Introduction to Quantum Computing

Size: px
Start display at page:

Download "Introduction to Quantum Computing"

Transcription

1 Introduction to Quantum Computing Frédéric Magniez LIAFA & PCQC, Université Paris Diderot

2 The genesis 2 Copenhagen School (Bohr, Heisenberg, ) - The state of a quantum particule is only fixed after a measurement - Bennett, Brassard 84: perfectly secure quantum encryption that can be used in practice Paradoxe of Einstein, Podolsky, Rosen 35 - Very distant particules remain linked? - Aspect, Grangier, Roger, Dalibard 82: yes - Quantum encryption of Ekert 91 can be certifiable

3 Quantum boxes Classical information is encoded using bit (0/1) - The measure describes the state of the system 3 Preskill - A random bit is a hidden bit Quantum information is encoded using quantum-bit - Several possible measures - Outcome is determined during the measurement

4 Quantum key distribution 4 Problem - Setting No prior shared secret information between Alice and Bob Authenticated classical channel - Goal: Get a private key between Alice and Bob - Application: One-time pad (Miller 1882-Shanon 1945) Classical results - Impossible: all the information is in the canal - Possible (using randomized techniques): Amplify the privacy of an imperfect private key Washington-Moscow hotline (1963)

5 The protocol BB84 [Bennett-Brassard 84] 5 Protocol: quantum part Key: Encoding: Decoding: Key: Protocol: classical part - Reconciliation: Alice and Bob publicly announce their coding choices A&B only keep key bits with same choices - Security: Intercepting and opening a box errors A&B check few key bits at random positions - Privacy amplification: Perfect key using with few other more key bits Conclusion - Secrete key generation using an authenticated classical channel - Small initial private key large private key, with no authenticated channel

6 The protocol BB84 [Bennett-Brassard 84] 5 Protocol: quantum part Key: Encoding: Decoding: Key: Protocol: classical part - Reconciliation: Alice and Bob publicly announce their coding choices A&B only keep key bits with same choices - Security: Intercepting and opening a box errors A&B check few key bits at random positions - Privacy amplification: Perfect key using with few other more key bits Conclusion - Secrete key generation using an authenticated classical channel - Small initial private key large private key, with no authenticated channel

7 Superposition 6 Quantum randomness: principle of superposition - 1 qubit is in superposition of 2 values 1 2 (, ) 0i + 1i Rotation of axes: another measure 1 1 0i + 1i

8 Polarization of photons 7 State - Polarization: 2-dimensional vector i = cos i + sin "i Measure - Calcite crystal separates horizontal and vertical polarizations A measure modifies the system Transformation - Well known transformation: half-wave blade orthogonal symmetry around its axis - Any rotations (possibly with complex angles) cos 2 sin 2

9 Qubit 8 State - 2-dimensional unit vector i = cos 0i +sin 1i 1i 0i general case (complex amplitudes): i = = 0i + 1i, =1 Measure - Randomized orthogonal projection Evolution 0i + 1i Measure 2 2 0i 1i - Unitary transformation G 2 U(2) ( reversible) Definition: G 2 C 2 2 s.t. G G = Id i G 0 i = G i 0 i = G i G i

10 Examples of transformations 9 Reversible classical transformation - Identity - Negation Hadamard transformation - Definition: half-wave blade at 22,5 bi bi H Id - Properties: quantum coin flipping bi bi NOT 1 bi 0i H bi H 1 p 2 ( 0i + 1i) H Measure H = p p 2 ( 0i + ( Measure bi 1) b 1i) i 1i Measure does not commute

11 Entanglement 10 Principle: 2 distant boxes which remain entangled - Outcomes are random - but correlated if boxes are opened similarly - and uncorrelated otherwise Bell 64 inequality - Cooperative random game Classical 75% of victory Quantum > 85% of victoiry - Experimental verification at Orsay in Application: quantum certification

12 Bell-CHSH inequality as a classical game 11 Game - Alice and Bob share random bits but cannot communicate - Alice receives a random bit x, Bob y - Alice returns a bit a, Bob b x y a shared random bits b - Goal: maximize p = Pr(a b = x ^ y) x,y Classically: CHSH inequality [1969] Best deterministic strategy: a = b =0 =) p = Theorem: the best probabilistic strategy is not better than the best deterministic strategy

