메뉴 건너뛰기




Volumn 73, Issue 6, 2005, Pages 521-540

Shor's factoring algorithm and modern cryptography. An illustration of the capabilities inherent in quantum computers

Author keywords

[No Author keywords available]

Indexed keywords


EID: 21244493696     PISSN: 00029505     EISSN: None     Source Type: Journal    
DOI: 10.1119/1.1891170     Document Type: Article
Times cited : (66)

References (79)
  • 1
    • 0037239692 scopus 로고    scopus 로고
    • From cbits to qbits: Teaching computer scientists quantum mechanics
    • N. D. Mermin, "From cbits to qbits: Teaching computer scientists quantum mechanics," Am. J. Phys. 71, 23-30 (2003).
    • (2003) Am. J. Phys. , vol.71 , pp. 23-30
    • Mermin, N.D.1
  • 2
    • 0035638196 scopus 로고    scopus 로고
    • From Schrodinger's equation to the quantum search algorithm
    • L. K. Grover, "From Schrodinger's equation to the quantum search algorithm," Am. J. Phys. 69, 769-777 (2001).
    • (2001) Am. J. Phys. , vol.69 , pp. 769-777
    • Grover, L.K.1
  • 3
    • 85115374351 scopus 로고
    • Algorithms for quantum computation: Discrete logarithms and factoring
    • edited by S. Goldwasser IEEE Computer Society, Los Alamitos, CA
    • P. W. Shor, "Algorithms for quantum computation: Discrete logarithms and factoring," in Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, edited by S. Goldwasser (IEEE Computer Society, Los Alamitos, CA, 1994), pp. 124-134.
    • (1994) Proceedings of the 35th Annual Symposium on the Foundations of Computer Science , pp. 124-134
    • Shor, P.W.1
  • 4
    • 0142051871 scopus 로고    scopus 로고
    • provides an expanded version of Shor's original paper
    • P. W. Shor, SIAM J. Comput. 26, 1484-1509 (1997) provides an expanded version of Shor's original paper.
    • (1997) SIAM J. Comput. , vol.26 , pp. 1484-1509
    • Shor, P.W.1
  • 6
    • 0030520263 scopus 로고    scopus 로고
    • Quantum computation and Shor's factoring algorithm
    • A. Ekert and R. Josza, "Quantum computation and Shor's factoring algorithm," Rev. Mod. Phys. 68, 733-753 (1996).
    • (1996) Rev. Mod. Phys. , vol.68 , pp. 733-753
    • Ekert, A.1    Josza, R.2
  • 11
    • 84860953553 scopus 로고    scopus 로고
    • 〈arXiv.org/archive/quant-ph〉. See also
    • See, for example, 〈arXiv.org/archive/quant-ph〉. See also 〈www.eg.bucknell.edu/~dcollins/research/qcliterature.html〉.
  • 12
    • 33646637191 scopus 로고    scopus 로고
    • An exposition (suitable for the nonspecialist readers of this journal) of what is now termed the RSA public key system can be found in Ref. 7, pp. 122-127
    • An exposition (suitable for the nonspecialist readers of this journal) of what is now termed the RSA public key system can be found in Ref. 7, pp. 122-127.
  • 16
    • 0003727003 scopus 로고    scopus 로고
    • Scribner, New York, For the definitions adopted here, see
    • D. Kahn, The Codebreakers: The Story of Secret Writing (Scribner, New York, 1996). For the definitions adopted here, see pp. xv-xviii and 989.
    • (1996) The Codebreakers: The Story of Secret Writing
    • Kahn, D.1
  • 17
    • 0004034591 scopus 로고    scopus 로고
    • Doubleday, New York, especially Chaps. 6 and 7
    • S. Singh, The Code Book (Doubleday, New York, 1999), especially Chaps. 6 and 7.
    • (1999) The Code Book
    • Singh, S.1
  • 18
    • 0036013605 scopus 로고    scopus 로고
    • Quantum cryptography
    • pp. 147-148, and Ref. 16, pp. 268-273
    • N. Gisin, Grégoire Ribordy, Wolfgang Tittel, and Hugo Zbinden, "Quantum cryptography," Rev. Mod. Phys. 74, 145-195 (2002), pp. 147-148, and Ref. 16, pp. 268-273.
    • (2002) Rev. Mod. Phys. , vol.74 , pp. 145-195
