnain, Ali Mamat, and ishamuddin Zainuddin Abstract- The focus of this study is developing

More information

Factoring on a Quantum Computer

Factoring on a Quantum Computer Factoring on a Quantum Computer The Essence Shor s Algorithm Wolfgang Polak wp@pocs.com Thanks to: Eleanor Rieffel Fuji Xerox Palo Alto Laboratory Wolfgang Polak San Jose State University, 4-14-010 - p.

More information

The Deutsch-Jozsa Problem: De-quantization and entanglement

The Deutsch-Jozsa Problem: De-quantization and entanglement The Deutsch-Jozsa Problem: De-quantization and entanglement Alastair A. Abbott Department o Computer Science University o Auckland, New Zealand May 31, 009 Abstract The Deustch-Jozsa problem is one o the

More information

C/CS/Phys 191 Shor s order (period) finding algorithm and factoring 11/01/05 Fall 2005 Lecture 19

C/CS/Phys 191 Shor s order (period) finding algorithm and factoring 11/01/05 Fall 2005 Lecture 19 C/CS/Phys 9 Shor s order (period) finding algorithm and factoring /0/05 Fall 2005 Lecture 9 Readings Benenti et al., Ch. 3.2-3.4 Stolze and Suter, uantum Computing, Ch. 8.3 Nielsen and Chuang, uantum Computation

More information

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo CS 497 Frontiers of Computer Science Introduction to Quantum Computing Lecture of http://www.cs.uwaterloo.ca/~cleve/cs497-f7 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum

More information

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where Chapter 0 Quantum algorithms Complex numbers: a quick review / 4 / 4 Definition: C = { a + b i : a, b R } where i = Polar form of z = a + b i is z = re iθ, where r = z = a + b and θ = tan y x Alternatively,

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

Quantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity

Quantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity Quantum Computing 1. Quantum States and Quantum Gates 2. Multiple Qubits and Entangled States 3. Quantum Gate Arrays 4. Quantum Parallelism 5. Examples of Quantum Algorithms 1. Grover s Unstructured Search

More information

University of Tokyo: Advanced Algorithms Summer Lecture 6 27 May. Let s keep in mind definitions from the previous lecture:

University of Tokyo: Advanced Algorithms Summer Lecture 6 27 May. Let s keep in mind definitions from the previous lecture: University of Tokyo: Advanced Algorithms Summer 2010 Lecture 6 27 May Lecturer: François Le Gall Scribe: Baljak Valentina As opposed to prime factorization, primality testing is determining whether a given

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Shor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017

Shor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017 Shor s Algorithm Polynomial-time Prime Factorization with Quantum Computing Sourabh Kulkarni October 13th, 2017 Content Church Thesis Prime Numbers and Cryptography Overview of Shor s Algorithm Implementation

More information

A Gentle Introduction to Quantum Computing

A Gentle Introduction to Quantum Computing A Gentle Introduction to Quantum Computing Abdullah Khalid 01-10-0168 School of Science and Engineering Lahore University of Management Sciences Friday 3 rd June, 011 Contents 1 Introduction to Quantum

More information

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. ) Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson

More information

Abstract structure of unitary oracles for quantum algorithms

Abstract structure of unitary oracles for quantum algorithms Abstract structure o unitary oracles or quantum algorithms William Zeng 1 Jamie Vicary 2 1 Department o Computer Science University o Oxord 2 Centre or Quantum Technologies, University o Singapore and

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Part I Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 12, 2011 Overview Outline What is quantum computing? Background Caveats Fundamental differences

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Quantum Algorithms for Leader Election Problem in Distributed Systems

Quantum Algorithms for Leader Election Problem in Distributed Systems Quantum Algorithms for Leader Election Problem in Distributed Systems Pradeep Sarvepalli pradeep@cs.tamu.edu Department of Computer Science, Texas A&M University Quantum Algorithms for Leader Election

More information

6.896 Quantum Complexity Theory October 2, Lecture 9

6.896 Quantum Complexity Theory October 2, Lecture 9 6896 Quantum Complexity heory October, 008 Lecturer: Scott Aaronson Lecture 9 In this class we discuss Grover s search algorithm as well as the BBBV proof that it is optimal 1 Grover s Algorithm 11 Setup