13 n-qubit 12 State - i2c {0,1}n such that k ik =1 i = X x xi X x2{0,1} with n x 2 =1 x2{0,1} n - Examples - Separated 2-qubit: 00i + 01i = 0i( 0i + 1i) - Entangled 2-qubit: 00i + 11i 6= 1i 2i EPR state Measure - Randomized X orthogonal projection x xi Measure x2{0,1} n Evolution - Unitary transformation G 2 U(2 n ) i G x 2 ( G 2 C 2n 2 n s.t. G G = Id) 0 i = G i xi

14 Transformation c NOT 13 Definition c NOT 0bi = 0bi c NOT 1bi = 1i (1 c NOT abi = ai a b)i bi c NOT = B A 0010 Representation control bit target bit NOT Bell basis change xi H yi NOT xyi 00i = 1 p 2 ( 00i + 11i) 01i = 1 p 2 ( 01i + 10i) 10i = 1 p 2 ( 00i 11i = 1 p 2 ( 01i 11i) 10i)

15 EPR state 14 Setting - Assume Alice & Bob shares an EPR state: p 1 2 ( 00i + 11i) Alice has the first qubit, and Bob the second one Alice & Bob observe their qubit and respectively get bit a,b Fact - a=b with probability 1 - a (resp. b) is a uniform random bit Classical analogue? - Shared randomness model: Alice and Bob have access to shared random bits Non product distribution: / 2 / 2 00 with prob. 1/2 and 11 with prob. 1/2 - Can we simulate quantum physic using shared randomness? shared random bits

16 Bell-CHSH inequality as a quantum game 15 Reminder - Goal: maximize Quantumly - Alain and Bob share an EPR state x a p = Pr(a b = x ^ y) x,y / 2 / 2 y b - Bob performs a rotation of angle - If x =1, Alain performs a rotation of angle - If y =1, Bob performs a rotation of angle Alain et Bob observe their qubit and send their respective outcomes - Theorem: p = cos 2 ( 8 ) 0.85 Realization: [Aspect-Grangier-Roger-Dalibard: Orsay 82]

17 Superdense coding [1992] 16 Problem - Alice & Bob share an EPR state: - Alice wants to send two bits xy to Bob - But Alice can only send one qubit to Bob 00i = 1 p 2 ( 00i + 11i) 0 0 / qubit 1 1 / 2 xy xy? Bell basis change xi H yi NOT xyi 00i = 1 p 2 ( 00i + 11i) 01i = 1 p 2 ( 01i + 10i) 10i = 1 p 2 ( 00i 11i = 1 p 2 ( 01i 11i) 10i) Protocol - Alice applies to its qubit NOT, if y=1; and FLIP, if x=1 - Alice sends its qubit to Bob - Bob performs the inverse of the Bell basis change, and observes xy FLIP =

18 Quantum teleportation 17 Problem - Alice wants to transmit a qubit i to Bob - Bob: far and unknown position to Alice i i Realization Alice 0 0 Bob ψ Interaction quantique Interaction interne Interaction classique The quantum communication does not reveal anything on i Alice ψ Bob

19 Realization of teleportation 18 Circuit i = 0i + 1i Analysis 0i 0i H NOT NOT - 1 P Final state with xyi = (NOT) y (FLIP) x 2 x,y xyi xyi i - By measuring x,y, third qubit is projected to xyi xyi i - After learning x,y, Bob can correct to Realizations - 1 photon [Zeilinger et al : Innsbruck 97] - 1 photon, 6 km [Gisin et al : Genève 02] - 1 atom [Blatt et al : Innsbruck 04] - Today: over 100km H Measure xi yi xyi

20 NATURE NEWS Google and NASA snap up quantum computer 19 D-Wave machine to work on artificial-intelligence problems. Nicola Jones 16 May 2013 D-Wave, the small company that sells the world s only commercial quantum computer, has just bagged an impressive new customer: a collaboration between Google, NASA and the non-profit Universities Space Research Association. The three organizations have joined forces to install a D-Wave Two, the computer company's latest model, in a facility launched by the collaboration the Quantum Artificial Intelligence Lab at NASA's Ames Research Center in Moffett Field, California. The lab will explore areas such as machine learning making computers sort and analyse data on the basis of previous experience. This is useful for functions such as language translation, image searches and voice-command recognition. We actually think quantum machine learning may provide the most creative problem-solving process under the known laws of physics, says a blog post from Google describing the deal. Print The D-Wave Two quantum computer has a 512- qubit processor (pictured) that can do some calculations thousands of times faster than conventional computers. D-WAVE

21 In the News Barack Obama Drones American Airlines Benghazi American Idol Safari Power Saver Click to Start Flash Plug-in 20 Senate report: Benghazi attack was preventable VIDEO Top Springsteen political moments MAP The United States (of Pizza) NSA seeks to build quantum computer that could crack most types of encryption By Steven Rich and Barton Gellman, Published: January 2 the writers In room-size metal boxes secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world. According to documents provided by former NSA contractor Edward Snowden, the effort to build a cryptologically useful quantum computer a machine exponentially faster than classical computers is part of a $79.7 million research program titled Penetrating Hard Targets. Much of the work is hosted under classified contracts at a laboratory in College Park, Md. Vous Vendez Un Bien? 20

22 Supercomputer 21 Feynman 81 - Can quantum systems be probabilistically simulated by a classical computer? [...] the answer is certainly, No Deutsch 85 - Quantum Turing Machine - Existence of a universal Turing Machine Simon, Shor 94 - Quantum algorithms with exponential speedup - Quantum attack of public-key crypto-systems

23 Quantum parallelism 22 n-qubit - Superposition of all possible values - 2 n possible values Parallel computation - In one step, 2 n computations - But only one outcome can be (randomly) observed Strategy Nb of particules in the Universe Combine cleverly those values before measuring them 4 bits can take 2 4 =16 values

24 Asymmetric encryption 23 One-way functions - Example: multiplication / factorization - Bases of modern encryption (Rivest, Shamir, Adleman 77) RSA challenges ( ) - RSA-100, $1,000, RSA-640, $20,000, x 19 =? 667 =? x? =? x?

25 Quantum algorithm for factorization 24 Classical reduction - Factorization can be reduced to period finding (of some arithmetic function) Quantum tool: Fourier Transform Shor 94 - FT reveals the period of a signal - FT is (very) fast on a quantum superposition = x

26 From period finding to factorization 25 Theorem [Simon-Shor 94] - Finding the period of any function on an abelian group can be done in quantum time poly (log G ) Order finding - Input: integers n and a such that gcd(a,n)=1 - Output: the smallest integer q 0 such that a q = 1 mod n - Reduction to period finding: the period of x a x mod n is q Factorization - Input: integer n - Output: a nontrivial divisor of n Reduction : Factorization R Order finding - Check that gcd(a,n)=1 - Compute the order q of a mod n - Restart if q is odd or a q/2-1 mod n - Otherwise (a q/2-1) (a q/2 + 1) = 0 mod n - Return gcd(a q/2 ± 1, n)

27 Simon s problem 26 Problem - Oracle input: f : {0, 1} n {0, 1} n a black-box function xi U f 0 f(x) xi xi U f xi wi w f(x)i such that - Output: the period s Complexity - Randomly: 2 (n) queries - Quantumly: O(n) queries and time O(n 3 ) Idea - Use a Fourier transformation: QFT n xi = 1 where x y = X i 9s 6= 0 n : 8x 6= y, f(x) =f(y) () y = x x i y i mod 2 2 n/2 X y ( 1) x y yi s - Realization of QFTn using Hadamard gates: 1 bi H p2 ( 0i + ( 1) b 1i) QFT n H H H

28 Quantum solution 27 0 n i QFT n QFT n Measure yi : y 2 s? U f 0 n i Measure f(x)i Initialization: Parallelization: 1 Query to f: Filter: Interferences: 0 n i 0 n i X 2 n/2 x X 1 2 n/2 x xi 0 n i X 1 2 (n+1)/2 y X 1 2 (n+1)/2 y X 1 2 (n 1)/2 xi f(x)i 1 p 2 ( xi + x y:s y=0 si) f(x)i (( 1) x y + ( 1) (x s) y ) yi f(x)i ( 1) x y (1 + ( 1) s y ) yi f(x)i yi f(x)i

29 Finding the period 28 Construction of a linear system - After iterations: - s 0 n is solution of the linear system in t: n + k y 1,y 2,...,y n+k s y 1 t = 0 y 2 t = 0 y 1 1 t 1 + y 1 2 t y 1 n t n =0 y 2 1 t 1 + y 2 2 t y 2 n t n =0. y n+k t = 0. y n+k 1 t 1 + y n+k 2 t yn n+k t n =0 - The y i are of rank n-1 with proba 1-1/2 k+1 - System solutions: 0 n and s Complexity - Constructing the system: O(n) queries, time O(n) - Solving the system: no query, time O(n 3 )

