Beruflich Dokumente
Kultur Dokumente
Student Name
Course Name
January 9, 2021
2
Abstract
This paper aims to clarify quantum computation's effects in current cryptography and
present the reader with simple post-quantum algorithms. The Post-Quantum Cryptography
section primarily contracts through numerous quantum key distribution strategies and
code-based cryptography. Some tend to call this 'death of public-key encryption' the next step in
the computer process. We claim that this is not the case and that certain mathematics fields can
construct 'quantum tolerant.' We offer a high-level analysis of the danger faced by quantum
computers with the examples of RSA and Short's algorithm. Still, we clarify why we suspect that
in the future, there is a possibility that some quantum algorithms will pose a threat to public-key
encryption schemes.
Table of Contents
Abstract............................................................................................................................................1
Introduction......................................................................................................................................2
Quantum Computing.......................................................................................................................3
Present Cryptography......................................................................................................................6
Symmetric Cryptography.............................................................................................................6
Asymmetric Cryptography...........................................................................................................6
Grover’s Algorithm......................................................................................................................9
Post-Quantum Cryptography.........................................................................................................11
Conclusion.....................................................................................................................................11
4
Introduction
Quantum computer has certainly become the most significant technical foundation of the
modern era, developments in technology, and electronic communication. In data processing and
data storage, the need for anonymity, honesty, validity, and republication make cryptographing
technology one of the most important areas for IT. The safe transit data or stored by third-party
opponents is cryptographic, etymologically derived from the Greek term secret and written. Two
forms of cryptosystems are available: the symmetric and asymmetric concept of quantum
computing, first proposed by Richard Feynman in 1982. It was thoroughly investigated and is the
In comparison, symmetrical cryptography can, with the use of larger key spaces, be
influenced by such quantum algorithms[CITATION Mav18 \p 406-409 \l 1033 ]. Initially, the rest of
this paper analyses symmetrical cryptography, asymmetrical cryptography, and hash functions.
In specific, the accent is on algorithms that use both the complexity and the discrete problem
with the logarithm to factor large prime numbers. Also, we implement two important quantum
algorithms, namely the Shor and the Grover Algorithm, respectively, which can have an
immense effect on asymmetric cryptography and less symmetric[ CITATION Buc161 \l 1033 ].
Quantum Computing
Production is achieved using bits on the computers with which we are acquainted. There
are two potential values for a bit: 0 and 1. A quantum machine uses qubits, and a concept applied
to quantum money by Stephen Weisner. A qubit is also 0 or 1 when calculated, but both 0 and 1
quantum mechanics. People have the same number of possible states in a bit-based computer, but
Quantum mechanics has several modern features that physicists will use to create
quantum computers that are very different from the conventional devices used today.
Production is achieved using bits on the machines with which we are acquainted. There
are two potential values for a bit: 0 and 1. A quantum machine uses qubits, a concept proposed in
the proposal for quantum money by Stephen Weisner. A qubit is also 0 or 1 when calculated, but
'superposition' in quantum mechanics. You have the same amount of statuses in a bit-based
Quantum Key Distribution solves the protected sharing of the cryptographic key over an
insecure channel between two pieces. QKD depends on quantum mechanics' basic properties that
are not computationally generalized and can be achieved using light, lasers, fibreoptics, and free
space transfer. Protocols of preparation and measure use the Heisenberg Indecision rule, which
says that there are alterations in the measurement act in a quantum state. This makes essaying on
a contact platform without leaving any trace impossible for an intruder. If the legal exchanges
occur, the incorrect information will be discarded, and the sum of data that was intercepted was
In BB84 Entanglement (EB) protocols, the property was abused using pairs of entangled
objects exchanged by the two parties. Measurement of one thing will also impact the other.
Practice that every entity intercepting any item is exchanged between two legal exchanges if it
affects the method. The existence of an intruder will be revealed along with the amount of
information the attacker received. The E91 protocol was used for this property. The above
methods are further categorized into three families: discreet coding, continuous coding of the
variable, and dispersed coding process. The biggest distinction in the type of detection system
Present Cryptography
Symmetric Cryptography
The sender and recipient use the same private key and the same encryption algorithm to
encrypt and decrypt the symmetrical cryptography data. For example, the message can be
encrypted by Alice using the shared secret key, and the message can be interpreted by Bob using
the same encryption algorithm used by Alice using a similar shared secret key. The key must be
kept confidential so that Alice and Bob are aware of it. An effective way to share private keys on
7
public networks is also necessary. To solve the key distribution problem in symmetrical
Asymmetric Cryptography
Asymmetric encryption is an encryption method in which the keys occur in pairs. The
private and public keys for each party should be their own. For example, if Bob wished to
encrypt a letter, Alice will give Bob its public access, and then Alice's public key will encrypt
Bob's message. Then Bob will share Alice, who can decode the message using her private key,
the encrypted message. People then encrypt the transmission by public access and decrypt the
message only for the private key. In comparison, digital signatures use asymmetric
Most probabilistic quantum algorithms. This test and error undermine the benefit of
Qubits are error-prone. Heat, ambient noise, as well as stray electromagnetic connections
may impact them. Classical machines can be a bit contradictory. Bit-flips and phase
The complexity of continuity is another problem. For a brief period, Qubits may maintain
their quantum states. Researchers at New South Wales University in Australia have
developed two kinds of quits (Phosphoric and Artificial atoms) that they can use to
remove the magnetic noise that makes them vulnerable to an error with small
This section discusses the effect on the present cryptography of quantum algorithms and
offers an introduction to Shor and Grover's algorithm. Note that the Shor algorithm renders
algorithms vulnerable in the following paragraph, relying on factorizing and computing discrete
logarithms. In any electronic communication device today, cryptography plays an important role.
