Classical Cryptosystems in a Quantum Setting

Classical Cryptosystems in a Quantum Setting

Classical Cryptosystems In A Quantum Setting by Michael Stephen Brown A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Mathematics in Combinatorics and Optimisation arXiv:quant-ph/0404061v1 9 Apr 2004 Waterloo, Ontario, Canada, 2008 c Michael Stephen Brown 2008 I hereby declare that I am the sole author of this thesis. I authorize the University of Waterloo to lend this thesis to other institutions or individuals for the purpose of scholarly research. I further authorize the University of Waterloo to reproduce this thesis by photocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. ii The University of Waterloo requires the signatures of all persons using or photocopy- ing this thesis. Please sign below, and give address and date. iii Acknowledgements This thesis would not have been possible without much support and assistance. I would like to thank my supervisor, Michele Mosca, for sharing wisdom, experience, and guid- ance. Thank you to NSERC and the Department of Combinatorics and Optimisation at the University of Waterloo for their generous financial support. Thank you also to Phillip Kaye, Edlyn Teske, and Christof Zalka for many helpful conversations and suggestions. Finally, thank you very much to my family, who as always, has provided me with so much love and encouragement. iv Contents 1 Introduction To Public Key Cryptography 1 2 Introduction To Quantum Computing 7 2.1 BasicConcepts ................................ 7 2.2 HilbertSpace ................................. 10 2.3 Single-QubitGates .............................. 12 2.4 Multiple-QubitGates. .. .. 14 3 Introduction To Quantum Algorithms 17 3.1 Deutsch’sProblem .............................. 18 3.2 TheHiddenSubgroupProblem . 20 3.3 TheQuantumFourierTransform . 23 3.4 Solving A Special Case Of The Hidden Subgroup Problem . ..... 27 3.5 Solving The Order Finding Problem . .. 32 3.6 SolvingTheFactoringProblem . 32 v 3.7 Solving Another Special Case Of The Hidden Subgroup Problem..... 36 3.8 ComputingDiscreteLogarithms . .. 40 4 The RSA Cryptosystem 43 4.1 TheCryptosystem .............................. 43 4.2 SecurityOfTheSystem ........................... 45 5 The Rabin Cryptosystem 51 5.1 TheCryptosystem .............................. 51 5.2 SecurityOfTheSystem ........................... 54 6 The ElGamal Cryptosystem 55 6.1 TheCryptosystem .............................. 56 6.2 SecurityOfTheSystem ........................... 57 7 The McEliece Cryptosystem 61 7.1 TheCryptosystem .............................. 61 7.2 SecurityOfTheSystem ........................... 66 8 The Ajtai-Dwork Cryptosystem 71 8.1 TheCryptosystem .............................. 72 8.2 SecurityOfTheSystem ........................... 76 vi 9 The Goldreich-Goldwasser-Halevi Cryptosystem 81 9.1 TheCryptosystem .............................. 82 9.2 SecurityOfTheSystem ........................... 85 10 The NTRU Cryptosystem 89 10.1TheCryptosystem .............................. 90 10.2SecurityOfTheSystem ........................... 94 11 A Quantum Public Key Cryptosystem 99 11.1TheCryptosystem .............................. 100 11.2 SecurityOfTheScheme ........................... 106 12 Diffie-Hellman Key Establishment 109 12.1TheProtocol ................................. 110 12.2 SecurityOfTheProtocol. 110 13 Buchmann-Williams Key Establishment 113 13.1TheProtocol ................................. 114 13.1.1 TheImaginaryCase . 116 13.1.2 TheRealCase ............................ 118 13.2 SecurityOfTheProtocol. 123 13.2.1 TheImaginaryCase . 123 vii 13.2.2 TheRealCase ............................ 124 13.2.3 ComputingTheRegulator . 125 13.2.4 Solving The Principal Ideal Distance Problem . ..... 136 14 Conclusions And Future Work 149 Bibliography 153 viii Chapter 1 Introduction To Public Key Cryptography Cryptography has been an area of mathematical study for centuries. Historically, the study of cryptography focused on the design of systems that provide secret communica- tion over an insecure channel. Recently, individuals, corporations, and governments have started to demand privacy, authenticity, and reliability in all sorts of communication, from online shopping to discussions of national secrets. As a result, the goals of cryptog- raphy have become more all-encompassing; now, cryptography might better be defined as the design of systems that need to withstand any malicious attempts to abuse them. This thesis will focus on modern algorithms and techniques for confidentiality, which are also known as encryption schemes. However, the purposes of cryptography include not only secret or confidential communication, but also authentication of the entities involved in the communication, authentication of the data transmitted by those entities, and many 1 2 