30 More difficult Period Finding(G) - Oracle input: function f on G such that f is strictly periodic for some unknown H G: f(x) =f(y) () y 2 xh G H a 1 H f - Output: generator set for H Examples - Simon Problem: - Factorization : - Discrete logarithm: - Pell s equations: - Graph Isomorphism: a t H G =(Z 2 ) n,h= {0,s} G = Z, H= rz G = Z 2,H= {(rx, x) :x 2 Z} G = R G = S n Quantum polynomial time algorithms (in log G ) - Abelian groups G: QFT-based algorithm [1995] - Normal period groups H: QFT-based algorithm [2000] - Solvable groups G of constant exponent and constant length [2003] -...

31 Hard instances 30 Shift problem - Dihedral group Z N o Z 2 : sub-exponential time 2 O( log N) [2003] f(, 0) f(, 1) Graph Isomorphism A : B : shift = Instance of Period Finding on the symmetric group where we just know how to implement QFT... [1997] A B a 1 b 6 c 8 d 3 e 5 f 2 g 4 h 7 General case - Polynomial number of queries to f, but exponential post-processing time [1999]

32 Grover search algorithm 31 Grover problem - Oracle input: f : [N] {0,1} - Output: find x0 such that f(x0)=1, if there is any - Constraint: f is a black-box Query complexity - Randomly: ϴ(N) - Quantumly: ϴ( N)

33 Graph search 32 Setting - Graph G on a vertex-set X - Set M X of unknown marked vertices Problem - Move to a marked vertex - Constraints Displacements restricted to the edges of G Can check if x is marked only if currently at position x - Complexity: # of moves

34 Search via random walk 33 Setting - Probability transitions: Markov chain P = (pxy) on G Locality pxy 0 only if (x, y) is an edge of G - Starting vertex: Stationary distribution π on vertices of G π: 1-eigenvector of P Random search 1. Sample from stationary distribution of P 2. Repeat a. Check if current state is marked b. Move according to P Hitting time - HT: Average # iterations of Random search to hit a marked element average complexity : Sample + 1/(HT) ( Check + Move ) Examples - HT(Complete graph) = N (# of vertices) - HT(2D grid) = N x log N

35 Quantum walk 34 Some examples - [1995]: Complete graph - [2003]: Hypercube - [2004]: Johnson Graph - [2005]: 2D-Grid Generic construction - Quantum analogue of a symmetric Markov chain P [2004] - Generalization for reversible walks and simplified analysis [2007] Theorem - There is a quantum analogue of Random search which finds a marked elements with complexity Sample + 1/ (HT) ( Check + Move )

36 Important application: Element distinctness 35 Element Distinctness - Input: List of N numbers {x1, x2, x3,, xn} - Output: Are all the numbers distinct? (or is there a collision: xi = xj, i j) - Complexity: # of queried numbers - Classically: N - Using Grover search: N 3/4 [2001] - Using quantum walk on Johnson graph: N 2/3 [2004] - Lower bound: N 2/3 [2002] Algorithm - Johnson Graph (N, r) Vertices: { S {1, 2,, N}: S =r } Edges: { (S, T): Δ(T S) =1 } - Hitting time: HT = O(N 2 /r) - Runtime: r + (N 2 /r) ( ) N 2/3 x 2 x 5 x 2 x 3 x 8 x 13 x 10 x 13 x 2 x 3 x 8 x 13 x 2 x 3 x 5 = x 7 x 2 x 3 x 5 x 13 sample check move

37 How many quantum algorithms exist? 36 Unstructured problems - Grover algorithm [1996] Algebraic problems - Simon-Shor algorithm [1994] Well structured problems - Classical algorithms are optimal Problems with few structures - Quantum walk based algorithms [2003] quantum analogy of random walks - Examples Element Distinctness, Commutativity: N 2/3 [2004] Triangle Finding: N 9/7 (lower bound N) [2013] Square Finding: N 1.25 (lower bound N) [2010] Matrix Multiplication: N 5/3 (lower bound N 3/2 ) [2006] AND-OR Tree evaluation: N [2007]

