Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor’s Algorithm

Author:

Liu Xia12ORCID,Yang Huan3ORCID,Yang Li1ORCID

Affiliation:

1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

2. School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

3. Beijing Youzhuju Network Technology Co., Ltd., Beijing, China

Abstract

Since the RSA public key cryptosystem was proposed, it has been widely used because of its strong security. Although the proposal of the Shor’s algorithm offers hope for cracking RSA, it is debatable whether the algorithm can actually pose a threat in practice. From the perspective of the quantum circuit of the Shor’s algorithm, we analyse the feasibility of cracking RSA with improved quantum circuits using an ion-trap quantum computer. We present an improved quantum circuit for the modular exponentiation of a constant, which is the most expensive operation in Shor’s algorithm for integer factorization. Whereas previous studies mostly focused on minimizing the number of qubits or the depth of the circuit, we minimize the number of CNOTs, which greatly affects the time to run the algorithm on an ion-trap quantum computer. First, we give the implementation of the basic arithmetic with the lowest known number of CNOTs and the construction of an improved modular exponentiation of a constant by accumulating intermediate data and using a windowing technique. Then, we precisely estimate the number of improved quantum circuits needed to perform the Shor’s algorithm for factoring an n -bit integer, which is 217 n 3 / log 2 n + 4 n 2 + n . We analyse the running time and feasibility of the Shor’s algorithm on an ion-trap quantum computer according to the number of CNOTs. Finally, we discussed the lower bound of the number of CNOTs needed to implement the Shor’s algorithm.

Funder

Chinese Academy of Sciences

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference44 articles.

1. A method for obtaining digital signatures and public-key cryptosystems

2. An overview of cryptanalysis of RSA public key system;K. Berlin;International Journal of Engineering & Technology,2017

3. Rsa public key cryptography algorithm–a review;S. Nisha;International journal of scientific & technology research,2017

4. Under quantum computer attack: is rainbow a replacement of rsa and elliptic curves on hardware?;H. Yi;Security and Communication Networks,2018

5. On the existence of multiple RSA private keys;C.-K. Wu;Security and Communication Networks,2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3