The problem of finding periodicity in quantum cryptanalysis of group cryptography algorithms
DOI:
https://doi.org/10.30837/rt.2024.3.218.08Keywords:
quantum period search problem, post-quantum protection, hidden subgroup problemAbstract
The article explores the fundamental role of quantum period determination algorithms, particularly in the context of cryptography. The work focuses on quantum algorithms that exploit periodicity, such as Shor's algorithm, which is central to efficient integer factorization. It highlights the challenges quantum algorithms face when applied to non-Abelian groups such as the Suzuki, Hermitage, and Rie groups, which exhibit complex periodic structures that are difficult to solve with existing quantum methods. The study delves into the structure and properties of these groups, explaining the complexity of their representations and the challenges posed by the quantum Fourier transform (QFT) in these cases. This contrasts the relative ease with which Abelian groups can be handled by quantum algorithms with the exponential complexity encountered with non-Abelian groups. The study provides a comparative analysis of the computational complexity between classical and quantum approaches to find the period in different types of groups, highlighting that while quantum algorithms offer exponential speedup for Abelian cases, non-Abelian structures remain a frontier for further research. The conclusion calls for continued research in quantum representation theory and cryptanalysis, especially for non-Abelian groups where current quantum methods have not yet provided efficient solutions. The problem of finding the period has been identified as critical to the advancement of both quantum computing and cryptographic applications.
References
Shor P. W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Com-puter // SIAM Journal on Computing. 1997. No 26(5). Р. 1484–1509. https://epubs.siam.org/doi/10.1137/S0097539795293172
Nielsen M. A., & Chuang I. L. (2002). Quantum Computation and Quantum Information. Cambridge Univer-sity Press. https://shorturl.at/09toE
Watrous J. Quantum Computational Complexity // Meyers, R. (eds) Encyclopedia of Complexity and Systems Science. Springer, New York, 2009. NY. https://doi.org/10.1007/978-0-387-30440-3_428
Pollard J. M. A Monte Carlo method for factorization // BIT Numerical Mathematics. 1975. No 15(3). Р. 331–334. https://link.springer.com/article/10.1007/BF01933667
Simon D. R. On the Power of Quantum Computation // Proceedings of the 35th Annual Symposium on Foun-dations of Computer Science, 1994. https://ieeexplore.ieee.org/document/365701
Roetteler M., & Beth T. (1998). Polynomial-time solution to the hidden subgroup problem for a class of non-abelian groups. arXiv preprint quant-ph/9812070. https://arxiv.org/abs/quant-ph/9812070
Kuperberg G. A subexponential-time quantum algorithm for the dihedral hidden subgroup problem // SIAM Journal on Computing, 2005. No 35(1). P. 170–188. https://epubs.siam.org/doi/10.1137/S0097539703436345
Hallgren S., Russell A., & Ta-Shma A. The hidden subgroup problem and quantum computation using group representations // SIAM Journal on Computing, 2003. No 32(4). P. 916–934.
https://epubs.siam.org/doi/abs/10.1137/S0097539701391800
Bernstein D. J., & Lange T. Post-quantum cryptography // Nature. 2017. No 549(7671). P. 188–194. https://www.nature.com/articles/nature23461
Regev O. On lattices, learning with errors, random linear codes, and cryptography // Journal of the ACM. 2005. No 56(6). P. 1–40. https://dl.acm.org/doi/10.1145/1568318.1568324
Peikert C. A decade of lattice cryptography // Foundations and Trends in Theoretical Computer Science. 2016. No 10(4). P. 283–424. https://shorturl.at/0CFgn
Kotukh Y., Khalimov G. Hard Problems for Non-abelian Group Cryptography // Fifth International Scientific and Technical Conference "Computer and Information systems and technologies". https://doi.org/10.30837/csitic52021232176
Kotukh Y., Khalimov G. Towards practical cryptoanalysis of systems based on word problems and logarithmic signatures // INFORMATION SECURITY: PROBLEMS AND PROSPECTS. https://shorturl.at/IaByX
Kotukh Y., Khalimov G. Advantages of logarithmic signatures in the implementation of crypto primitives // Challenges and Issues of Modern Science. https://cims.fti.dp.ua/j/article/download/119/158
Kotukh Y. Quantum cryptoanalysis of prospective asymmetric cryptosystems // Proceedings of conference “Cybersecurity in energy sector”. https://shorturl.at/1pbcK
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).