38 The superiority of Quantum Computing 37 Cryptography - Secrete Key Distribution Protocol [Bennett, Brassard 84] Implementation: ~100 km Information Theory - EPR Paradox [Einstein, Podolsky, Rosen 35] Realization: 1982 [Orsay] - Teleportation [Bennett, Brassard, Crépeau, Jozsa, Peres, Wootters 93] Realization: 1997 [Innsbruck] Algorithms - Polynomial algorithm for Period Finding [Simon, Shor 94] Factorization, Discrete Logarithm - Quadratic speedup for Database Search [Grover 96] - Quantum computer? 1995: 2-qubit [ENS], 2000: 5-qubit [IBM], 2006: 12-qubit [Waterloo]

39 The superiority of Quantum Computing 37 Cryptography - Secrete Key Distribution Protocol [Bennett, Brassard 84] Implementation: ~100 km Information Theory - EPR Paradox [Einstein, Podolsky, Rosen 35] Realization: 1982 [Orsay] - Teleportation [Bennett, Brassard, Crépeau, Jozsa, Peres, Wootters 93] Realization: 1997 [Innsbruck] Algorithms - Polynomial algorithm for Period Finding [Simon, Shor 94] Factorization, Discrete Logarithm - Quadratic speedup for Database Search [Grover 96] - Quantum computer? 1995: 2-qubit [ENS], 2000: 5-qubit [IBM], 2006: 12-qubit [Waterloo] Quantum proofs for classical theorems - [Drucker, de Wolf 09]

40 Where does the quantum superiority come from? 38 Entanglement? - Classical entanglement exists: shared randomness - But quantum entanglement is stronger Bell-CHSH inequality and applications Complex amplitudes? - No: they can be simulated using only real amplitude Negative amplitudes? - Yes: they can induce destructive interferences / 2 / 2 Hardness of amplitudes? - No: amplitudes must be easily computable for being physically realizable

41 Future 39 Applications - Unfalsifiable money, artificial intelligence, Quantum computing - For a better understanding of quantum phenomenon - New mathematical tool for proving results in classical computing Technology - Computer, intermediate models: boson sampling - Certification : encryption, random generator, computation

42 Some quantum centers in the world 40 IQIS CQC RQC IQC PCQC IQI QIS QISC CQI CQT CQC 2 T

43 41

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Javier Enciso [email protected] Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing

More information

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)

More information

Shor s algorithm and secret sharing

Shor s algorithm and secret sharing Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful

More information

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)

More information

Quantum Computing. Robert Sizemore

Quantum Computing. Robert Sizemore Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical

More information

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar Quantum Computing Lecture 7 Quantum Factoring Anuj Dawar Quantum Factoring A polynomial time quantum algorithm for factoring numbers was published by Peter Shor in 1994. polynomial time here means that

More information

Factoring by Quantum Computers

Factoring by Quantum Computers Factoring by Quantum Computers Ragesh Jaiswal University of California, San Diego A Quantum computer is a device that uses uantum phenomenon to perform a computation. A classical system follows a single

More information

arxiv:quant-ph/9809016 v2 19 Jan 2000

arxiv:quant-ph/9809016 v2 19 Jan 2000 An Introduction to Quantum Computing for Non-Physicists arxiv:quant-ph/9809016 v 19 Jan 000 Eleanor Rieffel FX Palo Alto Labratory and Wolfgang Polak Consultant FX Palo Alto Laboratory, 3400 Hillview Avenue,

More information

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert

More information

The New Approach of Quantum Cryptography in Network Security

The New Approach of Quantum Cryptography in Network Security The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time

More information

How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics

How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics CDMTCS Research Report Series A New Quantum Algorithm for NP-complete Problems Masanori Ohya Igor V. Volovich Science University of Tokyo Steklov Mathematical Institute CDMTCS-194 September 00 Centre for

More information

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Arun K. Pati Theoretical Physics Division QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Introduction Quantum information theory is a marriage between two scientific pillars of the twentieth

More information

Introduction to Quantum Computing

Introduction to Quantum Computing The genesis Coenhagen School (Bohr, eisenberg, ) Introduction to Quantum Comuting Frédéric Magniez The state of a quantum articule is only fied after a measurement Bennett, Brassard 84: erfectly secure

More information

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based

More information

24 th IEEE Annual Computer Communications Workshop (CCW)

24 th IEEE Annual Computer Communications Workshop (CCW) 24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California

More information

Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography

Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography Julia Kempe CNRS & LRI, Université de Paris-Sud 9405 Orsay, France

