Quantum Computing and the Possible Effects on Modern Security Practices

Similar documents
Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Errors, Eavesdroppers, and Enormous Matrices

Limits and Future of Computing Where do we go from here?

Quantum technology popular science description

Security Implications of Quantum Technologies

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

IBM Q: building the first universal quantum computers for business and science. Federico Mattei Banking and Insurance Technical Leader, IBM Italy

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Lecture 1: Introduction to Public key cryptography

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Post Von Neumann Computing

The quantum threat to cryptography

A brief survey on quantum computing

Post-quantum RSA. We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity

Shor s Prime Factorization Algorithm

Cryptographic Hash Functions

Elliptic Curve Cryptography

An Original Numerical Factorization Algorithm

Daniel J. Bernstein University of Illinois at Chicago. means an algorithm that a quantum computer can run.

Mathematics of Public Key Cryptography

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Quantum Computers. Peter Shor MIT

MAA509: Quantum Computing and Information Introduction

arxiv:quant-ph/ v1 19 Nov 1999

Quantum Information & Quantum Computation

Quantum Strangeness In Unexpected Places. Aash Clerk ! +!

Attacks on RSA & Using Asymmetric Crypto

Shor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017

Quantum Wireless Sensor Networks

9 Knapsack Cryptography

phys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel

Quantum theory has opened to us the microscopic world of particles, atoms and photons..and has given us the keys of modern technologies

Secrets of Quantum Information Science

Introduction to Quantum Computing

1 What are Physical Attacks. 2 Physical Attacks on RSA. Today:

Single and Entangled photons. Edward Pei

In fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer.

Quantum computation: a tutorial

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

Introduction to Quantum Computing

Introduction to Quantum Computing

Quantum Computing: A Future Trends in Computing

Algorithms, Logic and Complexity. Quantum computation. basic explanations! &! survey of progress

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security

Mathematics of Cryptography

Thanks to: University of Illinois at Chicago NSF DMS Alfred P. Sloan Foundation

Promise of Quantum Computation

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago

Introduction to Quantum Computing

Quantum Preimage and Collision Attacks on CubeHash

You separate binary numbers into columns in a similar fashion. 2 5 = 32

Quantum Computing. Hans De Raedt Zernike Institute for Advanced Materials University of Groningen, NL

Quantum Key Distribution and the Future of Encryption

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

The quantum threat to cryptography

What are we talking about when we talk about post-quantum cryptography?

Cryptography IV: Asymmetric Ciphers

Computational Complexity

ENHANCING THE PERFORMANCE OF FACTORING ALGORITHMS

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

From Physics to Logic

APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION

CRYPTOGRAPHY AND NUMBER THEORY

- Why aren t there more quantum algorithms? - Quantum Programming Languages. By : Amanda Cieslak and Ahmana Tarin

Why Quantum Technologies?

A Gentle Introduction to Quantum Computing

THE RSA CRYPTOSYSTEM

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

Introduction to Modern Cryptography. Benny Chor

Breaking RSA with Quantum Computing

On the Abundance of Large Primes with Small B-smooth values for p-1: An Aspect of Integer Factorization

Computer Science and Logic A Match Made in Heaven

On error distributions in ring-based LWE

Factoring. there exists some 1 i < j l such that x i x j (mod p). (1) p gcd(x i x j, n).

1500 AMD Opteron processor (2.2 GHz with 2 GB RAM)

Quantum computing and the entanglement frontier. John Preskill NAS Annual Meeting 29 April 2018

Quantum Computing An Overview

Expand the Quantum Cipher-text Space by Using a Superposition Key

We saw last time how the development of accurate clocks in the 18 th and 19 th centuries transformed human cultures over the world.

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Mind the gap Solving optimization problems with a quantum computer

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers

Analog Computing: a different way to think about building a (quantum) computer

Notes for Lecture Decision Diffie Hellman and Quadratic Residues

Notes 10: Public-key cryptography

Quantum Computing. Quantum Computing. Sushain Cherivirala. Bits and Qubits

Simple Math: Cryptography

CPSC 467b: Cryptography and Computer Security

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: NP-Completeness I Date: 11/13/18

Indefinite Causal Order: Faster Computers and Fundamental Questions. Professor Philip Walther

QUANTUM COMPUTING. Part II. Jean V. Bellissard. Georgia Institute of Technology & Institut Universitaire de France

Introduction to Cryptography. Susan Hohenberger

Transcription:

Quantum Computing and the Possible Effects on Modern Security Practices SE 4C03 Winter 2005 Kartik Sivaramakrishnan Researched by: Jeffery Lindner, 9904294 Due: April 04, 2005

Table of Contents Introduction... 1 The Age of Quantum Computing... 1 Impact on Modern Security... 2 Are we there yet?... 3 Conclusions... 3 References... 4