    • Gisin, N.1    Ribordy, G.2    Tittel, W.3    Zbinden, H.4
  • 19
    • 33646642120 scopus 로고    scopus 로고
    • Reference 15, pp. 71-88
    • Reference 15, pp. 71-88.
  • 20
    • 33646651505 scopus 로고    scopus 로고
    • Reference 15, pp. 93-105
    • Reference 15, pp. 93-105.
  • 21
    • 33646646527 scopus 로고
    • The gold-bug
    • published in 1843. See, for example, Doubleday, New York
    • "The Gold-Bug," published in 1843. See, for example, Complete Stories and Poems of Edgar Allan Poe (Doubleday, New York, 1966), pp. 70 and 819.
    • (1966) Complete Stories and Poems of Edgar Allan Poe , pp. 70
  • 22
    • 33646644214 scopus 로고
    • The adventure of the dancing men
    • See, for example, Doubleday, New York
    • "The Adventure of the Dancing Men." See, for example, The Complete Sherlock Holmes (Doubleday, New York, 1966), p. 593.
    • (1966) The Complete Sherlock Holmes , pp. 593
  • 23
    • 33646662688 scopus 로고    scopus 로고
    • Reference 16, pp. 20-25, and Ref. 15, pp. 99-105, provide detailed illustrative cryptanalyses of such cryptograms
    • Reference 16, pp. 20-25, and Ref. 15, pp. 99-105, provide detailed illustrative cryptanalyses of such cryptograms.
  • 24
    • 33646647874 scopus 로고    scopus 로고
    • Reference 16, Chap. 4, describes the Enigma machine and recounts the remarkable story of how its cryptograms were cryptanalyzed
    • Reference 16, Chap. 4, describes the Enigma machine and recounts the remarkable story of how its cryptograms were cryptanalyzed.
  • 25
    • 0003588996 scopus 로고
    • Simon and Schuster, New York, Chap. 4
    • See also A. Hodges, Alan Turing: The Enigma (Simon and Schuster, New York, 1983), Chap. 4.
    • (1983) Alan Turing: The Enigma
    • Hodges, A.1
  • 26
    • 33646656883 scopus 로고    scopus 로고
    • note
    • Actually it is possible, though intrinsically inconvenient, for Alice and Bob to establish a secure key via conventional communication channels without meeting, as was discovered in 1976; see Ref. 16, pp. 253-267. Secure key distribution also is possible (in theory at least) via "quantum channels," for example, channels that carry pairs of spin 1/2 particles whose spin orientations can be measured by Alice and Bob; see Ref. 14. These secure key distribution schemes are beyond the scope of this paper.
  • 27
    • 33646650759 scopus 로고    scopus 로고
    • I do not pretend that this analogy between cryptographic keys and safes is original. See, for example, Ref. 17
    • I do not pretend that this analogy between cryptographic keys and safes is original. See, for example, Ref. 17.
  • 28
    • 33646640577 scopus 로고    scopus 로고
    • Reference 16, pp. 245-249 and 379
    • Reference 16, pp. 245-249 and 379.
  • 29
    • 84860953554 scopus 로고    scopus 로고
    • especially the link to a decimal-to-ASCII chart
    • ASCII is the acronym for the American Standard Code for Information Interchange. For more information on ASCII, see 〈www.jimprice.com/jimasc. htm〉, especially the link to a decimal-to-ASCII chart.
  • 30
  • 31
    • 33646663999 scopus 로고    scopus 로고
    • Reference 12, especially p. 292
    • Reference 12, especially p. 292.
  • 33
    • 33847249399 scopus 로고    scopus 로고
    • See also "TWIRL and RSA key size," 〈www.rsasecurity.com/ rsalabs/node.asp?id=2004〉.
    • TWIRL and RSA Key Size
  • 34
    • 0011308340 scopus 로고    scopus 로고
    • as updated by Wim van Dam, June
    • A. Ekert, "Quantum cryptoanalysis - Introduction" (as updated by Wim van Dam, June 1999), 〈www.qubit.org/library/intros/cryptana. html〉.
    • (1999) Quantum Cryptoanalysis - Introduction
    • Ekert, A.1
  • 35
