Quantum Computing 101: How to Crack RSA Walter C. Daugherity Department of Computer Science Texas A&M University

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Public Key Encryption Algorithm
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Quantum Cryptography Marshall Roth March 9, 2007.
Public Key Cryptography
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Quantum Computing Joseph Stelmach.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Dr.Saleem Al_Zoubi1 Cryptography and Network Security Third Edition by William Stallings Public Key Cryptography and RSA.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Cryptography: RSA & DES Marcia Noel Ken Roe Jaime Buccheri.
Quantum Computing 101: How to Crack RSA Walter C. Daugherity Department of Computer Science Texas A&M University
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Public-Key Cryptography CS110 Fall Conventional Encryption.
Lecture note 8: Quantum Algorithms
Midterm Review Cryptography & Network Security
BASIC CRYPTOGRAPHIC CONCEPTS. Public Key Cryptography  Uses two keys for every simplex logical communication link.  Public key  Private key  The use.
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Chapter 21 Public-Key Cryptography and Message Authentication.
Information Security -- Part II Public-Key Encryption and Hash Functions Frank Yeong-Sung Lin Information Management Department National Taiwan University.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
1 Security and Cryptography: basic aspects Ortal Arazi College of Engineering Dept. of Electrical & Computer Engineering The University of Tennessee.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
IT 221: Introduction to Information Security Principles Lecture 4: Public-Key Cryptography For Educational Purposes Only Revised: September 15, 2002.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Nawaf M Albadia
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Cryptographic Security Identity-Based Encryption.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Public Key Encryption.
COMPSCI 290.2: Computer Security
Public-key Cryptography
Quantum Cryptography Quantum Computing
Quantum Cryptography Alok.T.J EC 11.
Appendix 5: Cryptography p
Chapter 3 - Public-Key Cryptography & Authentication
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Presentation transcript:

Quantum Computing 101: How to Crack RSA Walter C. Daugherity Department of Computer Science Texas A&M University

Quantum Computing - Daugherity Biography Walter C. Daugherity is a Senior Lecturer in Computer Science and Electrical Engineering at Texas A&M University. He received a bachelor’s degree from Oklahoma Christian University, and master’s and doctor’s degrees from Harvard University. His research interests include computer and network security, and quantum computing.

Quantum Computing - Daugherity Biography (Continued) With David A. Church he created the first course in quantum computing at Texas A&M University in 2000; the course has now been offered three times and will become a permanent course.

Quantum Computing - Daugherity Abstract What is quantum computing? How does it work? Why is it exponentially faster than “classical” computing? How can a quantum computer crack RSA?

Quantum Computing - Daugherity Quantum Computing Quantum state = vector in a Hilbert space –Eigenstates |0> and |1> (e.g., spin-up and spin- down of a spin-1/2 particle) Superposition (a convenient fiction?) –Combination  0 |0> +  1 |1> –  = amplitude,  *  = probability of eigenvalue Interference –Produced by phase angle differences –Constructive or destructive

Quantum Computing - Daugherity The Topsy Turvy World of Quantum Computing go to main article How Spin States Can Make Qubits The spin of a particle in a dc magnetic field is analogous to a spinning top that is precessing around the axis of the field. In such a field, the particle assumes one of two states, spin up or spin down, which can represent 0 and 1 in digital logic. A particle in one spin state can be pushed toward another by a radio frequency pulse perpendicular to the magnetic field. A pulse of the right frequency and duration will flip the spin completely [top]. A shorter RF pulse will tip the spin into a superposition of the up and down state [bottom], allowing simultaneous calculations on both states. ---IEEE Spectrum Online ILLUSTRATIONS: STEVE STANKIEWICZ

Quantum Computing - Daugherity Quantum Computing Entanglement –Two mutually dependent qubits have a joint state –E.g., the 2-qubit system (|00> + |11>)/  has a quantum state which cannot be “factored” into two 1-qubit states Teleportation –Reproduce a quantum state at another location –Initial state is destroyed in the process