Introduction Security plays a massive role in today s computing world. With further dependence being placed on technology, one must always be knowledgeable of new issues and findings in order to always keep oneself protected. While today s methods for network security seem reliable and safe, there is a new technology that is promising to be a great threat to the way current computing is done, and the security repercussions surrounding it. This technology, and how it relates to the computing world, is commonly referred to as quantum computing. In the following report, the reader will be introduced to quantum computing and how it differs from classical logic. The security implications will then be explored in order to show exactly how quantum computing may be able to undermine modern security practices. Finally, the current state of quantum computing will be described, in order to assert how imminent this threat really is. The Age of Quantum Computing Quantum computing has been a topic of research amongst physicist since the 1970 s; ever since the limitations of classical computing were first explored.[1] Before an introduction to quantum computing is given, it is best to start with a background on classical computing and the physics behind what sparked quantum theory. The basic unit in classical computing is known as the bit. Bits can be in either of two values: 1, or 0, and represent the fundamental idea of state. Multiple bits form the basis for any modern computer, and subsequently, since bits can only hold one state at a time, computers are bound by this same limitation. Modern computers are built entirely upon this fundamental way of thinking; however some scientists have recently thought that other possibilities may exist. Moore s law states that data density has doubled roughly every year since the advent of integrated circuits. This trend is expected to continue, however researchers acknowledge that this law will eventually reach a physical limit in which components will eventually reach the size of atoms themselves.[2] At the atomic level, laws of classical physics break down, and quantum mechanics takes over. Scientists believed that inherent in this fact, may lie a different way of computing. This gave birth to the idea of quantum computing.[1] 1

Quantum computing abolishes the aspect that bits can only have two states, and this is the key element that makes quantum theory such a threat. Unlike classical computing, the fundamental unit of information in quantum theory is the qubit. A qubit has the potential of being quaternary, and greatly differs from the binary notional that has governed modern computing for decades.[1] Quantum theory makes use of the rule of superposition, in which a qubit can be 0, 1 or both. The details of this idea is outside the scope of this report, however this principal reveals that the number of stored values can greatly increase as the number of qubits increase. A computer using L qubits can store 2 L values at one time.[3] For example, a machine with 200 qubits, could potentially operate on not just one state during one clock tick, but rather 2 500 states! This is where the power of quantum computing lies: the ability for multiple state transitions during a cycle, which is commonly referred to as quantum parallelism.[1] Impact on Modern Security Now that quantum theory has been introduced, it is important to understand the repercussions this computing power may have on current security practices. RSA is one of the most secure and commonly known cryptographic algorithms. Founded in 1977, it still remains used today and is centered around the idea of public and private keys for authentication. Key generation is simple and is based on the multiplication of two, very large, prime numbers. To date, no one has been able to effectively decode the RSA algorithm.[4] What makes the RSA algorithm so secure is the fact that there is no efficient way to factor a large composite number into its two prime factors. Conventional computing is still slow in terms of factoring. Currently, the fastest way is through the use of a number field sieve in which a 512 RSA modulus was last factored in 8,400 million instructions per second (MIPS) years.[5] As factoring techniques become more efficient, users will be able to increase the size of the modulus to compensate. It is estimated that a modulus size of 2048 will be sufficient for permanent usage and security.[5] However, through the use of quantum computing, it is predicted that factoring of such large numbers can be done in polynomial time. Invented by Peter Shor, the first algorithm designed for quantum 2

computing (commonly called: Shor s algorithm) boasts an incredible power, and is theorized to be able to factor numbers in the magnitudes of 100 200 digits or greater in a matter of seconds![1] Should quantum computers become realizable, this would prevent RSA from being an option for cryptography and computer security. Are we there yet? Quantum computing still has a long way to go in terms of research and development. Phenomena such as decoherency still plagues physicists trying to develop quantum theory. Decoherency is where qubits decay and lose their state over time. This sort of behavior is unavoidable, and is one of the major problems in implementing quantum theory.[1] So far, scientists at the IBM-Almaden Research Center have been able to construct a 7-qubit quantum computer, and have successfully been able to factor the number 15 into its two factors: 3 and 5.[6] Obviously this type of calculation can be done by any normal conventional computer, however it does mark progress in the quantum field. It is undetermined as to when technology will advance to the point where quantum computers can be used to decipher some of the more complex security algorithms used today; however it is on the horizon. Conclusions As one can see, a great power lies in the practical implementation of quantum computing. As researchers move closer to developing stable quantum machines, current security procedures and algorithms must adapt. Quantum computing is on the forefront of technology, and rather than deal with the ramifications once implemented, forethought should be used to anticipate its impact. The nineteenth century was known as the machine age, the twentieth century will go down in history as the information age. I believe the twenty-first century will be the quantum age. [7] Paul Davies, leading researcher in quantum physics 3

References [1] J. West, The Quantum Computer (April 28, 2000), accessed on March 26 th, 2005: http://www.cs.caltech.edu/~westside/quantum-intro.html [2] Moore's Law (n.d.), accessed on March 26 th, 2005: http://www.webopedia.com/term/m/moores_law.html [3] A. Barenco, A Short Introduction to Quantum Computation (n. d.), accessed on March 26 th, 2005: http://www.qubit.org/library/intros/comp/comp.html [4] C. Kaufman, Network Security (2002) [5] E. Landquist, The Quadratic Sieve Factoring Algorithm (December 14, 2001), accessed on March, 27 th, 2005: http://www.math.uiuc.edu/~landquis/quadsieve.pdf [6] IBM's Test-Tube Quantum Computer Makes History (December 19 th, 2001), accessed on March, 24 th, 2005: http://domino.research.ibm.com/comm/pr.nsf/pages/news.20011219_qu antum.html?open&printable [7] W. Chen, Quantum Computing (n.d.), accessed on March, 22 nd, 2005: http://www.uhisrc.com/ftb/quantum/quantumcomputing.pdf 4