    • 33646646916 scopus 로고    scopus 로고
    • Scientific Director Pittsburgh Supercomputing Center, private communication
    • R. Roskies, Scientific Director Pittsburgh Supercomputing Center, private communication.
    • Roskies, R.1
  • 36
    • 84860951991 scopus 로고    scopus 로고
    • (NASA 4/30/04)
    • "How Old is the Universe?" (NASA 4/30/04) at 〈map.gsfc.nasa.gov/m_uni/uni_ 101age.html〉.
    • How Old Is the Universe?
  • 37
    • 33646641651 scopus 로고    scopus 로고
    • Reference 9, pp. 164-166
    • Reference 9, pp. 164-166.
  • 40
    • 33646640748 scopus 로고    scopus 로고
    • Reference 35, pp. 242-258
    • Reference 35, pp. 242-258.
  • 42
    • 84860949144 scopus 로고    scopus 로고
    • "RSA-160 is factored!" 〈www.rsasecurity.com/rsalabs/node. asp?id=2097〉.
    • RSA-160 Is Factored!
  • 44
    • 33646667423 scopus 로고    scopus 로고
    • Reference 35, p. 265
    • Reference 35, p. 265.
  • 46
    • 33646667592 scopus 로고    scopus 로고
    • Reference 7, p. 35
    • Reference 7, p. 35.
  • 47
    • 33646666845 scopus 로고
    • It is fairly easy, in practice, to produce large primes. It is, however, very difficult to produce a theoretical justification for the success of the method
    • Springer, New York
    • P. Ribenboim, The New Book of Prime Number Records (Springer, New York, 1995), p. 156, writes: "It is fairly easy, in practice, to produce large primes. It is, however, very difficult to produce a theoretical justification for the success of the method."
    • (1995) The New Book of Prime Number Records , pp. 156
    • Ribenboim, P.1
  • 48
    • 33646644793 scopus 로고
    • Selling primes
    • 2N, whereas factoring N to find its prime factors p and q requires computing times subexponential in L (as we have discussed, assuming only classical computers are available)
    • 2N, whereas factoring N to find its prime factors p and q requires computing times subexponential in L (as we have discussed, assuming only classical computers are available).
    • (1995) Math. Mag. , vol.68 , pp. 175-182
    • Ribenboim, P.1
  • 49
    • 33646637591 scopus 로고    scopus 로고
    • note
    • A recent test run demonstrated that even with an RSA key number of 2048 binary bits (that is, an RSA-617) a message consisting of approximately 32 000 ASCII characters could be routinely enciphered and deciphered in times of the order of seconds and at most minutes, respectively, employing merely a 700 MHz desktop computer (hardly a supercomputer). For example, using block sizes of 52 ASCII characters (recall Sec. II C), the encryption and decryption times were 1.46 and 30.3 s, respectively. Sam Scheinman, software engineer consultant, private communication.
  • 50
    • 33646659771 scopus 로고    scopus 로고
    • Reference 28, pp. 278-279
    • Reference 28, pp. 278-279.
  • 51
    • 33646661057 scopus 로고    scopus 로고
    • Reference 35, p. 386
    • Reference 35, p. 386.
  • 52
    • 33646663817 scopus 로고    scopus 로고
    • Reference 42, p. 94
    • Reference 42, p. 94.
  • 53
    • 0001534053 scopus 로고    scopus 로고
    • Discrete logarithms: The past and the future
    • A. Odlyzko, "Discrete logarithms: The past and the future," Designs, Codes, Cryptogr. 19, 129-145 (2000).
    • (2000) Designs, Codes, Cryptogr. , vol.19 , pp. 129-145
    • Odlyzko, A.1
  • 54
  • 55
    • 33646668713 scopus 로고    scopus 로고
    • See, for example, Ref. 6, Chap. 7
    • See, for example, Ref. 6, Chap. 7.
  • 57
    • 0040577405 scopus 로고    scopus 로고
    • Quantum computing
    • V. Scarani, "Quantum computing," Am. J. Phys. 66, 956-960 (1998).
    • (1998) Am. J. Phys. , vol.66 , pp. 956-960
    • Scarani, V.1
