from linear algebra to post quantum cryptography
play

From linear algebra to post-quantum cryptography Dr. Ir. Fr e - PowerPoint PPT Presentation

Quantum computers and factoring Learning with errors Cryptography from LWE From linear algebra to post-quantum cryptography Dr. Ir. Fr e Vercauteren frederik.vercauteren@gmail.com Open Security Research (China) ESAT/COSIC - KU Leuven


  1. Quantum computers and factoring Learning with errors Cryptography from LWE From linear algebra to post-quantum cryptography Dr. Ir. Fr´ e Vercauteren frederik.vercauteren@gmail.com Open Security Research (China) ESAT/COSIC - KU Leuven (Belgium) Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  2. Quantum computers and factoring Learning with errors Cryptography from LWE Quantum computers and factoring Learning with errors Cryptography from LWE Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  3. Quantum computers and factoring Learning with errors Cryptography from LWE Post-quantum public key cryptography ◮ Currently only two types PK are popular ◮ Factoring based: given n = p · q , find p and q ◮ Discrete logarithm based: given g and h = g a mod p , find a Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  4. Quantum computers and factoring Learning with errors Cryptography from LWE Post-quantum public key cryptography ◮ Currently only two types PK are popular ◮ Factoring based: RSA ◮ Discrete logarithm based: DSA, ECDSA Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  5. Quantum computers and factoring Learning with errors Cryptography from LWE Post-quantum public key cryptography ◮ Currently only two types PK are popular ◮ Factoring based: RSA ◮ Discrete logarithm based: DSA, ECDSA ◮ Shor (1994) : quantum algorithm for factoring and dlog in time ˜ O (( log N ) 2 ) Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  6. Quantum computers and factoring Learning with errors Cryptography from LWE Post-quantum public key cryptography ◮ Currently only two types PK are popular ◮ Factoring based: RSA ◮ Discrete logarithm based: DSA, ECDSA ◮ Shor (1994) : quantum algorithm for factoring and dlog in time ˜ O (( log N ) 2 ) ◮ Need for new constructions for the post-quantum era ◮ Lattice based ◮ Multivariate polynomial based ◮ Code based ◮ Hash based ◮ Supersingular isogenies Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  7. Quantum computers and factoring Learning with errors Cryptography from LWE Quantum computers ◮ Classical computer: bits, either 0 or 1 ◮ Quantum computer: quantum bit (qubit) ◮ Qubit: superposition of two basic states | 0 � and | 1 � | α 0 | 2 + | α 1 | 2 = 1 | φ � = α 0 | 0 � + α 1 | 1 � , α 0 , α 1 ∈ C , Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  8. Quantum computers and factoring Learning with errors Cryptography from LWE Quantum computers ◮ Classical computer: bits, either 0 or 1 ◮ Quantum computer: quantum bit (qubit) ◮ Qubit: superposition of two basic states | 0 � and | 1 � | α 0 | 2 + | α 1 | 2 = 1 | φ � = α 0 | 0 � + α 1 | 1 � , α 0 , α 1 ∈ C , ◮ α i is called amplitude of | i � in | φ � ◮ Impossible to “see” the superposition itself ◮ Measurement: quantum state collapses into basic state | i � with probability | α i | 2 Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  9. Quantum computers and factoring Learning with errors Cryptography from LWE Quantum computers ◮ Quantum register: n qubits can be in superposition of N = 2 n basic states | 00 . . . 0 � , | 00 . . . 1 � , . . . , | 11 . . . 1 � i = 0 | α i | 2 = 1 ◮ Quantum state: | φ � = � N − 1 i = 0 α i | i � with � N − 1 Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  10. Quantum computers and factoring Learning with errors Cryptography from LWE Quantum computation ◮ Quantum mechanics only allows linear operations applied to quantum state ◮ A state | φ � = � N − 1 i = 0 α i | i � with “coordinates” ( α 0 , . . . , α N − 1 ) get mapped to     α 0 β 0 α 1 β 1     U  =     . . . .     . .    α N − 1 β N − 1 Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  11. Quantum computers and factoring Learning with errors Cryptography from LWE Quantum computation ◮ Quantum mechanics only allows linear operations applied to quantum state ◮ A state | φ � = � N − 1 i = 0 α i | i � with “coordinates” ( α 0 , . . . , α N − 1 ) get mapped to     α 0 β 0 α 1 β 1     U  =     . . . .     . .    α N − 1 β N − 1 ◮ Since RHS has norm 1 as well, U has to be unitary ◮ Note general U has exponential size . . . Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  12. Quantum computers and factoring Learning with errors Cryptography from LWE Quantum computation ◮ Quantum gate: unitary matrix on small number of qubits ◮ Main example: 1-qubit Hadamard transform H given by � 1 1 � � α 0 √ √ � 2 2 ( α 0 , α 1 ) �→ 1 − 1 α 1 √ √ 2 2 1 1 ◮ Maps basic state | 0 � into superposition 2 | 0 � + 2 | 1 � √ √ Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  13. Quantum computers and factoring Learning with errors Cryptography from LWE Quantum computation ◮ Quantum gate: unitary matrix on small number of qubits ◮ Main example: 1-qubit Hadamard transform H given by � 1 1 � � α 0 √ √ � 2 2 ( α 0 , α 1 ) �→ 1 − 1 α 1 √ √ 2 2 1 1 ◮ Maps basic state | 0 � into superposition 2 | 0 � + 2 | 1 � √ √ ◮ Hadamard on each qubit of n -bit register gives ( N = 2 n ) 1 1 1 √ | 0 � + √ | 1 � + . . . + √ | N − 1 � N N N ◮ Matrix U is n -fold tensor product of 2 × 2 above Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  14. Quantum computers and factoring Learning with errors Cryptography from LWE Quantum parallelism ◮ Given function f : { 0 , 1 } n → { 0 , 1 } m , make quantum circuit U that maps | x �| 0 � into | x �| f ( x ) � ◮ Apply U to a superposition gives    1 1 �  = � √ √ U | x �| 0 � | x �| f ( x ) � 2 n 2 n x ∈{ 0 , 1 } n x ∈{ 0 , 1 } n Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  15. Quantum computers and factoring Learning with errors Cryptography from LWE Quantum parallelism ◮ Given function f : { 0 , 1 } n → { 0 , 1 } m , make quantum circuit U that maps | x �| 0 � into | x �| f ( x ) � ◮ Apply U to a superposition gives    1 1 �  = � √ √ U | x �| 0 � | x �| f ( x ) � 2 n 2 n x ∈{ 0 , 1 } n x ∈{ 0 , 1 } n ◮ This by itself is totally useless since observing the above state gives a random | x �| f ( x ) � Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  16. Quantum computers and factoring Learning with errors Cryptography from LWE (Quantum) Fourier Transform ◮ Set N = 2 n , and set ω N = exp ( 2 π i / N ) a primitive N -th root of unity ◮ QFT: maps standard basis | x � into state N − 1 1 � ω xy √ N | y � N y = 0 ◮ 2 n -QFT can be computed by composition of n ( n − 1 ) / 2 quantum gates Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  17. Quantum computers and factoring Learning with errors Cryptography from LWE Factoring via period finding ◮ Given an N one wants to factor, fix m coprime to N ◮ Define f : N → Z / N Z : k �→ m k mod N , ◮ f ( x ) = f ( x + r ) with period r order of m modulo N Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  18. Quantum computers and factoring Learning with errors Cryptography from LWE Factoring via period finding ◮ Given an N one wants to factor, fix m coprime to N ◮ Define f : N → Z / N Z : k �→ m k mod N , ◮ f ( x ) = f ( x + r ) with period r order of m modulo N ◮ Assume r is even then m r − 1 ≡ ( m r / 2 + 1 )( m r / 2 − 1 ) = kN ◮ Compute gcd ( m r / 2 − 1 , N ) as factor of N ◮ Probability > 1 / 4 the above is non-trivial Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  19. Quantum computers and factoring Learning with errors Cryptography from LWE Shor’s algorithm = period finding ◮ 1 : two quantum registers: ◮ n -qubit register with N 2 < 2 n ≤ 2 N 2 ◮ ⌈ log 2 N ⌉ qubit register Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  20. Quantum computers and factoring Learning with errors Cryptography from LWE Shor’s algorithm = period finding ◮ 1 : two quantum registers: ◮ n -qubit register with N 2 < 2 n ≤ 2 N 2 ◮ ⌈ log 2 N ⌉ qubit register ◮ 2 : use Hadamard n times to create superposition 1 � √ | x �| 0 � 2 n x ∈{ 0 , 1 } n Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

  21. Quantum computers and factoring Learning with errors Cryptography from LWE Shor’s algorithm = period finding ◮ 1 : two quantum registers: ◮ n -qubit register with N 2 < 2 n ≤ 2 N 2 ◮ ⌈ log 2 N ⌉ qubit register ◮ 2 : use Hadamard n times to create superposition 1 � √ | x �| 0 � 2 n x ∈{ 0 , 1 } n ◮ 3 : Apply function f ( x ) = m x mod N to the above state 1 | x �| m x mod N � � √ 2 n x ∈{ 0 , 1 } n Dr. Ir. Fr´ e Vercauteren From linear algebra to post-quantum cryptography

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend