cracking rsa with quantum computing
play

Cracking RSA with Quantum Computing Max Ovsiankin May 9, 2018 Max - PowerPoint PPT Presentation

The Setting Classical Computers Quantum Computers Shors Algorithm Cracking RSA with Quantum Computing Max Ovsiankin May 9, 2018 Max Ovsiankin Cracking RSA with Quantum Computing The Setting Classical Computers Quantum Computers


  1. The Setting Classical Computers Quantum Computers Shor’s Algorithm Cracking RSA with Quantum Computing Max Ovsiankin May 9, 2018 Max Ovsiankin Cracking RSA with Quantum Computing

  2. The Setting Classical Computers Quantum Computers Shor’s Algorithm Outline The Setting 1 Classical Computers 2 Quantum Computers 3 Shor’s Algorithm 4 Max Ovsiankin Cracking RSA with Quantum Computing

  3. The Setting Classical Computers Quantum Computers Shor’s Algorithm The Setting RSA is a commonly used set of algorithms that provides security when sending encrypted messages. Max Ovsiankin Cracking RSA with Quantum Computing

  4. The Setting Classical Computers Quantum Computers Shor’s Algorithm The Setting RSA is a commonly used set of algorithms that provides security when sending encrypted messages. Crucially, the security of RSA depends on the hardness of factoring a number N = pq , where p and q are large prime numbers (’secrecy’). Max Ovsiankin Cracking RSA with Quantum Computing

  5. The Setting Classical Computers Quantum Computers Shor’s Algorithm The Setting RSA is a commonly used set of algorithms that provides security when sending encrypted messages. Crucially, the security of RSA depends on the hardness of factoring a number N = pq , where p and q are large prime numbers (’secrecy’). Max Ovsiankin Cracking RSA with Quantum Computing

  6. The Setting Classical Computers Quantum Computers Shor’s Algorithm The Setting An assumption of RSA security (that follows from P � = NP ) is that prime numbers cannot be factored with a polynomial-time algorithm in the number of bits of N . Max Ovsiankin Cracking RSA with Quantum Computing

  7. The Setting Classical Computers Quantum Computers Shor’s Algorithm The Setting An assumption of RSA security (that follows from P � = NP ) is that prime numbers cannot be factored with a polynomial-time algorithm in the number of bits of N . Quantum computers are able to factor in polynomial time. This talk will focus on explaining how quantum algorithms work, building up to Shor’s famous algorithm for factoring. Max Ovsiankin Cracking RSA with Quantum Computing

  8. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like Equivalent to a circuit whose representation can be quickly computed: Max Ovsiankin Cracking RSA with Quantum Computing

  9. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like We can think of a circuit as having n registers, each of which contain 0 or 1. A possible state of these n registers is an element of { 0 , 1 } n (n-length bitstring). Then the action of a gate can be described as a matrix of 0s and 1s. Max Ovsiankin Cracking RSA with Quantum Computing

  10. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like: NOT gate NOT gate: NOT (0) = 1 NOT (1) = 0 Max Ovsiankin Cracking RSA with Quantum Computing

  11. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like: NOT gate NOT gate: NOT (0) = 1 NOT (1) = 0 � 1 � � 0 � Let’s relabel 0 = , 1 = . 0 1 Elements of a 2-element vector space, as there are 2 possibilities for bits. Max Ovsiankin Cracking RSA with Quantum Computing

  12. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like: NOT gate NOT gate: �� 1 �� � 0 � NOT = 0 1 �� 0 �� � 1 � NOT = 1 0 This strongly suggests we can consider it as a matrix: � 0 � 1 NOT = 1 0 Max Ovsiankin Cracking RSA with Quantum Computing

  13. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like: AND gate AND gate: AND (0 , 0) = 0 AND (0 , 1) = 0 AND (1 , 0) = 0 AND (1 , 1) = 1 Max Ovsiankin Cracking RSA with Quantum Computing

  14. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like: AND gate For two input bits, there are 4 = 2 2 possible states. (0 , 0) = | 00 � = | 0 � ⊗ | 0 � (0 , 1) = | 01 � = | 0 � ⊗ | 1 � (1 , 0) = | 10 � = | 1 � ⊗ | 0 � (0 , 1) = | 11 � = | 1 � ⊗ | 1 � Max Ovsiankin Cracking RSA with Quantum Computing

  15. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like: AND gate AND ( | 00 � ) = | 0 � AND ( | 01 � ) = | 0 � AND ( | 10 � ) = | 0 � AND ( | 11 � ) = | 1 � Max Ovsiankin Cracking RSA with Quantum Computing

  16. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like: AND gate AND (1 | 00 � + 0 | 01 � + 0 | 10 � + 0 | 11 � ) = 1 | 0 � + 0 | 1 � AND (0 | 00 � + 1 | 01 � + 0 | 10 � + 0 | 11 � ) = 1 | 0 � + 0 | 1 � AND (0 | 00 � + 0 | 01 � + 1 | 10 � + 0 | 11 � ) = 1 | 0 � + 0 | 1 � AND (0 | 00 � + 0 | 01 � + 0 | 10 � + 1 | 11 � ) = 0 | 0 � + 1 | 1 � Max Ovsiankin Cracking RSA with Quantum Computing

