QUANTUM COMPUTER ATTACKS ON SYMMETRIC AND ASYMMETRIC CRYPTOSYSTEMS.
Authors: Maksim Iavich, Giorgi Tsiklauri , Nugo Amonashvili , Rati Tabidze, Nika Panqvelashvili , Giorgi Kvernadze
Affiliation: Caucasus University, European School, Vladimir Komarov Tbilisi School of Physics and Mathematics N199, Private School of Tbilisi, 61st Public School
Category:
Keywords: Qubit, Symmetric Encryption, Asymmetric Encryption, Public Key, Private Key.
ABSTRACT. This article analyzes at how Symmetric and Asymmetric cryptosystems and how they can be broken with the usage of quantum computers. The article also delves into who this is truly a problem for and what can be done to curb it. The paper covers the Integer Factorization Problem, Discrete Logarithm Problem, Grover’s Algorithm, and Shor’s Algorithm.
References:
1.S.Bushwick - New Encryption System Protects Data from Quantum Computers - Scientific American, 2019
2.J.Lake - What is RSA encryption and how does it work? , comparitech 2018.
3.V.Timofeev/iStock, How Do Quantum Computers Work? sciencealert
4.M.Brinon J.Daubin C.Derland P.Boito A.Bostan A.Poteaux M. Safey El Din Journées Nationales de Calcul Formel (JNCF) 2014 CIRM, Luminy.3 – 7 Novembre 2014
5.K.Martin, Waiting for quantum computing: Why encryption has nothing to worry about techbeacon
6.M. Iavich, S. Gnatyuk, A. Arakelian, G. Iashvili, Y. Polishchuk, D. Prysiazhnyy, Improved Post-quantum Merkle Algorithm Based on Threads, International Conference on Computer Science, Engineering and Education Applications, Springer, Cham, 454-464
Menu