Skip to main content

Quantum Computing and Its Application in Cryptography

  • Conference paper
  • First Online:
Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3 (FTC 2021)

Abstract

Quantum computing is the technology that allows complex operation and representation of computer state utilizing properties of photons such as superposition and entanglement as described by the theory of quantum mechanics. Therefore, quantum computing plays an increasingly important role in cryptography due to innovations it introduced such as quantum phase estimation and quantum key distribution. These innovations can reinforce, or compromise tools and schemes used in classical cryptography e.g. Shor’s algorithm and one-time pad. In this paper, a simulation of prime factorization with Shor’s algorithm is performed using qiskit. A success rate of 55% is achieved in 503 attempts. In response to the advancement of quantum computers and its ability to break popular encryption schemes as RSA, post-quantum classical cryptography protocols such as XMSS and LMS are introduced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Asfaw, A., et al.: Learn quantum computation using qiskit (2020)

    Google Scholar 

  2. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7–11 (2014)

    Article  MathSciNet  Google Scholar 

  3. Blanda, S.: Shor’s algorithm – breaking RSA encryption (2014)

    Google Scholar 

  4. Buchmann, J., Dahmen, E., Hülsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117–129. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25405-5_8

    Chapter  Google Scholar 

  5. Huang, D., Chen, Z.: Quantum key distribution based on multi-qubit hadamard matrices. In: 2008 The Fourth International Conference on Information Assurance and Security, pp. 333–337. 2008 The Fourth International Conference on Information Assurance and Security (2008)

    Google Scholar 

  6. Mailloux, L.O., et al.: Quantum key distribution: examination of the decoy state protocol. IEEE Commun. Mag. 53, 24–31 (2015)

    Article  Google Scholar 

  7. McGrew, D., Curcio, M., Fluhrer, S.: Leighton-Micali Hash-Based Signatures. RFC 8554 (2019)

    Google Scholar 

  8. Rieffel, E., Polak, W.: Quantum Computing: A Gentle Introduction. Scientific and Engineering Computation, The MIT Press, Cambridge (2011)

    MATH  Google Scholar 

  9. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  10. Voorhoede, D.: What is a qubit?

    Google Scholar 

  11. Wang, W., et al.: XMSS and embedded systems. In: Paterson, K.G., Stebila, D. (eds.) SAC 2019. LNCS, vol. 11959, pp. 523–550. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-38471-5_21

    Chapter  Google Scholar 

Download references

Acknowledgments

This research was supported in part by the Air Force Research Laboratory Academy Center for Cyberspace Research (ACCR) Directorate, through the Air Force Office of Scientific Research Summer Faculty Fellowship Program\(^{\textregistered }\), Contract Numbers FA8750-15-0-6003 and FA9550-15-0001 and and NASA M-STAR Grant# 80NSSC20K1859.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed El-Hadedy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yung, C.T.A. et al. (2022). Quantum Computing and Its Application in Cryptography. In: Arai, K. (eds) Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3. FTC 2021. Lecture Notes in Networks and Systems, vol 360. Springer, Cham. https://doi.org/10.1007/978-3-030-89912-7_23

Download citation

Publish with us

Policies and ethics