Email, password, financial transfers, or even electronic voting devices are, for example, subject
to the same security objectives, including secrecy and honesty. Cryptography means the
encrypted message is read-only by parties who share keys. Quantum computers challenge the
key purpose of all safe and authentic communication because they can do computers that
traditional computers are unable to create. As a result, quantum computers can easily break down
the cryptography key by measuring or thoroughly searching all the hidden keys, enabling a
"Quantum computing algorithms demonstrate that large integer factorization can shift
with a quantum computer in theory. Short algorithms can collapse modern asymmetrically since
they are built upon a large factoring prime integer or the discreet logarithm problem. We use the
following example to explain how a short's algorithm renders big numbers[ CITATION Kha181 \l
1033 ]. The prime factors of number 15 are to be discovered. For this, a 4-qubit register is
needed. The 4-qubit register of a conventional machine is visualized as standard 4-bit registries.
In binary number 15 is 1111, a 4-qubit record is adequate to satisfy this number (calculate).
According to Bone and Castro, a registry calculation should be viewed as parallel estimates for
any future value the registry can take (0-15). This is also the only move on the quantum
• X shall be increased to the register's power (all conceivable state) and consequently split by n
the rest of the operation shall be held in a second 4-qubit register. The second register also has
the effects of the overlay. Suppose x = 2 that is greater than 1 and less than 14.
Additionally, for the calculation of discrete logarithm problems, the Shor algorithm can be used.
Vazirani analyzed the Shor algorithm's technique in greater detail and demonstrated that a new
overlay could be developed with two high- probability integers that satisfy an equation, starting
from the random overlapping status of two integers and performing a series of Fourier
transformations. Using this equation, the unknown exponent in the DLP r can be determined.
10
Grover's Algorithm
Grover algorithm has generated an algorithm that scans non-sorted datasets using
queries. Also, the N/2 quest for the same entry is required for a traditional computer. Bone and
Castro reported on the effect of Grover's algorithm for breaking a 56-bit card, Data Encryption
Standard (DES). The authors noted that only 185 searches are required to find the main
telecommunication. The Quantum Direct Transmitting Paradigm is the easiest way to relay
quantum signals in multiple locations. The model for direct quantum contact. Over a quantum
channel, Alice needs to interact with Bob. Alice first has to generate a sequence of photons using
a training device for the message she wishes to communicate with Bob in the quantum direct
transmission model. In this case, external noise will easily interrupt the quantum channel. The
Bob receiver then initially encodes QECC for the signal received and then encodes the quantum
qubits can not only be indifferent orthogonal overlays but can also be in an interconnected state.
Conclusion
This paper concluded that quantum computing. The processing and storing of information
must be as secure as possible in today's world, where data is especially valuable. Year by year,
we appear to be closer to building a fully working, universal quantum computer that uses solid
quantum algorithms such as Shor's and Grover's. This technical development outcome is that the
existing public key, stable algorithms such as RSA and Elliptic Curve Cryptosystems have
completely crashed. However, algorithms have been introduced to bypass the current asymmetric
cryptographic method whose stability is based on producing big prime numbers and the
algorithm's discrete problem. Even the most reliable and powerful way against quantum
computers is thought to be elliptically curved cryptography, it seems. There is also a need for
robust quantum calculation cryptographic algorithms. Quantum world simulations are also highly
resourceful, and they lack correctness for larger structures, such as molecules. Quantum
simulations can give a new insight into proteins, which can revolutionize the medical field.
References
Ahmad, J. I., Din, R., & Ahmad, M. (2018). Analysis review on public-key cryptography
https://www.researchgate.net/publication/327250575_Analysis_Review_on_Public_Key_
Cryptography_Algorithms
Buchanan, W. J., & Woodward, A. (2016). Will quantum computers be the end of public key
https://www.researchgate.net/publication/308387440_Will_quantum_computers_be_the_
end_of_public_key_encryption
13
Campagna, M., Ding, J., & Hayford, D. (2015). Quantum safe cryptography and security.
Retrieved from
https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf
Khan, A. G., Basharat, S., & Riaz, M. U. (2018). Analysis of asymmetric cryptography in
https://www.researchgate.net/publication/328630416_Analysis_of_asymmetric_cryptogr
aphy_in_information_security_based_on_computational_study_to_ensure_confidentiality
_during_information_exchange
Mavroeidis, V., Kamer Vishi, M. D., & Jøsang, A. (2018). The impact of quantum computing on
https://www.researchgate.net/publication/324115273_The_Impact_of_Quantum_Comput
ing_on_Present_Cryptography
Zhou, T., Shen, J., & Wang, C. (2018). Quantum cryptography for the future internet and the
https://www.hindawi.com/journals/scn/2018/8214619/