Exploring Shor's Algorithm in Cracking RSA Encryption

Authors

  • Aashutosh Srivastava Student Delhi Public School, Navi Mumbai, Maharashtra, India

Keywords:

Quantum Computing, Shor’s Algorithm, RSA Encryption, Cryptography, RSA, Quantum Parallelism, Superposition, Hilbert Space, Quantum Error Correction

Abstract

The present study explores the groundbreaking possibilities of Shor's algorithm in cracking  RSA encryption, hence enhancing the security consequences of this extensively employed cryptographic protocol. Due to Shor's algorithm's exponential speed advantage over classical algorithms, RSA encryption—a popular public key cryptosystem—is vulnerable to quantum attacks. To keep its security, RSA depends on the difficulty of factoring huge semi-primes. RSA's security presumptions are called into question by Shor's algorithm's quick factorization on a quantum computer, which has prompted research into post-quantum cryptography solutions to guarantee secure communication in the quantum age. Even with parallel computation, the speed and storage capacity of classical computing are constrained. A key idea in quantum computing is quantum parallelism, which allows quantum systems to carry out several computations at once. In contrast to classical portions. The scope of this paper is to understand the fundamentals of Quantum Computing, the current state of Shor’s algorithm implementation, and efficiency, particularly its application in compromising public key cryptosystems like RSA. The project aims to achieve how factorization is done through classical methods and further, how is this done through Shor’s algorithm and QFT techniques.

References

W. C. Easttom II, Quantum computing fundamentals. Addison-Wesley Profes- sional, 2021.

M. J. Nene and G. Upadhyay, “Shor’s algorithm for quantum factoring,” in Advanced Computing and Communication Technologies: Proceedings of the 9th ICACCT, 2015. Springer, 2016, pp. 325–331.

V. Kasirajan, Fundamentals of quantum computing. Springer, 2021.

A. Albuainain, J. Alansari, S. Alrashidi, W. Alqahtani, J. Alshaya, and N. Nagy, “Experimental implementation of shor’s quantum algorithm to break rsa,” in 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2022, pp. 748–752.

V. Bhatia and K. Ramkumar, “An efficient quantum computing technique for cracking rsa using shor’s algorithm,” in 2020 IEEE 5th international conference on computing communication and automation (ICCCA). IEEE, 2020, pp. 89–94.

P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM review, vol. 41, no. 2, pp. 303–332, 1999.

T. Monz, D. Nigg, E. A. Martinez, M. F. Brandl, P. Schindler, R. Rines, S. X. Wang, I. L. Chuang, and R. Blatt, “Realization of a scalable shor algorithm,” Science, vol. 351, no. 6277, pp. 1068–1070, 2016.

https://medium.com/qiskit/applying-shors-algorithm-bbdfd6f05f7d

https://quantum-computing.ibm.com/composer/docs/iqx/guide/ shors- algorithm

https://www.nature.com/articles/s41598-021-9597

Siyon Singh1, Eric Sakk, “Implementation and Analysis of Shor’s Algorithm to Break RSA Cryptosystem Security”, January 2024.

Mavroeidis, V., Vishi, K., Zych, M. D., & Jøsang, A. (2018). The impact of quantum computing on present cryptography. arXiv preprint arXiv:1804.00200.

IBM Quantum, https://learn.qiskit.org/course.

Everitt, H. O. (Ed.). (2005). Experimental aspects of quantum computing. Springer Science

Licentiate thesis in Physics “High Visibility of six photon entanglement”

Robert Loredo, “Learn Quantum Computing with Python and IBM Quantum Experience”

Downloads

Published

2024-11-15

How to Cite

Aashutosh Srivastava. (2024). Exploring Shor’s Algorithm in Cracking RSA Encryption. International Journal of Sciences: Basic and Applied Research (IJSBAR), 74(1), 154–175. Retrieved from https://gssrr.org/index.php/JournalOfBasicAndApplied/article/view/17122

Issue

Section

Articles