More information

Introduction to Cryptology. Lecture 20

Introduction to Cryptology. Lecture 20 Introduction to Cryptology Lecture 20 Announcements HW9 due today HW10 posted, due on Thursday 4/30 HW7, HW8 grades are now up on Canvas. Agenda More Number Theory! Our focus today will be on computational

More information

Solution to Midterm Examination

Solution to Midterm Examination YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Handout #13 Xueyuan Su November 4, 2008 Instructions: Solution to Midterm Examination This is a closed book

More information

Grover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick

Grover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick Grover s algorithm Search in an unordered database Example: phonebook, need to find a person from a phone number Actually, something else, like hard (e.g., NP-complete) problem 0, xx aa Black box ff xx

More information

Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L.

Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L. Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models CS448J, Autumn 2015, Stanford University Dominik L. Michels Advanced Computation Models There is a variety of advanced

More information

Lattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n.

Lattices. A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices A Lattice is a discrete subgroup of the additive group of n-dimensional space R n. Lattices have many uses in cryptography. They may be used to define cryptosystems and to break other ciphers.

More information

Classical RSA algorithm

Classical RSA algorithm Classical RSA algorithm We need to discuss some mathematics (number theory) first Modulo-NN arithmetic (modular arithmetic, clock arithmetic) 9 (mod 7) 4 3 5 (mod 7) congruent (I will also use = instead

More information

In fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer.

In fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer. Attacks on RSA, some using LLL Recall RSA: N = pq hard to factor. Choose e with gcd(e,φ(n)) = 1, where φ(n) = (p 1)(q 1). Via extended Euclid, find d with ed 1 (mod φ(n)). Discard p and q. Public key is

More information

New Results on Boomerang and Rectangle Attacks

New Results on Boomerang and Rectangle Attacks New Results on Boomerang and Rectangle Attacks Eli Biham, 1 Orr Dunkelman, 1 Nathan Keller 2 1 Computer Science Department, Technion. Haia 32000, Israel {biham,orrd}@cs.technion.ac.il 2 Mathematics Department,

More information

Introduction to quantum algorithms

Introduction to quantum algorithms Introduction to quantum algorithms Gabriel Semanišin Institute of Computer Science P.J. Šafárik University, Faculty of Science Košice, Slovakia e-mail: gabriel.semanisin@upjs.sk eduqute 2018 Motto Michelangelo

More information

APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION

APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION Phaneendra HD, Vidya Raj C, Dr MS Shivakumar Assistant Professor, Department of Computer Science and Engineering, The National

More information

Figure 1: Circuit for Simon s Algorithm. The above circuit corresponds to the following sequence of transformations.

Figure 1: Circuit for Simon s Algorithm. The above circuit corresponds to the following sequence of transformations. CS 94 //09 Fourier Transform, Period Finding and Factoring in BQP Spring 009 Lecture 4 Recap: Simon s Algorithm Recall that in the Simon s problem, we are given a function f : Z n Zn (i.e. from n-bit strings

More information

COMP424 Computer Security

COMP424 Computer Security COMP424 Computer Security Prof. Wiegley jeffw@csun.edu Rivest, Shamir & Adelman (RSA) Implementation 1 Relatively prime Prime: n, is prime if its only two factors are 1 and n. (and n 1). Relatively prime:

More information

The Future. Currently state of the art chips have gates of length 35 nanometers.

The Future. Currently state of the art chips have gates of length 35 nanometers. Quantum Computing Moore s Law The Future Currently state of the art chips have gates of length 35 nanometers. The Future Currently state of the art chips have gates of length 35 nanometers. When gate lengths

More information

arxiv:quant-ph/ v3 11 Mar 2004

arxiv:quant-ph/ v3 11 Mar 2004 ariv:quant-ph/040148v3 11 ar 004 Generalized G States and Distributed Quantum Computing Anocha Yimsiriwattana and Samuel J. Lomonaco Jr. Abstract. A key problem in quantum computing is finding a viable

More information

Physics ; CS 4812 Problem Set 4

Physics ; CS 4812 Problem Set 4 Physics 4481-7681; CS 4812 Problem Set 4 Six problems (six pages), all short, covers lectures 11 15, due in class 25 Oct 2018 Problem 1: 1-qubit state tomography Consider a 1-qubit state ψ cos θ 2 0 +

More information

Quantum Searching. Robert-Jan Slager and Thomas Beuman. 24 november 2009

Quantum Searching. Robert-Jan Slager and Thomas Beuman. 24 november 2009 Quantum Searching Robert-Jan Slager and Thomas Beuman 24 november 2009 1 Introduction Quantum computers promise a significant speed-up over classical computers, since calculations can be done simultaneously.