  • 58
    • 33646647289 scopus 로고    scopus 로고
    • Reference 52, p. 12
    • Reference 52, p. 12.
  • 59
    • 33646667591 scopus 로고    scopus 로고
    • Reference 1, especially Eq. (35)
    • Reference 1, especially Eq. (35).
  • 60
    • 33646637791 scopus 로고    scopus 로고
    • See, for example, Ref. 6, Chap. 4
    • See, for example, Ref. 6, Chap. 4.
  • 61
    • 33646660558 scopus 로고    scopus 로고
    • Reference 35, p. 7
    • Reference 35, p. 7.
  • 62
    • 33646670049 scopus 로고    scopus 로고
    • Reference 7, especially pp. 136-137
    • Reference 7, especially pp. 136-137.
  • 63
    • 33646670583 scopus 로고    scopus 로고
    • See, for example, Ref. 6, pp. 18-19
    • See, for example, Ref. 6, pp. 18-19.
  • 64
    • 33646645009 scopus 로고    scopus 로고
    • Reference 6, pp. 194-198
    • Reference 6, pp. 194-198.
  • 65
    • 33646642301 scopus 로고    scopus 로고
    • Reference 6, pp. 217-220
    • Reference 6, pp. 217-220.
  • 66
    • 33646655788 scopus 로고    scopus 로고
    • Reference 28, pp. 394-403
    • Reference 28, pp. 394-403.
  • 67
    • 0003766834 scopus 로고
    • Clarendon, Oxford, Sec. 10.15, for a proof of the theorem
    • See, for example, Ref. 5. These authors refer to G. H. Hardy and E. M. Wright, An Introduction to the Theory of Numbers (Clarendon, Oxford, 1965), Sec. 10.15, for a proof of the theorem.
    • (1965) An Introduction to the Theory of Numbers
    • Hardy, G.H.1    Wright, E.M.2
  • 68
    • 33646643062 scopus 로고    scopus 로고
    • Reference 35, p. 11
    • Reference 35, p. 11.
  • 69
    • 33646657793 scopus 로고    scopus 로고
    • Reference 44, pp. 319-320
    • Reference 44, pp. 319-320.
  • 70
    • 33646663630 scopus 로고
    • Addison-Wesley, Reading, MA, 3rd ed., and 300 (see Problem 8)
    • D. E. Knuth, The Art of Computer Programming (Addison-Wesley, Reading, MA, 1981), 3rd ed., Vol. 2, pp. 290 and 300 (see Problem 8).
    • (1981) The Art of Computer Programming , vol.2 , pp. 290
    • Knuth, D.E.1
  • 71
    • 0035924370 scopus 로고    scopus 로고
    • Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance
    • L. Vandersypen, Matthias Steffen, Gregory Breyta, Costantino S. Yannoni, Mark H. Sherwood, and Isaac L. Chuang, "Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance," Nature (London) 414, 883-887 (2001).
    • (2001) Nature (London) , vol.414 , pp. 883-887
    • Vandersypen, L.1    Steffen, M.2    Breyta, G.3    Yannoni, C.S.4    Sherwood, M.H.5    Chuang, I.L.6
  • 72
    • 33646666457 scopus 로고    scopus 로고
    • Reference 28, pp. 201-204
    • Reference 28, pp. 201-204.
  • 73
    • 33646669666 scopus 로고    scopus 로고
    • Reference 28, p. 187
    • Reference 28, p. 187;
  • 74
    • 0038661827 scopus 로고
    • University of Chicago, Chicago, quotes the date of Fermat's Little Theorem
    • L. E. Dickson, Modern Elementary Theory of Numbers (University of Chicago, Chicago, 1939), p. 12, quotes the date of Fermat's Little Theorem.
    • (1939) Modern Elementary Theory of Numbers , pp. 12
    • Dickson, L.E.1
  • 75
    • 33646660557 scopus 로고    scopus 로고
    • Reference 28, pp. 80-84
    • Reference 28, pp. 80-84.
  • 76
    • 33646636409 scopus 로고    scopus 로고
    • Reference 42, pp. 6-7
    • Reference 42, pp. 6-7.
  • 77
    • 33646639286 scopus 로고    scopus 로고
    • Reference 28, p. 61; Ref. 66, p. 295
    • Reference 28, p. 61; Ref. 66, p. 295.
  • 78
    • 33646645574 scopus 로고    scopus 로고
    • Reference 28, p. 210
    • Reference 28, p. 210.
  • 79
    • 33646637790 scopus 로고    scopus 로고
    • Reference 28, pp. 132-133
    • Reference 28, pp. 132-133.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.