QUANTUM PERIOD FINDING PROBLEM AS A DRIVER OF QUANTUM CRYPTANALYSIS

Євген Володимирович Котух, Romain Murenzi, Aidan Zlotak

Анотація


The paper explores the foundational role of quantum period-finding algorithms, particularly in the context of cryptography. The work focuses on quantum algorithms that exploit periodicity, such as Shor's algorithm, which is central to efficient integer factorization. It emphasizes the challenges quantum algorithms face when applied to non-abelian groups like Suzuki, Hermitian, and Ree groups, which exhibit complex periodic structures that are difficult to solve with existing quantum techniques. The research delves into the structure and properties of these groups, explaining the complexity of their representations and the challenges quantum Fourier transform (QFT) presents in these cases. It contrasts the relative ease with which abelian groups can be addressed using quantum algorithms with the exponential complexity encountered with non-abelian groups. The study provides a comparative analysis of the computational complexity between classical and quantum approaches for period finding across various group types, highlighting that while quantum algorithms offer exponential speedup for abelian cases, non-abelian structures remain a frontier for further research. The conclusion calls for continued exploration in quantum representation theory and cryptanalysis, particularly for non-abelian groups, where current quantum techniques have not yet provided efficient solutions. The period-finding problem is identified as critical for advancing both quantum computing and cryptographic applications.

Повний текст:

PDF

Посилання


Shor, P. W. (1997). Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing, 26(5), 1484–1509. https://epubs.siam.org/doi/10.1137/S0097539795293172

Nielsen, M. A., & Chuang, I. L. (2002). Quantum Computation and Quantum Information. Cambridge University Press. https://shorturl.at/09toE

Watrous, J. (2009). Quantum Computational Complexity. In: Meyers, R. (eds) Encyclopedia of Complexity and Systems Science. Springer, New York, NY. https://doi.org/10.1007/978-0-387-30440-3_428

Pollard, J. M. (1975). A Monte Carlo method for factorization. BIT Numerical Mathematics, 15(3), 331-334. https://link.springer.com/article/10.1007/BF01933667

Simon, D. R. (1994). On the Power of Quantum Computation. Proceedings of the 35th Annual Symposium on Foundations of Computer Science. https://ieeexplore.ieee.org/document/365701

Roetteler, M., & Beth, T. (1998). Polynomial-time solution to the hidden subgroup problem for a class of non-abelian groups. arXiv preprint quant-ph/9812070. https://arxiv.org/abs/quant-ph/9812070

Kuperberg, G. (2005). A subexponential-time quantum algorithm for the dihedral hidden subgroup problem. SIAM Journal on Computing, 35(1), 170–188. https://epubs.siam.org/doi/10.1137/S0097539703436345

Hallgren, S., Russell, A., & Ta-Shma, A. (2003). The hidden subgroup problem and quantum computation using group representations. SIAM Journal on Computing, 32(4), 916–934. https://epubs.siam.org/doi/abs/10.1137/S0097539701391800

Bernstein, D. J., & Lange, T. (2017). Post-quantum cryptography. Nature, 549(7671), 188-194. https://www.nature.com/articles/nature23461

Regev, O. (2005). On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM, 56(6), 1-40. https://dl.acm.org/doi/10.1145/1568318.1568324

Peikert, C. (2016). A decade of lattice cryptography. Foundations and Trends in Theoretical Computer Science, 10(4), 283–424. https://shorturl.at/0CFgn

Y. Kotukh, G. Khalimov. Hard Problems for Non-abelian Group Cryptography. Fifth International Scientific and Technical Conference" Computer and Information systems and technologies". https://doi.org/10.30837/csitic52021232176

Y. Kotukh, G. Khalimov. Towards practical cryptoanalysis of systems based on word problems and logarithmic signatures. INFORMATION SECURITY: PROBLEMS AND PROSPECTS". https://shorturl.at/IaByX

Y. Kotukh, G. Khalimov. Advantages of logarithmic signatures in the implementation of crypto primitives. Challenges and Issues of Modern Science. https://cims.fti.dp.ua/j/article/download/119/158

Y. Kotukh. Quantum cryptoanalysis of prospective asymmetric cryptosystems. Proceedings of conference “Cybersecurity in energy sector”. https://shorturl.at/1pbcK


Посилання

  • Поки немає зовнішніх посилань.