Quantum Computing - Daugherity The Topsy Turvy World of Quantum Computing go to main article Quantum Teleportation Entire quantum particles can be "sent" from one place to another over any distance. The process starts with a sender and a receiver, Alice and Bob. The pair are on opposite sides of the universe but are in possession of photons A and B, respectively, which are entangled. Alice also holds photon C, which is in a state that she wants to teleport to Bob. Entangled particles have the property that a measurement on one immediately determines the state of the other. If Alice performs a procedure that entangles photons A and C, photon B, held by Bob, is forced to adopt the original state, a particular polarization, say, of photon C. Bob can only measure this state if Alice sends him details of the type of experiment he must do to get the message, and this can only be done at or below the speed of light. Although only the quantum state of photon C is teleported, when photon B adopts this state, it cannot be distinguished from photon C. To all intents and purposes, it has become photon C. This is what physicists mean when they say photon C has been teleported from Alice to Bob. Teleportation was first demonstrated by a group of researchers at the University of Innsbruck using the experimental setup shown here. Pairs of entangled photons, with polarization orthogonal to each other, are generated by splitting an ultraviolet laser pulse using a crystal called a parametric down-coverter. One of the pair (photon A) is sent to Alice while the other (photon B) is sent to Bob. Meanwhile, a message photon (C) is prepared in a state that is to be teleported to Bob-- in this case, 45-degree polarization. This is sent to Alice and arrives coincidentally with photon A at a beam-splitter. If the photons leave the splitter and strike both detectors, they have become entangled, and Alice sends notice of the entanglement to Bob. Bob can then carry out a measurement on photon B to confirm that it is in the 45-degree polarization state that the message photon C started off in. ---IEEE Spectrum Online --J.M.

Quantum Computing - Daugherity Quantum Computing Quantum Cryptography –Relies on Heisenberg’s uncertainty principle: Can’t measure rectilinear and diagonal polarization simultaneously, so eavesdropping is detected –I.e., provably secure (provided you have a single-qubit source)

Quantum Computing - Daugherity Exponential Speedup N qubits can hold 2 N values in superposition, i.e., simultaneously A single operator (function evaluation) on such a register evaluates the function for all 2 N values in the time it would take to do one evaluation

Quantum Computing - Daugherity Application to Cryptography Conventional (private key) cryptography Public key cryptography RSA Cracking RSA Shor’s quantum algorithm

Quantum Computing - Daugherity Conventional Encryption M = one block of the message, typically 64 bits, i.e., 8 characters, of plaintext K = secret key Ciphertext C = E(M,K)

Quantum Computing - Daugherity Conventional Decryption C = one block of ciphertext K = secret key M = D(C,K), the original plaintext

Quantum Computing - Daugherity Security of Conventional Encryption Need a strong encryption algorithm: even with many plaintext/ciphertext pairs an opponent cannot decrypt other ciphertext or discover the key. Sender and receiver need to obtain copies of the secret key securely and keep it secure. Note: Key is secret, algorithm is not.

Quantum Computing - Daugherity Guessing the Secret Key

Quantum Computing - Daugherity Why Public-Key Cryptography? Key distribution –Secret keys for conventional cryptography –Unforgeable public keys (digital certificate) Message authentication

Quantum Computing - Daugherity Public-Key Encryption M = one block of the message, typically 64 bits, i.e., 8 characters, of plaintext (or 128 or 192 or 256 bits, e.g., in AES) KU = receiver’s public key Ciphertext C = E(M,KU)

Quantum Computing - Daugherity Public-Key Decryption C = one block of ciphertext KR = receiver’s private (secret) key M = D(C,KR), the original plaintext

Quantum Computing - Daugherity Public History of Public-Key Encryption Proposed by Diffie and Hellman –Relies on difficulty of computing discrete logarithms (solve a x = b mod n for x) RSA algorithm developed by Rivest, Shamir, and Adleman –Relies on difficulty of factoring large numbers –RSA129 (129 digits) published as a challenge

Quantum Computing - Daugherity Public History of Public-Key Encryption (continued) RSA129 (426-bit key) cracked by 1600 networked computers RSA140 (465-bit key) cracked by 185 networked computers in 8.9 CPU-years 1999 – RSA155 (512-bit key) cracked by 300 networked computers 2003 – 576-bit challenge not yet cracked; RSA recommends 1024-bit keys for corporate use, 2048 for certificate authority