More information

230483 - QOT - Quantum Optical Technologies

230483 - QOT - Quantum Optical Technologies Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications

More information

Quantum Computing and Grover s Algorithm

Quantum Computing and Grover s Algorithm Quantum Computing and Grover s Algorithm Matthew Hayward January 14, 2015 1 Contents 1 Motivation for Study of Quantum Computing 3 1.1 A Killer App for Quantum Computing.............. 3 2 The Quantum Computer

More information

0.1 Phase Estimation Technique

0.1 Phase Estimation Technique Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design

More information

A Probabilistic Quantum Key Transfer Protocol

A Probabilistic Quantum Key Transfer Protocol A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: [email protected] August 9, 01

More information

Bits Superposition Quantum Parallelism

Bits Superposition Quantum Parallelism 7-Qubit Quantum Computer Typical Ion Oscillations in a Trap Bits Qubits vs Each qubit can represent both a or at the same time! This phenomenon is known as Superposition. It leads to Quantum Parallelism

More information

Quantum Computing: Lecture Notes. Ronald de Wolf

Quantum Computing: Lecture Notes. Ronald de Wolf Quantum Computing: Lecture Notes Ronald de Wolf Preface These lecture notes were formed in small chunks during my Quantum computing course at the University of Amsterdam, Feb-May 2011, and compiled into

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm

What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm 1 Question: What has quantum mechanics to do with factoring? Answer: Nothing! 2 Question: What

More information

Quantum computing in practice

Quantum computing in practice Quantum computing in practice & applications to cryptography Renaud Lifchitz OPPIDA NoSuchCon, November 19-21, 2014 Renaud Lifchitz NoSuchCon, November 19-21, 2014 1 / 68 Speaker s bio French senior security

More information

Elements of Applied Cryptography Public key encryption

Elements of Applied Cryptography Public key encryption Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let

More information

A New Generic Digital Signature Algorithm

A New Generic Digital Signature Algorithm Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study

More information

Basic Algorithms In Computer Algebra

Basic Algorithms In Computer Algebra Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,

More information

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem

More information

Cryptography and Network Security Chapter 9

Cryptography and Network Security Chapter 9 Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,

More information

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study

More information

Study of algorithms for factoring integers and computing discrete logarithms

Study of algorithms for factoring integers and computing discrete logarithms Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department

More information

Lecture 13 - Basic Number Theory.

Lecture 13 - Basic Number Theory. Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted

More information

Factoring & Primality

Factoring & Primality Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount

More information

Quantum Computability and Complexity and the Limits of Quantum Computation

Quantum Computability and Complexity and the Limits of Quantum Computation Quantum Computability and Complexity and the Limits of Quantum Computation Eric Benjamin, Kenny Huang, Amir Kamil, Jimmy Kittiyachavalit University of California, Berkeley December 7, 2003 This paper will

More information

Quantum Computing Architectures

Quantum Computing Architectures Quantum Computing Architectures 1:-2: Fred Chong (UCD) - Intro, quantum algorithms, and error correction 2:-2:3 Break and discussion 2:3-3:3 Ike Chuang (MIT) - Device technology and implementation issues

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared

More information

Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015. Quantum Computers

Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015. Quantum Computers Quantum Computers And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015 1 Includes joint work with Amlan Chakrabarti, U. Calcutta If you were designing Nature, how would

More information

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

arxiv:quant-ph/9508027v2 25 Jan 1996

arxiv:quant-ph/9508027v2 25 Jan 1996 Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer arxiv:quant-ph/9508027v2 25 Jan 1996 Peter W. Shor Abstract A digital computer is generally believed to

More information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet

More information

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer Volume 3 Issue 10 October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Introduction

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

Public Key (asymmetric) Cryptography

Public Key (asymmetric) Cryptography Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: [email protected]) Course of Network Security,

More information

Notes on Network Security Prof. Hemant K. Soni

Notes on Network Security Prof. Hemant K. Soni Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications

More information

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Computer Science and Engineering, KL University Green Fields, Vaddeswaram, PO Dt-522 502, Andhra Pradesh,

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

DO WE REALLY UNDERSTAND QUANTUM MECHANICS?

