How Quantum Computers Could Quickly Break Encription π±
Primer on Encryption with Prime Numbers
The way things are encrypted today is to use public and private keys. A public key is created by generating two massive prime numbers, and each public key is unique. The private key is just one of those prime numbers. How they are used:
- Say Jason wants to send an encrypted message to Jessica.
- Jason fetches Jessicaβs public key and inputs it into a cryptographic hash function along with his message.
- Jason sends the message to Jessica, who can only read it if she inputs her private key into the decryption algorithm. Encryption only requires public key, whereas decryption requires a private key.
So if someone wanted to read the message, they would need to compute Jessicaβs private key by factoring the public key . Letβs try to hack open this message.
Decrypting the Message
To create Jessicaβs public key, say she multiple two prime numbers and together to get , where is her private key. So, we are given , but we need . Letβs try the following strategy to get .
- Guess a random positive integer
- We want to find a positive, even prime number such that: or where is some positive integer. This number exists as long as and are coprime (proof below).
- Once we find , we calculate .
- if is even and both and are not multiples of , then we know that and must contain factors of .
- Therefore, they contain and as factors
- 37.5% of the time, these conditions are met from a random guess of
- We can find the common factors between , , and to get the values of and .
Complexity in decryption stems from getting the right .
Look at Proof #2 : https://en.wikipedia.org/wiki/Eulerβs_theorem#Proofs
- Basically if you have a set of values abiding by these https://en.wikipedia.org/wiki/Reduced_residue_system conditions, then if you multiply the set by some constant thatβs coprime to ( in Wiki), the set of values will have the same modulo/remainder values, although they may be in a different order.
- Then with some algebra manipulation, you can show that after multiplying this constant by itself totient(N) times, it will have a remainder of 1 when divided by .
Use a Quantum Computer
- Guess a random positive integer
- Create quantum state which a value for every possible guess of (letβs call each of these guesses ) and the corresponding value of for that guess (<, )
- Notice that and thus multiplying/dividing by any power of , will result in the same remainder . For example, suppose , then
- So, is actually the smallest unit of distance we can move from to reach the next value with as the base that has the same remainder/modulo.
- This means that if we take only the set of guesses for in the quantum state that have a remainder/modulo of , the distance between these guesses will be . For example, we would have values in the state of <6,7>, <15,7>, <24,7>,β¦, which would mean that (the distance between each ).
- This is equivalent to a wave with a period of (frequency of ). So, using a quantum computer where we want to get rid of the states that donβt match the same values of , we can input this into the quantum equivalent of a Fourier transform to then just have as output, frequency of the wave, which gives us the value of .
Now we and so we can calculate the private key!
Real RSA Encryption
http://mathonline.wikidot.com/rsa-encryption#toc0
Notes mentioning this note
There are no notes linking to this note.