Finalize last essay

This commit is contained in:
Marius Drechsler 2025-07-06 13:53:51 +02:00
parent 91b69f1d7a
commit b504f4d884
Signed by: marius
GPG key ID: 56D4131BA3104777
2 changed files with 139 additions and 20 deletions

View file

@ -1 +1,110 @@
@article{steane1998quantum,
title={Quantum computing},
author={Steane, Andrew},
journal={Reports on Progress in Physics},
volume={61},
number={2},
pages={117},
year={1998},
publisher={IOP Publishing}
}
@article{abdullah2017advanced,
title={Advanced encryption standard (AES) algorithm to encrypt and decrypt data},
author={Abdullah, Ako Muhamad and others},
journal={Cryptography and Network Security},
volume={16},
number={1},
pages={11},
year={2017}
}
@article{milanov2009rsa,
title={The RSA algorithm},
author={Milanov, Evgeny},
journal={RSA laboratories},
volume={1},
number={11},
year={2009}
}
@article{ozhigov1998quantum,
title={Quantum computers speed up classical with probability zero},
author={Ozhigov, Yuri},
journal={arXiv preprint quant-ph/9803064},
year={1998}
}
@book{razavi2018introduction,
title={An Introduction to Quantum Communications Networks: Or, how shall we communicate in the quantum era?},
author={Razavi, Mohsen},
year={2018},
publisher={Morgan \& Claypool Publishers}
}
@book{djordjevic2022quantum,
title={Quantum Communication, Quantum Networks, and Quantum Sensing},
author={Djordjevic, Ivan B},
year={2022},
publisher={Academic Press}
}
@article{yuan2010entangled,
title={Entangled photons and quantum communication},
author={Yuan, Zhen-Sheng and Bao, Xiao-Hui and Lu, Chao-Yang and Zhang, Jun and Peng, Cheng-Zhi and Pan, Jian-Wei},
journal={Physics Reports},
volume={497},
number={1},
pages={1--40},
year={2010},
publisher={Elsevier}
}
@article{jozsa1999searching,
title={Searching in Grover's algorithm},
author={Jozsa, Richard},
journal={arXiv preprint quant-ph/9901021},
year={1999}
}
@article{ugwuishiwu2020overview,
title={An overview of quantum cryptography and shors algorithm},
author={Ugwuishiwu, CH and Orji, UE and Ugwu, CI and Asogwa, CN},
journal={Int. J. Adv. Trends Comput. Sci. Eng},
volume={9},
number={5},
year={2020}
}
@article{balamurugan2021post,
title={Post-quantum and code-based cryptography—some prospective research directions},
author={Balamurugan, Chithralekha and Singh, Kalpana and Ganesan, Ganeshvani and Rajarajan, Muttukrishnan},
journal={Cryptography},
volume={5},
number={4},
pages={38},
year={2021},
publisher={MDPI}
}
@article{hoffstein1999ntru,
title={NTRU: A public key cryptosystem},
author={Hoffstein, Jeff and Lieman, Daniel and Pipher, Jill and Silverman, Joseph H},
journal={NTRU Cryptosystems, Inc.(www. ntru. com)},
year={1999}
}
@article{begimbayeva2022research,
title={Research of quantum key distribution protocols: BB84, B92, E91},
author={Begimbayeva, Y and Zhaxalykov, T},
journal={Scientific Journal of Astana IT University},
year={2022}
}
@article{lewis2022secure,
title={A Secure Quantum Communications Infrastructure for Europe: Technical background for a policy vision},
author={Lewis, Adam M and Travagnin, Martino and others},
journal={Publications Office of the European Union: Luxembourg},
year={2022}
}