DO WE REALLY UNDERSTAND QUANTUM MECHANICS? DO WE REALLY UNDERSTAND QUANTUM MECHANICS? COMPRENONS-NOUS VRAIMENT LA MECANIQUE QUANTIQUE? VARIOUS INTERPRETATIONS OF QUANTUM MECHANICS IHES, 29 janvier 2015 Franck Laloë, LKB, ENS Paris 1 INTRODUCTION

More information

Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz. Mérés, NCT, kvantumállapot. 2015. március 12.

Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz. Mérés, NCT, kvantumállapot. 2015. március 12. Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz Mérés, NCT, kvantumállapot 2015. március 12. Tegnap még összefonódtam, mára megmértek 2015.03.18. 2 Slides for Quantum Computing and

More information

CIS 5371 Cryptography. 8. Encryption --

CIS 5371 Cryptography. 8. Encryption -- CIS 5371 Cryptography p y 8. Encryption -- Asymmetric Techniques Textbook encryption algorithms In this chapter, security (confidentiality) is considered in the following sense: All-or-nothing secrecy.

More information

2.1 Complexity Classes

2.1 Complexity Classes 15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look

More information

Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission

Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission Title Application of Quantum Cryptography Detectable Data Transmission Author(s) Kudo, Takamitsu; Usuda, Tsuyoshi Sa Masayasu IEICE Transactions on Fundamentals Citation Communications and Computer Science

More information

Cryptography Lecture 8. Digital signatures, hash functions

Cryptography Lecture 8. Digital signatures, hash functions Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting

More information

A SOFTWARE COMPARISON OF RSA AND ECC

A SOFTWARE COMPARISON OF RSA AND ECC International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

Library (versus Language) Based Parallelism in Factoring: Experiments in MPI. Dr. Michael Alexander Dr. Sonja Sewera.

Library (versus Language) Based Parallelism in Factoring: Experiments in MPI. Dr. Michael Alexander Dr. Sonja Sewera. Library (versus Language) Based Parallelism in Factoring: Experiments in MPI Dr. Michael Alexander Dr. Sonja Sewera Talk 2007-10-19 Slide 1 of 20 Primes Definitions Prime: A whole number n is a prime number

More information

Quantum Encoder and Decoder for Secret Key Distribution with Check Bits

Quantum Encoder and Decoder for Secret Key Distribution with Check Bits Research Journal of Applied Sciences, Engineering and Technology 6(23): 4381-4386, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: January 31, 2013 Accepted: May

More information

1 Message Authentication

1 Message Authentication Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions

More information

Lecture 1 Version: 14/08/28. Frontiers of Condensed Matter San Sebastian, Aug. 28-30, 2014. Dr. Leo DiCarlo [email protected] dicarlolab.tudelft.

Lecture 1 Version: 14/08/28. Frontiers of Condensed Matter San Sebastian, Aug. 28-30, 2014. Dr. Leo DiCarlo l.dicarlo@tudelft.nl dicarlolab.tudelft. Introduction to quantum computing (with superconducting circuits) Lecture 1 Version: 14/08/28 Frontiers of Condensed Matter San Sebastian, Aug. 28-30, 2014 Dr. Leo DiCarlo [email protected] dicarlolab.tudelft.nl

More information

Software Tool for Implementing RSA Algorithm

Software Tool for Implementing RSA Algorithm Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key

More information

Securing Your Data In Transit For The Long Term

Securing Your Data In Transit For The Long Term Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014 ID Quantique Photon Counters Services Quantum

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz

Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz Quantum Algorithms in NMR Experiments 25 th May 2012 Ling LIN & Michael Loretz Contents 1. Introduction 2. Shor s algorithm 3. NMR quantum computer Nuclear spin qubits in a molecule NMR principles 4. Implementing

More information

COMPSCI 111/111G. Quantum Computing. Term 1, 2015. Prepared using LATEX Beamer by Cristian S.Calude 1 / 26

COMPSCI 111/111G. Quantum Computing. Term 1, 2015. Prepared using LATEX Beamer by Cristian S.Calude 1 / 26 COMPSCI 111/111G Quantum Computing Prepared using LATEX Beamer by Cristian S.Calude Term 1, 2015 1 / 26 Classical vs. Quantum Computers Quantum computing was first introduced by Yuri Manin in 1980 and

More information

Thnkwell s Homeschool Precalculus Course Lesson Plan: 36 weeks

Thnkwell s Homeschool Precalculus Course Lesson Plan: 36 weeks Thnkwell s Homeschool Precalculus Course Lesson Plan: 36 weeks Welcome to Thinkwell s Homeschool Precalculus! We re thrilled that you ve decided to make us part of your homeschool curriculum. This lesson

