Upgrade to Pro — share decks privately, control downloads, hide ads and more …

How Will Cryptography Survive the Rise of Quant...

Rakhim
March 26, 2019

How Will Cryptography Survive the Rise of Quantum Computing?

The most widely used cryptography today is based upon a handful of ideas from number theory. The key to the security of most communications in the world lies in the sheer scale of the computation required to break codes. But some quantum algorithms will definitely reduce the computation time from billions of years to few hours, rendering modern cryptography useless. How will cryptography survive the rise of quantum computing? Or is there nothing to worry about?

Rakhim

March 26, 2019
Tweet

More Decks by Rakhim

Other Decks in Education

Transcript

  1. fsl hzrlk qvbrv rbtwbsh, h zlupvy zjpluapza ha aol uhabyhs

    ylzvbyjlz puzapabal mpushuk (sbrl), ovd thuf dopal ylpuklly hyl pu mhja dhuklypun hyvbuk shwshuk’z mlssz. ”mvy lclyf vul obukylk ylpuklly ivyu, pa’z busprlsf vul dpss il jvtwslalsf dopal,” ol lewshpulk, hkkpun aoha aolyl thf il h zuvd- dopal pukpcpkbhs pu h nyvbw vm h mld obukylk hupthsz. dopal ylpuklly hyl hszv bzbhssf mlthsl, hjjvykpun av rbtwbsh. ”dopal ylpuklly hylu’a uljlzzhypsf hsipuvz, aolf hyl aol ylzbsa vm jvsvby tbahapvuz. hu hsipuv ylpuklly dpss ohcl wpur lflz, uhpsz huk zrpu, huk hyl mhy yhyly aohu aol dopal
  2. easy hard P Q N multiply P x Q N

    find P and Q P Q prime numbers Cryptography on a computer 2
  3. 1. Pick two
 primes 2. Multiply them 2 P 7

    Q 14 N Cryptography on a computer 2
  4. 1. Pick two
 primes 2. Multiply them 2 P 7

    Q 14 N 3. Find φ(N) = (P-1)(Q-1) 6 φ(N) Cryptography on a computer 2
  5. 1. Pick two
 primes 2. Multiply them 2 P 7

    Q 14 N 3. Find φ(N) = (P-1)(Q-1) 6 φ(N) 4. Choose E 1 < E < φ(N) co-prime with N, φ(N) { 5 E such that Cryptography on a computer 2
  6. 1. Pick two
 primes 2. Multiply them 2 P 7

    Q 14 N 3. Find φ(N) = (P-1)(Q-1) 6 φ(N) 4. Choose E 1 < E < φ(N) co-prime with N, φ(N) { 5 E 5. Choose D such that d×e (mod φ(N)) = 1 such that 11 D Cryptography on a computer 2
  7. 14 N 5 E Cryptography on a computer: RSA 2

    11 D Private 14 N 5 E Public
  8. c "c" → 3 3E (mod 14) = 35 (mod

    14) = 243 (mod 14) = 5 Cryptography on a computer: RSA 2 11 D Private 14 N 5 E Public 14 N 5 E
  9. 11 D Private 14 N 5 E Public 5 5D

    (mod 14) = 511 (mod 14) = 48828125 (mod 14) = 3 → "c" Cryptography on a computer: RSA 2
  10. 0 1

  11. 0 1

  12. Popular Quantum Computing Level 2 0 and 1 at the

    same time PARALLEL COMPUTATION!!!
  13. 1. the answer is x 2. the answer is x

    3. the answer is x 4. the answer is y 5. the answer is z 6. the answer is x 7. the answer is w 8. the answer is x 9. the answer is x 10. the answer is z Find factors of N Find period of a function
  14. 1. the answer is x 2. the answer is x

    3. the answer is x 4. the answer is y 5. the answer is z 6. the answer is x 7. the answer is w 8. the answer is x 9. the answer is x 10. the answer is z Find factors of N Find period of a function Shor's Algorithm
  15. 0 1 0 or 1 0 or 1 1 0

    0 or 1 0 or 1
  16. Learn more about quantum computing and cryptography • "Quantum computing

    for the very curious" (interactive essay)
 https://quantum.country/qcvc • Scott Aaronson's blog
 https://www.scottaaronson.com/blog/ • And his book "Quantum Computing since Democritus" • "Frame of Essense"
 https://www.youtube.com/user/frameofessence