Quantum Computing - Daugherity The RSA Algorithm Select two primes p and q Calculate n = p q Calculate  (n) = (p-1)(q-1) Select e such that 1 < e <  (n) and gcd(  (n),e) = 1 Calculate d = e -1 mod  (n) Public key KU = {e,n} Private key KR = {d,n}

Quantum Computing - Daugherity Example Select two primes p=7 and q=17 Calculate n = p q = 119 Calculate  (n) = (p-1)(q-1) = 96 Select e such that 1 < e <  (n) and gcd(  (n),e) = 1, e.g., e = 5 Calculate d = e -1 mod  (n), e.g., d = 77 Public key KU = {e,n} = {5,119} Private key KR = {d,n} = {77,119}

Quantum Computing - Daugherity Example (continued) Plaintext M = 19 Ciphertext C = M e mod n = 19 5 mod 119 = 66 Plaintext M = C d mod n = 66 d mod 119

Quantum Computing - Daugherity Cracking RSA Factor n, which is public, yielding p and q Calculate  (n) = (p-1)(q-1) Calculate d = e -1 mod  (n) (e is public) Private key KR = {d,n}

Quantum Computing - Daugherity Cracking RSA (Example) Factor 119, which is public, yielding 7 and 17 Calculate  (119) = (7-1)(17-1) = 96 Calculate 5 -1 = 77 mod 96 Private key KR = {77,119}

Quantum Computing - Daugherity Example (continued) Plaintext M = 19 Ciphertext C = M e mod n = 19 5 mod 119 = 66 Plaintext M = C d mod n = mod 119 = 19

Quantum Computing - Daugherity So How Hard is Factoring?

Quantum Computing - Daugherity Shor’s Algorithm to Factor n Choose q (with small prime factors) such that 2n 2 <= q <= 3n 2 Choose x at random such that gcd(x,n)=1 Calculate the discrete Fourier transform of a table of x a mod n, order log(q) times, each time yielding some multiple of q/r, where r=period

Quantum Computing - Daugherity Shor’s Algorithm (continued) Use a continued fraction technique to determine r Two factors of n are then gcd(x r/2 - 1,n) and gcd(x r/2 + 1,n) If the factors are 1 and n, try again.

Quantum Computing - Daugherity Key Features The discrete Fourier transform maps equal amplitudes into unequal amplitudes, so measuring the quantum state is more likely to yield a result close to some multiple of 1/r. The period can be “quantum- computed”efficiently.

Quantum Computing - Daugherity Shor’s Algorithm (Examples) Factor 15 [See attached MSWord file shor2] Factor 119 [Live demo on laptop]

Quantum Computing - Daugherity Implementation “By 2000, it is expected that a quantum computer will factor 15 = 3 * 5.” Scaling up for larger numbers is theoretically unlimited; practically, error-correcting codes will be required If you can build a big enough quantum computer, you can crack RSA-1024 (about 300 decimal digits) in your lifetime.

Quantum Computing - Daugherity IBM’s Implementation A modification of Shor’s algorithm was implemented by IBM in 2001 using a “designer molecule” with 7 individually addressable qubits. NMR (nuclear magnetic resonance) techniques enabled them to factor 15. Reference: taf/DynaPage.taf?file=/nature/journal/v414/n68 66/full/414883a_fs.html&content_filetype=PDFhttp:// taf/DynaPage.taf?file=/nature/journal/v414/n68 66/full/414883a_fs.html&content_filetype=PDF

Quantum Computing - Daugherity IBM’s Quantum Computer Molecule

Quantum Computing - Daugherity The Future Quantum-effect memory Special-purpose experimental computers Commercial availability Impact on public-key cryptography

Quantum Computing - Daugherity For Further Information darpa/index.html

Quantum Computing - Daugherity Reference Sites rences.html pdf /references.htm

Quantum Computing - Daugherity Texas A&M University Course Intro to Quantum Computing ELEN / PHYS Fall, 2002 Instructors:Dr. Walter C. Daugherity Dr. David A. Church Recommended prerequisites are a knowledge of linear algebra (e.g., MATH 304) and one course in physics. Enrollment is limited.