View file

@ -6,6 +6,8 @@
margin: (top: 2.5cm, left: 2.5cm, right: 2.5cm, bottom: 2cm) margin: (top: 2.5cm, left: 2.5cm, right: 2.5cm, bottom: 2cm)
) )
#set document(title: "The Challenge of Quantum Computing in Cryptography", author: "Marius Drechsler", date: auto)
#if (context here().page()) != 1 [ #if (context here().page()) != 1 [
#set page( #set page(
numbering: "1" numbering: "1"
@ -26,10 +28,10 @@
Marius Drechsler\ Marius Drechsler\
Problem --- Solution Essay\ Problem --- Solution Essay\
July 5th, 2025 July 6th, 2025
#align(center, text(size: 17pt, weight: "bold")[ #align(center, text(size: 17pt, weight: "bold")[
*Essay Title* *The Challenge of Quantum Computing in Cryptography*
]) ])
#set align(left) #set align(left)
@ -42,32 +44,33 @@ July 5th, 2025
#show: word-count #show: word-count
In an increasing digital world, securing information through encryption methods has become a necessity. In today's increasingly digital landscape, the protection of sensitive information through encryption has become essential.
The rising trend of improvements in quantum computation poses a serious security vulnerability to information that is currently encrypted through classical encryption methods. However, the rapid advancements in quantum computing present a formidable challenge to the security of data encrypted using classical methods.
Quantum computers, with their unique ability to perform complex calculations at unprecedented speeds, threaten to undermine the very foundations of traditional cryptography @steane1998quantum.
This essay will explain the risk of quantum computers regarding cryptography and present possible solutions for it. This essay will explain the risk of quantum computers regarding cryptography and present possible solutions for it.
To properly understand the security vulnerability opened up by quantum computing, encryption methods in general will be investigated. To properly understand the security vulnerability opened up by quantum computing, encryption methods in general will now be investigated.
Current state-of-the-art technology utilizes two different encryption methods: symmetric and asymmetric encryption. Current state-of-the-art technology utilizes two different encryption methods: symmetric and asymmetric encryption.
Symmetric encryption uses a single key for both the encryption and decryption process and is mainly used for securing data. Symmetric encryption uses a single key for both the encryption and decryption process and is mainly used for securing data.
A common symmetric encryption algorithm is called "Advanced Encryption Standard (AES)". A common symmetric encryption algorithm is called "Advanced Encryption Standard (AES)" @abdullah2017advanced.
The security of data encrypted with algorithms like AES depends heavily on the length of the key used. The security of data encrypted with algorithms like AES depends heavily on the length of the key used.
The longer the key, the more secure the encrypted data. The longer the key, the more secure the encrypted data.
Asymmetric encryption on the other hand uses pairs of keys --- a public and a private key --- to encrypt and decrypt information. Asymmetric encryption on the other hand uses pairs of keys --- a public and a private key --- to encrypt and decrypt information.
The principle behind asymmetric cryptography, as implemented by the "RivestShamirAdleman (RSA)" algorithm, stems from the complexity of factoring very large numbers into primes. The principle behind asymmetric cryptography, as implemented by the "RivestShamirAdleman (RSA)" algorithm @milanov2009rsa, stems from the complexity of factoring very large numbers into primes.
In summary, the security of symmetric and asymmetric encryption methods is based on the high computational effort required to break the encryption. In summary, the security of symmetric and asymmetric encryption methods is based on the high computational effort required to break the encryption.
While AES encryption with a long key requires trying a vast array of possible keys, RSA requires efficiently performing prime factorization on large numbers. While AES encryption with a long key requires trying a vast array of possible keys, RSA requires efficiently performing prime factorization on large numbers.
While symmetric and asymmetric encryption methods have proven effective in securing data, the continuous increase in performance of quantum computing could open up vulnerabilities in classical encryption algorithms. While symmetric and asymmetric encryption methods have proven effective in securing data, the continuous increase in performance of quantum computing could open up vulnerabilities in classical encryption algorithms.
Quantum computers utilize a different approach to solve computational problems. Quantum computers utilize a different approach to solve computational problems @steane1998quantum.
Instead of processing data in a binary format using ones and zeroes, quantum computers operate using qubits. Instead of processing data in a binary format using ones and zeroes, quantum computers operate using qubits @ozhigov1998quantum.
While qubits can represent two different values, like an ordinary bit, qubits are also capable of representing any value in between its two base states, for example zero and one. While qubits can represent two different values, like an ordinary bit, qubits are also capable of representing any value in between its two base states, for example zero and one.
It is also important to note, that a qubit can, due to its physical properties, exist in multiple of these states at once. It is also important to note, that a qubit can, due to its physical properties, exist in multiple of these states at once.
This property allows a quantum computer to explore numerous possible solutions to a problem in parallel, significantly increasing the computation process. This property allows a quantum computer to explore numerous possible solutions to a problem in parallel, significantly increasing the computation process.
Additionally, two qubits can also be created in such a way that their states depend on each other, making complex correlations between the two qubits possible. Additionally, two qubits can also be created in such a way that their states depend on each other, making complex correlations between the two qubits possible.
