Exploring Shor's Algorithm in Cracking RSA Encryption
Keywords:
Quantum Computing, Shor’s Algorithm, RSA Encryption, Cryptography, RSA, Quantum Parallelism, Superposition, Hilbert Space, Quantum Error CorrectionAbstract
The present study explores the groundbreaking possibilities of Shor's algorithm in cracking RSA encryption, hence enhancing the security consequences of this extensively employed cryptographic protocol. Due to Shor's algorithm's exponential speed advantage over classical algorithms, RSA encryption—a popular public key cryptosystem—is vulnerable to quantum attacks. To keep its security, RSA depends on the difficulty of factoring huge semi-primes. RSA's security presumptions are called into question by Shor's algorithm's quick factorization on a quantum computer, which has prompted research into post-quantum cryptography solutions to guarantee secure communication in the quantum age. Even with parallel computation, the speed and storage capacity of classical computing are constrained. A key idea in quantum computing is quantum parallelism, which allows quantum systems to carry out several computations at once. In contrast to classical portions. The scope of this paper is to understand the fundamentals of Quantum Computing, the current state of Shor’s algorithm implementation, and efficiency, particularly its application in compromising public key cryptosystems like RSA. The project aims to achieve how factorization is done through classical methods and further, how is this done through Shor’s algorithm and QFT techniques.
References
W. C. Easttom II, Quantum computing fundamentals. Addison-Wesley Profes- sional, 2021.
M. J. Nene and G. Upadhyay, “Shor’s algorithm for quantum factoring,” in Advanced Computing and Communication Technologies: Proceedings of the 9th ICACCT, 2015. Springer, 2016, pp. 325–331.
V. Kasirajan, Fundamentals of quantum computing. Springer, 2021.
A. Albuainain, J. Alansari, S. Alrashidi, W. Alqahtani, J. Alshaya, and N. Nagy, “Experimental implementation of shor’s quantum algorithm to break rsa,” in 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2022, pp. 748–752.
V. Bhatia and K. Ramkumar, “An efficient quantum computing technique for cracking rsa using shor’s algorithm,” in 2020 IEEE 5th international conference on computing communication and automation (ICCCA). IEEE, 2020, pp. 89–94.
P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM review, vol. 41, no. 2, pp. 303–332, 1999.
T. Monz, D. Nigg, E. A. Martinez, M. F. Brandl, P. Schindler, R. Rines, S. X. Wang, I. L. Chuang, and R. Blatt, “Realization of a scalable shor algorithm,” Science, vol. 351, no. 6277, pp. 1068–1070, 2016.
https://medium.com/qiskit/applying-shors-algorithm-bbdfd6f05f7d
https://quantum-computing.ibm.com/composer/docs/iqx/guide/ shors- algorithm
https://www.nature.com/articles/s41598-021-9597
Siyon Singh1, Eric Sakk, “Implementation and Analysis of Shor’s Algorithm to Break RSA Cryptosystem Security”, January 2024.
Mavroeidis, V., Vishi, K., Zych, M. D., & Jøsang, A. (2018). The impact of quantum computing on present cryptography. arXiv preprint arXiv:1804.00200.
IBM Quantum, https://learn.qiskit.org/course.
Everitt, H. O. (Ed.). (2005). Experimental aspects of quantum computing. Springer Science
Licentiate thesis in Physics “High Visibility of six photon entanglement”
Robert Loredo, “Learn Quantum Computing with Python and IBM Quantum Experience”
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Sciences: Basic and Applied Research (IJSBAR)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who submit papers with this journal agree to the following terms.