More information

Provably Secure Double-Block-Length Hash Functions in a Black-Box Model

Provably Secure Double-Block-Length Hash Functions in a Black-Box Model Provably Secure Double-Block-ength Hash Functions in a Black-Box Model Shoichi Hirose Graduate School o Inormatics, Kyoto niversity, Kyoto 606-8501 Japan hirose@i.kyoto-u.ac.jp Abstract. In CRYPTO 89,

More information

Lecture 4: Elementary Quantum Algorithms

Lecture 4: Elementary Quantum Algorithms CS 880: Quantum Information Processing 9/13/010 Lecture 4: Elementary Quantum Algorithms Instructor: Dieter van Melkebeek Scribe: Kenneth Rudinger This lecture introduces several simple quantum algorithms.

More information

LECTURE NOTES ON QUANTUM COMPUTATION. Cornell University, Physics , CS 483; Spring, 2005 c 2006, N. David Mermin

LECTURE NOTES ON QUANTUM COMPUTATION. Cornell University, Physics , CS 483; Spring, 2005 c 2006, N. David Mermin LECTURE NOTES ON QUANTUM COMPUTATION Cornell University, Physics 481-681, CS 483; Spring, 2005 c 2006, N. David Mermin IV. Searching with a Quantum Computer Last revised 3/30/06 Suppose you know that eactly

More information

Shor s Prime Factorization Algorithm

Shor s Prime Factorization Algorithm Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm

More information

QUANTUM COMPUTATION. Lecture notes. Ashley Montanaro, University of Bristol 1 Introduction 2

QUANTUM COMPUTATION. Lecture notes. Ashley Montanaro, University of Bristol 1 Introduction 2 School of Mathematics Spring 018 Contents QUANTUM COMPUTATION Lecture notes Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1 Introduction Classical and quantum computational complexity

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Friday 25 January 2019

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Friday 25 January 2019 Faculty of Mathematics and Computer Science Exam Cryptology, Friday 25 January 2019 Name : TU/e student number : Exercise 1 2 3 4 5 total points Notes: Please hand in all sheets at the end of the exam.

More information

The security of RSA (part 1) The security of RSA (part 1)

The security of RSA (part 1) The security of RSA (part 1) The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 The modulus n and its totient value φ(n) are known φ(n) = p q (p + q) + 1 = n (p + q) + 1 i.e. q = (n φ(n) + 1)

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 30 October 2018

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 30 October 2018 Faculty of Mathematics and Computer Science Exam Cryptology, Tuesday 30 October 2018 Name : TU/e student number : Exercise 1 2 3 4 5 total points Notes: Please hand in all sheets at the end of the exam.

More information

Quantum Circuits and Algorithms

Quantum Circuits and Algorithms Quantum Circuits and Algorithms Modular Arithmetic, XOR Reversible Computation revisited Quantum Gates revisited A taste of quantum algorithms: Deutsch algorithm Other algorithms, general overviews Measurements

More information

Quantum Braids. Mosaics. Samuel Lomonaco 10/16/2011. This work is in collaboration with Louis Kauffman

Quantum Braids. Mosaics. Samuel Lomonaco 10/16/2011. This work is in collaboration with Louis Kauffman ??? Quantum raids & Mosaics Samuel Lomonaco University of Maryland altimore County (UMC) Email: Lomonaco@UMC.edu WebPage: www.csee.umbc.edu/~lomonaco Lomonaco Library This work is in collaboration with

More information

Lecture 12: Grover s Algorithm

Lecture 12: Grover s Algorithm CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 12: Grover s Algorithm March 7, 2006 We have completed our study of Shor s factoring algorithm. The asic technique ehind Shor

More information

Quantum algorithms for computing short discrete logarithms and factoring RSA integers

Quantum algorithms for computing short discrete logarithms and factoring RSA integers Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad February, 07 Abstract In this paper we generalize the quantum algorithm for computing short

More information

Lecture 22: RSA Encryption. RSA Encryption

Lecture 22: RSA Encryption. RSA Encryption Lecture 22: Recall: RSA Assumption We pick two primes uniformly and independently at random p, q $ P n We define N = p q We shall work over the group (Z N, ), where Z N is the set of all natural numbers

More information

ADVANCED QUANTUM INFORMATION THEORY

ADVANCED QUANTUM INFORMATION THEORY CDT in Quantum Engineering Spring 016 Contents ADVANCED QUANTUM INFORMATION THEORY Lecture notes Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1 Introduction Classical and quantum

More information

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography D. J. Guan Abstract The development of quantum algorithms and quantum information theory, as well as the design

More information

CPA-Security. Definition: A private-key encryption scheme

CPA-Security. Definition: A private-key encryption scheme CPA-Security The CPA Indistinguishability Experiment PrivK cpa A,Π n : 1. A key k is generated by running Gen 1 n. 2. The adversary A is given input 1 n and oracle access to Enc k, and outputs a pair of

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 7: Complexity & Algorithms I 13th October 016 School of Informatics, University of Edinburgh Complexity - Computational Complexity: Classification

More information

CS257 Discrete Quantum Computation

CS257 Discrete Quantum Computation CS57 Discrete Quantum Computation John E Savage April 30, 007 Lect 11 Quantum Computing c John E Savage Classical Computation State is a vector of reals; e.g. Booleans, positions, velocities, or momenta.

More information

Implementation Tutorial on RSA

Implementation Tutorial on RSA Implementation Tutorial on Maciek Adamczyk; m adamczyk@umail.ucsb.edu Marianne Magnussen; mariannemagnussen@umail.ucsb.edu Adamczyk and Magnussen Spring 2018 1 / 13 Overview Implementation Tutorial Introduction

More information

Question 2.1. Show that. is non-negligible. 2. Since. is non-negligible so is μ n +

Question 2.1. Show that. is non-negligible. 2. Since. is non-negligible so is μ n + Homework #2 Question 2.1 Show that 1 p n + μ n is non-negligible 1. μ n + 1 p n > 1 p n 2. Since 1 p n is non-negligible so is μ n + 1 p n Question 2.1 Show that 1 p n - μ n is non-negligible 1. μ n O(

More information

Lecture 15: The Hidden Subgroup Problem

Lecture 15: The Hidden Subgroup Problem CS 880: Quantum Information Processing 10/7/2010 Lecture 15: The Hidden Subgroup Problem Instructor: Dieter van Melkebeek Scribe: Hesam Dashti The Hidden Subgroup Problem is a particular type of symmetry

More information

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted

More information

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1). 1 Background 1.1 The group of units MAT 3343, APPLIED ALGEBRA, FALL 2003 Handout 3: The RSA Cryptosystem Peter Selinger Let (R, +, ) be a ring. Then R forms an abelian group under addition. R does not

More information

Analysis of the RSA Encryption Algorithm

Analysis of the RSA Encryption Algorithm Analysis of the RSA Encryption Algorithm Betty Huang June 16, 2010 Abstract The RSA encryption algorithm is commonly used in public security due to the asymmetric nature of the cipher. The procedure is

More information

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya BBM 205 Discrete Mathematics Hacettepe University http://web.cs.hacettepe.edu.tr/ bbm205 Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya Resources: Kenneth Rosen,

More information

ECS 189A Final Cryptography Spring 2011

ECS 189A Final Cryptography Spring 2011 ECS 127: Cryptography Handout F UC Davis Phillip Rogaway June 9, 2011 ECS 189A Final Cryptography Spring 2011 Hints for success: Good luck on the exam. I don t think it s all that hard (I do believe I

More information

Introduction to Cybersecurity Cryptography (Part 4)

Introduction to Cybersecurity Cryptography (Part 4) Introduction to Cybersecurity Cryptography (Part 4) Review of Last Lecture Blockciphers Review of DES Attacks on Blockciphers Advanced Encryption Standard (AES) Modes of Operation MACs and Hashes Message

More information

Shor s Quantum Factorization Algorithm

Shor s Quantum Factorization Algorithm Shor s Quantum Factorization Algorithm Tayeb Aïssiou Department of Mathematics and Statistics McGill University, Montreal, Quebec Canada H3A K6 e-mail: tayeb.aissiou@mail.mcgill.ca November, 5 Abstract