More information

Factoring. Factoring 1

Factoring. Factoring 1 Factoring Factoring 1 Factoring Security of RSA algorithm depends on (presumed) difficulty of factoring o Given N = pq, find p or q and RSA is broken o Rabin cipher also based on factoring Factoring like

More information

Introduction. Digital Signature

Introduction. Digital Signature Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology

More information

A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing

A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing J.Senthil Murugan 1, V.Parthasarathy 2, S.Sathya 3, M.Anand 4 Assistant Professor, VelTech HighTech Dr.Rangarajan Dr.Sakunthala

More information

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary Shape, Space, and Measurement- Primary A student shall apply concepts of shape, space, and measurement to solve problems involving two- and three-dimensional shapes by demonstrating an understanding of:

More information

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie

More information

Lecture 13: Factoring Integers

Lecture 13: Factoring Integers CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method

More information

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS TEST DESIGN AND FRAMEWORK September 2014 Authorized for Distribution by the New York State Education Department This test design and framework document

More information

Overview of Public-Key Cryptography

Overview of Public-Key Cryptography CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows

More information

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY LINDSEY R. BOSKO I would like to acknowledge the assistance of Dr. Michael Singer. His guidance and feedback were instrumental in completing this

More information

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport

More information

South Carolina College- and Career-Ready (SCCCR) Pre-Calculus

South Carolina College- and Career-Ready (SCCCR) Pre-Calculus South Carolina College- and Career-Ready (SCCCR) Pre-Calculus Key Concepts Arithmetic with Polynomials and Rational Expressions PC.AAPR.2 PC.AAPR.3 PC.AAPR.4 PC.AAPR.5 PC.AAPR.6 PC.AAPR.7 Standards Know

More information

ALGEBRA 2 CRA 2 REVIEW - Chapters 1-6 Answer Section

ALGEBRA 2 CRA 2 REVIEW - Chapters 1-6 Answer Section ALGEBRA 2 CRA 2 REVIEW - Chapters 1-6 Answer Section MULTIPLE CHOICE 1. ANS: C 2. ANS: A 3. ANS: A OBJ: 5-3.1 Using Vertex Form SHORT ANSWER 4. ANS: (x + 6)(x 2 6x + 36) OBJ: 6-4.2 Solving Equations by

More information

Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28

Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28 Arithmetic algorithms for cryptology 5 October 2015, Paris Sieves Razvan Barbulescu CNRS and IMJ-PRG R. Barbulescu Sieves 0 / 28 Starting point Notations q prime g a generator of (F q ) X a (secret) integer

More information

Quantum Cryptography: The Ultimate Solution to Secure Data Transmission?

Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Quantum Cryptography: The Ultimate Solution to Secure Data Transmission? Ioannis P. Antoniades 1, Amalia N. Miliou 2, Miltiades K. Hatalis 3 1 Department of Informatics, Aristotle University of Thessaloniki,

More information

Public Key Cryptography and RSA. Review: Number Theory Basics

Public Key Cryptography and RSA. Review: Number Theory Basics Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and

More information

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis by Susana Sin A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction MATH 168: FINAL PROJECT Troels Eriksen 1 Introduction In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key

More information

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Discrete Mathematics, Chapter 4: Number Theory and Cryptography Discrete Mathematics, Chapter 4: Number Theory and Cryptography Richard Mayr University of Edinburgh, UK Richard Mayr (University of Edinburgh, UK) Discrete Mathematics. Chapter 4 1 / 35 Outline 1 Divisibility

More information

Factoring Algorithms

Factoring Algorithms Factoring Algorithms The p 1 Method and Quadratic Sieve November 17, 2008 () Factoring Algorithms November 17, 2008 1 / 12 Fermat s factoring method Fermat made the observation that if n has two factors

More information

Quantum Computing and Cryptography Their impact on cryptographic practice

Quantum Computing and Cryptography Their impact on cryptographic practice Quantum Computing and Cryptography Their impact on cryptographic practice Tim Moses Director, Advanced Security Technology Entrust, Inc. January 2009 2009 Entrust, Inc. All rights reserved. Entrust is

More information

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis

More information

RSA Attacks. By Abdulaziz Alrasheed and Fatima

RSA Attacks. By Abdulaziz Alrasheed and Fatima RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.

More information