Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems

Dr. Joshua J. Tom, Dr. Nlerum P. Anebo, Dr. Bukola A. Onyekwelu, Adigwe Wilfred, Richard E. Eyo
{"title":"Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems","authors":"Dr. Joshua J. Tom, Dr. Nlerum P. Anebo, Dr. Bukola A. Onyekwelu, Adigwe Wilfred, Richard E. Eyo","doi":"10.35940/ijeat.e4153.0612523","DOIUrl":null,"url":null,"abstract":"Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecurity and high-profile cyber-attacks. In recent times, information security scientists and researchers had developed various cryptographic schemes that defeated attacks using the most sophisticated (in terms of processor speed) classical computer. However, this resistance will soon erode with the arrival of quantum computers. In this paper, we profiled quantum computers and quantum algorithms based on their widely believed threat against currently secure cryptographic primitives. We found that Grover’s and Shor’s quantum-based algorithms actually pose a threat to the continued security of symmetric cryptosystems (e.g. 128-bit AES) and asymmetric (public key) cryptosystems (e.g. RSA, Elgamal, elliptic curve Diffie Hellman (ECDH), etc.) respectively.We discovered that the source of the algorithms’ cryptanalytic power against the current systems, stems from the fact that they (Grover and Shor) both equipped their respective algorithms with a quantum circuit component that can execute the oracle in parallel by applying a single circuit to all possible states of an n-qubit input. With this exponential level of processing characteristic of quantum computers and quantum-based algorithms, it is easy for the current cryptosystems to be broken since the algorithms can existentially solve the underlying mathematical problems such as integer factorization, discrete logarithm problem and elliptic curve problem, which formed the basis of the security of the affected cryptosystems. Based on this realization and as part of our readiness for a post quantum era, we explored other mathematical structures (lattices, hashes, codes, isogenies, high entropy-based symmetric key resistance, and multivariate quadratic problems) whose hardness could surpass the cryptanalytic nightmare posed by quantum computers and quantum-based algorithms. Our contribution is that, based on the findings of this research work, we can confidently assert that all hope is not lost for organizations heavily relying on protocols and applications like HTTPS, TLS, PGP, Bitcoin, etc., which derived their security from the endangered cryptosystems.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"52 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering and Advanced Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35940/ijeat.e4153.0612523","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecurity and high-profile cyber-attacks. In recent times, information security scientists and researchers had developed various cryptographic schemes that defeated attacks using the most sophisticated (in terms of processor speed) classical computer. However, this resistance will soon erode with the arrival of quantum computers. In this paper, we profiled quantum computers and quantum algorithms based on their widely believed threat against currently secure cryptographic primitives. We found that Grover’s and Shor’s quantum-based algorithms actually pose a threat to the continued security of symmetric cryptosystems (e.g. 128-bit AES) and asymmetric (public key) cryptosystems (e.g. RSA, Elgamal, elliptic curve Diffie Hellman (ECDH), etc.) respectively.We discovered that the source of the algorithms’ cryptanalytic power against the current systems, stems from the fact that they (Grover and Shor) both equipped their respective algorithms with a quantum circuit component that can execute the oracle in parallel by applying a single circuit to all possible states of an n-qubit input. With this exponential level of processing characteristic of quantum computers and quantum-based algorithms, it is easy for the current cryptosystems to be broken since the algorithms can existentially solve the underlying mathematical problems such as integer factorization, discrete logarithm problem and elliptic curve problem, which formed the basis of the security of the affected cryptosystems. Based on this realization and as part of our readiness for a post quantum era, we explored other mathematical structures (lattices, hashes, codes, isogenies, high entropy-based symmetric key resistance, and multivariate quadratic problems) whose hardness could surpass the cryptanalytic nightmare posed by quantum computers and quantum-based algorithms. Our contribution is that, based on the findings of this research work, we can confidently assert that all hope is not lost for organizations heavily relying on protocols and applications like HTTPS, TLS, PGP, Bitcoin, etc., which derived their security from the endangered cryptosystems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
量子计算机和算法:对经典密码系统的威胁
当代加密算法能够抵御最强大的网络安全威胁和高调的网络攻击。最近,信息安全科学家和研究人员开发了各种加密方案,使用最复杂(就处理器速度而言)的经典计算机来击败攻击。然而,随着量子计算机的到来,这种阻力很快就会消失。在本文中,我们基于量子计算机和量子算法对当前安全密码原语的普遍威胁进行了分析。我们发现Grover 's和Shor 's基于量子的算法实际上分别对对称密码系统(例如128位AES)和非对称(公钥)密码系统(例如RSA, Elgamal,椭圆曲线Diffie Hellman (ECDH)等)的持续安全性构成威胁。我们发现,算法对当前系统的密码分析能力的来源,源于他们(Grover和Shor)都为各自的算法配备了量子电路组件,该组件可以通过将单个电路应用于n-量子位输入的所有可能状态来并行执行预言。由于量子计算机和基于量子算法的这种指数级处理特性,现有的密码系统很容易被破解,因为这些算法可以存在地解决整数分解、离散对数问题和椭圆曲线问题等潜在的数学问题,这些问题构成了受影响密码系统安全性的基础。基于这一认识,作为我们为后量子时代做好准备的一部分,我们探索了其他数学结构(格、哈希、代码、等基因、基于高熵的对称密钥阻力和多元二次问题),其硬度可能超过量子计算机和基于量子的算法所带来的密码分析噩梦。我们的贡献是,基于这项研究工作的发现,我们可以自信地断言,对于严重依赖HTTPS、TLS、PGP、比特币等协议和应用程序的组织来说,所有的希望都不会消失,这些协议和应用程序的安全性来自于濒危的密码系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Car Door Sound Quality Assessment - A Review for NVH Performance Research Airport Runway Crack Detection to Classify and Densify Surface Crack Type Computer-Aided Diagnosis System for Automated Detection of Mri Brain Tumors Smart Artificial Intelligence System for Heart Disease Prediction A Comprehensive Study on Failure Modes and Mechanisms of Thin Film Chip Resistors
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1