These two properties of qubits open up the possibility for quantum computers to solve the previously introduced numerical problems by encryption algorithms in an efficient way. These two properties of qubits open up the possibility for quantum computers to solve the previously introduced numerical problems by encryption algorithms in an efficient way @ozhigov1998quantum.
As a result, quantum computers are able to solve the two problems making AES and RSA secure significantly faster than their classical counterparts. As a result, quantum computers are able to solve the two problems making AES and RSA secure significantly faster than their classical counterparts @ugwuishiwu2020overview.
To break the encryption of symmetric encryption algorithms like AES, "Grover's Algorithm" can be used. To break the encryption of symmetric encryption algorithms like AES, "Grover's Algorithm" @jozsa1999searching can be used.
Grover's Algorithm is also commonly defined as the quantum search algorithm. Grover's Algorithm is also commonly defined as the quantum search algorithm.
This means that Grover's Algorithm is capable of performing the task of _function inversion_. This means that Grover's Algorithm is capable of performing the task of _function inversion_.
If a function is defined as $y = f(x)$, Gover's Algorithm is able to calculate the value of $x$ when given $y$. If a function is defined as $y = f(x)$, Gover's Algorithm is able to calculate the value of $x$ when given $y$.
@ -75,7 +78,7 @@ Comparing the operation of function inversion to the application of a symmetric
The notable difference between Grover's Algorithm and classical algorithms for the same task is the reduced number of steps required to find a solution. The notable difference between Grover's Algorithm and classical algorithms for the same task is the reduced number of steps required to find a solution.
Where classical algorithms would require $N$ steps to find a solution, Grover's Algorithm achieves the same result with $sqrt(N)$ steps. Where classical algorithms would require $N$ steps to find a solution, Grover's Algorithm achieves the same result with $sqrt(N)$ steps.
For example, brute-force searching a $128$-bit long key for AES encryption on a classical computer would require approximately $2^128$ trials, whereas Grover's algorithm could accomplish this in about $2^64$ trials. For example, brute-force searching a $128$-bit long key for AES encryption on a classical computer would require approximately $2^128$ trials, whereas Grover's algorithm could accomplish this in about $2^64$ trials.
Another algorithm to break the classical encryption methods is "Shor's Algorithm", which is used to efficiently find the prime factors of an integer. Another algorithm to break the classical encryption methods is "Shor's Algorithm" @ugwuishiwu2020overview, which is used to efficiently find the prime factors of an integer.
As with Grover's Algorithm, Shor's Algorithm is able to find these prime factors faster than a classical algorithm. As with Grover's Algorithm, Shor's Algorithm is able to find these prime factors faster than a classical algorithm.
The time complexity of the "General Number Field Sieve (GNFS)" Algorithm, which is considered the fastest classical integer factoring algorithm, is $O(2^N)$. The time complexity of the "General Number Field Sieve (GNFS)" Algorithm, which is considered the fastest classical integer factoring algorithm, is $O(2^N)$.
In contrast, Shor's Algorithm has a time complexity of $O(log(N)^3)$. In contrast, Shor's Algorithm has a time complexity of $O(log(N)^3)$.
@ -83,15 +86,22 @@ As a result, Shor's Algorithm reduces the complexity of finding the prime factor
In conclusion, algorithms for quantum computers make it possible to speed up the process of breaking commonly used encryption methods. In conclusion, algorithms for quantum computers make it possible to speed up the process of breaking commonly used encryption methods.
To address the vulnerabilities that quantum algorithms introduce, two solutions could be implemented. To address the vulnerabilities that quantum algorithms introduce, two solutions could be implemented.
First, quantum-resistent algorithms could be implemented to undermine the efficiency of quantum computers. First, quantum-resistant encryption algorithms could be implemented @balamurugan2021post.
These algorithms are designed in such a way that the speed advantages of quantum computers cannot provide any decisive benefit.
For example, Lattice-Based cryptography introduces methods to develop new encryption algorithms which are resistant to attacks using Shor's Algorithm.
The NTRU @hoffstein1999ntru encryption algorithm is a relatively new, lattice-based alternative to asymmetric encryption algorithms like RSA.
Lattice-based algorithms are currently not known to be breakable using quantum computers.
To account for symmetric encryption algorithms, significantly increasing the key length makes algorithms like AES already resistant to attacks by a quantum computer.
Second, instead of designing classical encryption algorithms that would also require excessive computational effort for quantum computers, quantum-based encryption algorithms be used @balamurugan2021post.
Algorithms like E91 or BB84 @begimbayeva2022research are engineered such that the quantum physical properties of qubits make it physically impossible to derive the used key.
However, these quantum-based algorithms would require new, quantum-specific communication infrastructure that is not yet widely adopted @lewis2022secure.
Therefore, quantum-resistant algorithms appear to be the more sensible of the two solutions, as they do not require new communication infrastructure.
In conclusion, the emergence of quantum computing represents a profound challenge to the security of current encryption methods such as AES and RSA.
As quantum algorithms like Grover's or Shor's algorithm threaten to compromise the security of encrypted data, solutions to protect sensitive information have to be found.
The adoption of quantum-resistant encryption algorithms, such as the lattice-based NTRU, along with the implementation of security enhancement measures for symmetric cryptography, represent crucial steps to secure communication in the context of quantum computing.
Danach mögliche lösungen //Essay has a total of #total-words words.
DAnn zusammenfassung
Essay has a total of #total-words words.
#pagebreak() #pagebreak()