Progress in Quantum Computing Cryptography Attacks

被引:0
|
作者
Wang C. [1 ,2 ,3 ]
Yao H.-N. [1 ,2 ]
Wang B.-N. [1 ,2 ,5 ]
Hu F. [1 ,2 ]
Zhang H.-G. [6 ]
Ji X.-M. [4 ,6 ]
机构
[1] Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai University, Shanghai
[2] State Key Laboratory of Cryptology, Beijing
[3] Center for Quantum Computing, Peng Cheng Laboratory, Shenzhen, 518000, Guangdong
[4] College of Computer Information Science, Fujian Agriculture and Forestry University, Fuzhou
[5] College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai
[6] School of Cyber Science and Engineering, Wuhan University, Wuhan
来源
基金
中国国家自然科学基金;
关键词
Quantum annealing; Quantum attack; Quantum computing; Quantum computing cryptography; Traditional cryptography;
D O I
10.11897/SP.J.1016.2020.01691
中图分类号
学科分类号
摘要
Due to the limitations of hardware, the development of universal quantum computer devices is slow. At present, the maximum integer factorization by general Shor's algorithm is 85 (using the characteristics of Fermat numbers to factor the integer 85 with 8 qubits), which is not a threat to the practical 1024-bit RSA by Shor's algorithm. Since the universal quantum computer cannot be practical in a short time, the modern cryptography is still secure enough now. Quantum computing cryptography attack needs to explore new ways to enhance its quantum attacking ability: Firstly, whether quantum computing can assist/accelerate traditional cryptography attack mode and expand its more powerful quantum attacking ability on the basis of the existing quantum computing. Secondly, it is necessary to find quantum computing algorithms other than Shor's algorithm to explore quantum computing cryptographic attack. In this paper, various existing algorithms for integer factorization algorithms of quantum computing are studied and show optimistic potentials of quantum annealing algorithm and D-Wave quantum computer for deciphering the RSA cryptosystem. Such as Shor's algorithm (factor up to 85) via different platforms (like Hua-Wei quantum computing platform), quantum adiabatic computation via NMR (291311), D-Wave (purchased by Lockheed Martin and Google etc., has been initially used for image processing, machine learning, combinatorial optimization, and software verification etc.) quantum computer (factored up to 376289), quantum computing software environment provided by D-Wave (factor the integer 1001677 with 87 qubits) to obtain a higher success rate and extend it to a larger factorization scale. Actually, D-Wave using quantum annealing may be closer to cracking practical RSA codes than a general-purpose quantum computer (IBM) using Shor's algorithm. In addition, the model limitations and precision problems existing in the expansion of integer factorization to a larger scale are discussed. Majorities of scholars think Shor's algorithm as the unique and powerful quantum algorithm for cryptanalysis of RSA. Therefore, the current state of post-quantum cryptography research exclusively referred to potential threatens of Shor's algorithm. This paper analyzes the RSA deciphering method based on D-Wave quantum annealing principle, which is a new public key cryptography attack algorithm for quantum computing, and it is fundamentally different from Shor's algorithm in principle. It is the second effective quantum attack method (RSA deciphering) in addition to Shor's algorithm. Thus, the post-quantum cryptography research should further consider the potentials of D-Wave quantum computer for deciphering the RSA cryptosystem in future. Furthermore, Grover's quantum searching algorithm is applied to the elliptic curve side channel attack to expand its attack capability. It is a new effective public key cryptosystem attack method, which is helpful to expand the attack of quantum computing on other public key cryptosystem constitutions. Finally, the possibility of quantum artificial intelligence algorithm attacking NTRU and other post-quantum cryptography is discussed. It is necessary to explore a new cryptographic scheme that can resist the attack of quantum computing, and combine evolutionary cryptography with quantum artificial intelligence, which is expected to be applied to the design and analysis of cryptography algorithms in the post-quantum cryptography. © 2020, Science Press. All right reserved.
引用
收藏
页码:1691 / 1707
页数:16
相关论文
共 122 条
  • [1] Feynman R P., Quantum mechanical computers, Optics News, 11, 2, pp. 11-20, (1985)
  • [2] Feynman R P., Simulating physics with computers, International Journal of Theoretical Physics, 21, 6, pp. 467-488, (1982)
  • [3] Wang Chao, Wang Yun-jiang, Hu Feng, Shaping the future of commercial quantum computer and the challenge for information security, Chinese Journal of Network and Information Security, 2, 3, pp. 17-27, (2016)
  • [4] Bennett C H, Shor P W., Quantum information theory, IEEE Transactions on Information Theory, 44, 6, pp. 2724-2742, (1998)
  • [5] Castelvecchi D., Quantum computers ready to leap out of the lab in 2017, Nature, 514, 7635, pp. 9-10, (2017)
  • [6] Gibney E., Physics: Quantum computer quest, Nature News, 516, 7529, (2014)
  • [7] Brainard J., What's coming up in 2018, Science, 359, 6371, pp. 10-12, (2018)
  • [8] Cho A., DOE pushes for useful quantum computing, Science, 359, 6372, pp. 141-142, (2018)
  • [9] Arute F, Arya K, Babbush R, Et al., Quantum supremacy using a programmable superconducting processor, Nature, 574, 7779, pp. 505-510, (2019)
  • [10] Pednault E, Gunnels J A, Nannicini G, Et al., Leveraging Secondary Storage to Simulate Deep 54-qubit Sycamore Circuits, (2019)