CHAPTER 1. INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY others. The oldest encryption schemes are known as symmetric key or secret key systems. Such systems consist of two main algorithms: an encryption algorithm, which allows one entity to encrypt or “scramble” data, and a decryption algorithm, which allows another entity to decrypt or “unscramble” data. Each of these algorithms has an input called a key, which dictates some aspect of the algorithm’s behaviour. In order for two entities (historically known as Alice and Bob) to exchange data securely, they must first share a secret key between them. If Bob wishes to send Alice a message, he uses the secret key with the encryption algorithm to encrypt the message. He sends the encrypted message (called the ciphertext) to Alice, and she uses the secret key with the decryption algorithm to decrypt the ciphertext and recover the original message. Since an eavesdropper (Eve) does not know the secret key, she should not be able to determine what the original message was. A physical analogy of a symmetric key scheme is often given in terms of boxes and padlocks. Suppose Alice and Bob each have a copy of a key for a padlock. If Bob wishes to send Alice a message, he writes the message on a piece of paper and places it in a box. He then uses his copy of the key to lock the box with the padlock, and he sends the locked box to Alice. When she receives it, she uses her copy of the key to unlock the padlock, she opens the box, and she reads the message. If Eve finds the locked box, however, she cannot open the padlock because she does not have a copy of the key. Symmetric key encryption schemes are well-suited to many applications. They tend to be very efficient in time and space required for their implementation, and they tend to require only a small amount of key material for a high level of security. The main CHAPTER 1. INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY 3 drawback of such schemes has come to be known as the key distribution problem: if Alice and Bob wish to communicate secretly but have never met, how do they share a secret key? They cannot send a secret key over an insecure channel because Eve might be listening and might learn the key; on the other hand, they do not yet share a secure channel over which to send a secret key. This problem was one of the largest problems in cryptography for many years. Some solutions might be for Alice and Bob to meet in person and agree on a key face-to-face (which is of course impractical if they live far away from one another) or for them to enlist the services of a third party to courier a secret key between them (which implies they both must trust the third party not to reveal the key to anyone). Further, for every pair of parties that wishes to communicate secretly, a unique symmetric key is required; thus the number of symmetric keys in the system grows rapidly. In the late 1970 s, the mathematicians Diffie and Hellman introduced a new idea: public key cryptography [DH76]. (In fact, a British intelligence researcher had discovered the same idea earlier [Ell70], but his discovery was not made public until later.) Like the secret key systems described above, a public key scheme has two main algorithms for encryption and decryption, each of which has an input called a key. The difference is that the keys used in the two algorithms are not the same. More specifically, Alice generates two keys of her own: a public key, which she shares with everyone (even her enemies) and a private key, which she keeps to herself. If Bob wishes to send Alice a message, he obtains a copy of Alice’s public key, and uses her public key with the encryption algorithm to encrypt the message. He sends the ciphertext to Alice, and she uses her private key with the decryption algorithm to decrypt the ciphertext and recover 4 CHAPTER 1. INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY the original message. Since Eve does not know Alice’s private key, she should not be able to determine what the original message was. In other words, anyone can encrypt a message for Alice, since anyone can obtain Alice’s public key, but once a message is encrypted for her, only Alice can decrypt it with her private key. Again, we can illustrate the idea of a public key encryption scheme with a physical analogy in terms of boxes and padlocks. Suppose Alice has a number of empty boxes, a number of open padlocks (that can be locked without a key), and a key that opens all of the padlocks. She freely gives out these boxes and open padlocks to anyone who would like them. If Bob wishes to send Alice a message, he writes the message on a piece of paper, gets a box and lock from Alice, and places

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    170 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us