  17. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like: AND gate � 1 1 1 0 � (1 | 00 � + 0 | 01 � + 0 | 10 � + 0 | 11 � ) = 1 | 0 � + 0 | 1 � 0 0 0 1 � 1 1 1 0 � (0 | 00 � + 1 | 01 � + 0 | 10 � + 0 | 11 � ) = 1 | 0 � + 0 | 1 � 0 0 0 1 � 1 � 1 1 0 (0 | 00 � + 0 | 01 � + 1 | 10 � + 0 | 11 � ) = 1 | 0 � + 0 | 1 � 0 0 0 1 � 1 � 1 1 0 (0 | 00 � + 0 | 01 � + 0 | 10 � + 1 | 11 � ) = 0 | 0 � + 1 | 1 � 0 0 0 1 Max Ovsiankin Cracking RSA with Quantum Computing

  18. The Setting Classical Computers Quantum Computers Shor’s Algorithm What Computers Look Like: AND gate Okay, we have a vector space now. What about linear combinations? � 1 1 1 0 � � 1 2 | 00 � + 0 | 01 � + 1 4 | 10 � + 1 � 4 | 11 � = ??? 0 0 0 1 Max Ovsiankin Cracking RSA with Quantum Computing

  19. The Setting Classical Computers Quantum Computers Shor’s Algorithm What changes for Quantum? The state of an n -bit classical computer is a vector in R 2 n with only one coefficient nonzero. (we already saw this in explaining classical computers) Max Ovsiankin Cracking RSA with Quantum Computing

  20. The Setting Classical Computers Quantum Computers Shor’s Algorithm What changes for Quantum? The state of an n -bit classical computer is a vector in R 2 n with only one coefficient nonzero. (we already saw this in explaining classical computers) The state of an n - qu bit quantum computer is a vector in C 2 n that is normalized (this reflects the underlying quantum property of superposition): a 0 | 00 � + a 1 | 01 � + a 2 | 10 � + a 3 | 11 � i =0 | a i | 2 = 1 (unit vectors) with a i ∈ C and � n − 1 Max Ovsiankin Cracking RSA with Quantum Computing

  21. The Setting Classical Computers Quantum Computers Shor’s Algorithm What changes for Quantum? The operation we perform on a n -qubit ‘register’ is to measure it. Max Ovsiankin Cracking RSA with Quantum Computing

  22. The Setting Classical Computers Quantum Computers Shor’s Algorithm What changes for Quantum? The operation we perform on a n -qubit ‘register’ is to measure it. a 0 | 00 � + a 1 | 01 � + a 2 | 10 � + a 3 | 11 � Max Ovsiankin Cracking RSA with Quantum Computing

  23. The Setting Classical Computers Quantum Computers Shor’s Algorithm What changes for Quantum? The operation we perform on a n -qubit ‘register’ is to measure it. a 0 | 00 � + a 1 | 01 � + a 2 | 10 � + a 3 | 11 � This produces | 00 � with probability | a 0 | 2 , | 01 � with probability | a 1 | 2 , etc. Max Ovsiankin Cracking RSA with Quantum Computing

  24. The Setting Classical Computers Quantum Computers Shor’s Algorithm Quantum Gates Our quantum gates now take unit complex vectors to unit complex vectors (they are exactly the unitary matrices)! Max Ovsiankin Cracking RSA with Quantum Computing

  25. The Setting Classical Computers Quantum Computers Shor’s Algorithm Quantum Gates Our quantum gates now take unit complex vectors to unit complex vectors (they are exactly the unitary matrices)! Hadmard 1 � 1 1 � √ 1 − 1 2 Max Ovsiankin Cracking RSA with Quantum Computing

  26. The Setting Classical Computers Quantum Computers Shor’s Algorithm Quantum Gates Our quantum gates now take unit complex vectors to unit complex vectors (they are exactly the unitary matrices)! c-NOT Hadmard   1 0 0 0 1 � 1 1 � 0 1 0 0   √   1 − 1 0 0 0 1 2   0 0 1 0 Max Ovsiankin Cracking RSA with Quantum Computing

  27. The Setting Classical Computers Quantum Computers Shor’s Algorithm Quantum Gates Our quantum gates now take unit complex vectors to unit complex vectors (they are exactly the unitary matrices)! c-NOT Hadmard Phase Rotation   1 0 0 0 1 � 1 1 � 0 1 0 0 � 1 0 �   √   e i π 1 − 1 0 0 0 1 0 2 4   0 0 1 0 Max Ovsiankin Cracking RSA with Quantum Computing

  28. The Setting Classical Computers Quantum Computers Shor’s Algorithm Comparison to Classical NOT (1 | 0 � + 0 | 1 � ) = 0 | 0 � + 1 | 1 � NOT (0 | 0 � + 1 | 1 � ) = 1 | 0 � + 0 | 1 � Max Ovsiankin Cracking RSA with Quantum Computing

Recommend


More recommend