More information

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Introduction to Quantum Information Processing QIC 71 / CS 768 / PH 767 / CO 681 / AM 871 Lecture 8 (217) Jon Yard QNC 3126 jyard@uwaterloo.ca http://math.uwaterloo.ca/~jyard/qic71 1 Recap of: Eigenvalue

More information

Introduction to Cybersecurity Cryptography (Part 4)

Introduction to Cybersecurity Cryptography (Part 4) Introduction to Cybersecurity Cryptography (Part 4) Review of Last Lecture Blockciphers Review of DES Attacks on Blockciphers Advanced Encryption Standard (AES) Modes of Operation MACs and Hashes Message

More information

THE UNIVERSITY OF CALGARY. The Classical and Quantum Complexity of the Goldreich-Levin Problem. with Applications to Bit Commitment

THE UNIVERSITY OF CALGARY. The Classical and Quantum Complexity of the Goldreich-Levin Problem. with Applications to Bit Commitment THE UNIVERSITY OF CALGARY The Classical and Quantum Complexity of the Goldreich-Levin Problem with Applications to Bit Commitment by Mark R. A. Adcock A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 13 (rev. 2) Professor M. J. Fischer October 22, 2008 53 Chinese Remainder Theorem Lecture Notes 13 We

More information

α x x 0 α x x f(x) α x x α x ( 1) f(x) x f(x) x f(x) α x = α x x 2

α x x 0 α x x f(x) α x x α x ( 1) f(x) x f(x) x f(x) α x = α x x 2 Quadratic speedup for unstructured search - Grover s Al- CS 94- gorithm /8/07 Spring 007 Lecture 11 01 Unstructured Search Here s the problem: You are given an efficient boolean function f : {1,,} {0,1},

More information

Lecture Note 3 Date:

Lecture Note 3 Date: P.Lafourcade Lecture Note 3 Date: 28.09.2009 Security models 1st Semester 2007/2008 ROUAULT Boris GABIAM Amanda ARNEDO Pedro 1 Contents 1 Perfect Encryption 3 1.1 Notations....................................

More information

Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod. Assignment #2

Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod. Assignment #2 0368.3049.01 Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod Assignment #2 Published Sunday, February 17, 2008 and very slightly revised Feb. 18. Due Tues., March 4, in Rani Hod

More information

10 Concrete candidates for public key crypto

10 Concrete candidates for public key crypto 10 Concrete candidates for public key crypto In the previous lecture we talked about public key cryptography and saw the Diffie Hellman system and the DSA signature scheme. In this lecture, we will see

More information

APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION

APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION Phaneendra H.D., Vidya Raj C., Dr. M.S. Shivaloimar Assistant Professor, Department of Computer Science and Engineering,

More information

A Generic Hybrid Encryption Construction in the Quantum Random Oracle Model

A Generic Hybrid Encryption Construction in the Quantum Random Oracle Model A Generic Hybrid Encryption Construction in the Quantum Random Oracle Model Presented by: Angela Robinson Department of Mathematical Sciences, Florida Atlantic University April 4, 2018 Motivation Quantum-resistance

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

Cryptography CS 555. Topic 24: Finding Prime Numbers, RSA

Cryptography CS 555. Topic 24: Finding Prime Numbers, RSA Cryptography CS 555 Topic 24: Finding Prime Numbers, RSA 1 Recap Number Theory Basics Abelian Groups φφ pppp = pp 1 qq 1 for distinct primes p and q φφ NN = Z N gg xx mod N = gg [xx mmmmmm φφ NN ] mod

More information

Quantum algorithms. Andrew Childs. Institute for Quantum Computing University of Waterloo

Quantum algorithms. Andrew Childs. Institute for Quantum Computing University of Waterloo Quantum algorithms Andrew Childs Institute for Quantum Computing University of Waterloo 11th Canadian Summer School on Quantum Information 8 9 June 2011 Based in part on slides prepared with Pawel Wocjan

More information

9 Knapsack Cryptography

9 Knapsack Cryptography 9 Knapsack Cryptography In the past four weeks, we ve discussed public-key encryption systems that depend on various problems that we believe to be hard: prime factorization, the discrete logarithm, and

More information