Abstract
Quantum computing is the technology that allows complex operation and representation of computer state utilizing properties of photons such as superposition and entanglement as described by the theory of quantum mechanics. Therefore, quantum computing plays an increasingly important role in cryptography due to innovations it introduced such as quantum phase estimation and quantum key distribution. These innovations can reinforce, or compromise tools and schemes used in classical cryptography e.g. Shor’s algorithm and one-time pad. In this paper, a simulation of prime factorization with Shor’s algorithm is performed using qiskit. A success rate of 55% is achieved in 503 attempts. In response to the advancement of quantum computers and its ability to break popular encryption schemes as RSA, post-quantum classical cryptography protocols such as XMSS and LMS are introduced.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Asfaw, A., et al.: Learn quantum computation using qiskit (2020)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7–11 (2014)
Blanda, S.: Shor’s algorithm – breaking RSA encryption (2014)
Buchmann, J., Dahmen, E., Hülsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117–129. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25405-5_8
Huang, D., Chen, Z.: Quantum key distribution based on multi-qubit hadamard matrices. In: 2008 The Fourth International Conference on Information Assurance and Security, pp. 333–337. 2008 The Fourth International Conference on Information Assurance and Security (2008)
Mailloux, L.O., et al.: Quantum key distribution: examination of the decoy state protocol. IEEE Commun. Mag. 53, 24–31 (2015)
McGrew, D., Curcio, M., Fluhrer, S.: Leighton-Micali Hash-Based Signatures. RFC 8554 (2019)
Rieffel, E., Polak, W.: Quantum Computing: A Gentle Introduction. Scientific and Engineering Computation, The MIT Press, Cambridge (2011)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Voorhoede, D.: What is a qubit?
Wang, W., et al.: XMSS and embedded systems. In: Paterson, K.G., Stebila, D. (eds.) SAC 2019. LNCS, vol. 11959, pp. 523–550. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-38471-5_21
Acknowledgments
This research was supported in part by the Air Force Research Laboratory Academy Center for Cyberspace Research (ACCR) Directorate, through the Air Force Office of Scientific Research Summer Faculty Fellowship Program\(^{\textregistered }\), Contract Numbers FA8750-15-0-6003 and FA9550-15-0001 and and NASA M-STAR Grant# 80NSSC20K1859.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Yung, C.T.A. et al. (2022). Quantum Computing and Its Application in Cryptography. In: Arai, K. (eds) Proceedings of the Future Technologies Conference (FTC) 2021, Volume 3. FTC 2021. Lecture Notes in Networks and Systems, vol 360. Springer, Cham. https://doi.org/10.1007/978-3-030-89912-7_23
Download citation
DOI: https://doi.org/10.1007/978-3-030-89912-7_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-89911-0
Online ISBN: 978-3-030-89912-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)