The problem of finding periodicity in quantum cryptanalysis of group cryptography algorithms

Authors

DOI:

https://doi.org/10.30837/rt.2024.3.218.08

Keywords:

quantum period search problem, post-quantum protection, hidden subgroup problem

Abstract

The article explores the fundamental role of quantum period determination algorithms, particularly in the context of cryptography. The work focuses on quantum algorithms that exploit periodicity, such as Shor's algorithm, which is central to efficient integer factorization. It highlights the challenges quantum algorithms face when applied to non-Abelian groups such as the Suzuki, Hermitage, and Rie groups, which exhibit complex periodic structures that are difficult to solve with existing quantum methods. The study delves into the structure and properties of these groups, explaining the complexity of their representations and the challenges posed by the quantum Fourier transform (QFT) in these cases. This contrasts the relative ease with which Abelian groups can be handled by quantum algorithms with the exponential complexity encountered with non-Abelian groups. The study provides a comparative analysis of the computational complexity between classical and quantum approaches to find the period in different types of groups, highlighting that while quantum algorithms offer exponential speedup for Abelian cases, non-Abelian structures remain a frontier for further research. The conclusion calls for continued research in quantum representation theory and cryptanalysis, especially for non-Abelian groups where current quantum methods have not yet provided efficient solutions. The problem of finding the period has been identified as critical to the advancement of both quantum computing and cryptographic applications.

References

Shor P. W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Com-puter // SIAM Journal on Computing. 1997. No 26(5). Р. 1484–1509. https://epubs.siam.org/doi/10.1137/S0097539795293172

Nielsen M. A., & Chuang I. L. (2002). Quantum Computation and Quantum Information. Cambridge Univer-sity Press. https://shorturl.at/09toE

Watrous J. Quantum Computational Complexity // Meyers, R. (eds) Encyclopedia of Complexity and Systems Science. Springer, New York, 2009. NY. https://doi.org/10.1007/978-0-387-30440-3_428

Pollard J. M. A Monte Carlo method for factorization // BIT Numerical Mathematics. 1975. No 15(3). Р. 331–334. https://link.springer.com/article/10.1007/BF01933667

Simon D. R. On the Power of Quantum Computation // Proceedings of the 35th Annual Symposium on Foun-dations of Computer Science, 1994. https://ieeexplore.ieee.org/document/365701

Roetteler M., & Beth T. (1998). Polynomial-time solution to the hidden subgroup problem for a class of non-abelian groups. arXiv preprint quant-ph/9812070. https://arxiv.org/abs/quant-ph/9812070

Kuperberg G. A subexponential-time quantum algorithm for the dihedral hidden subgroup problem // SIAM Journal on Computing, 2005. No 35(1). P. 170–188. https://epubs.siam.org/doi/10.1137/S0097539703436345

Hallgren S., Russell A., & Ta-Shma A. The hidden subgroup problem and quantum computation using group representations // SIAM Journal on Computing, 2003. No 32(4). P. 916–934.

https://epubs.siam.org/doi/abs/10.1137/S0097539701391800

Bernstein D. J., & Lange T. Post-quantum cryptography // Nature. 2017. No 549(7671). P. 188–194. https://www.nature.com/articles/nature23461

Regev O. On lattices, learning with errors, random linear codes, and cryptography // Journal of the ACM. 2005. No 56(6). P. 1–40. https://dl.acm.org/doi/10.1145/1568318.1568324

Peikert C. A decade of lattice cryptography // Foundations and Trends in Theoretical Computer Science. 2016. No 10(4). P. 283–424. https://shorturl.at/0CFgn

Kotukh Y., Khalimov G. Hard Problems for Non-abelian Group Cryptography // Fifth International Scientific and Technical Conference "Computer and Information systems and technologies". https://doi.org/10.30837/csitic52021232176

Kotukh Y., Khalimov G. Towards practical cryptoanalysis of systems based on word problems and logarithmic signatures // INFORMATION SECURITY: PROBLEMS AND PROSPECTS. https://shorturl.at/IaByX

Kotukh Y., Khalimov G. Advantages of logarithmic signatures in the implementation of crypto primitives // Challenges and Issues of Modern Science. https://cims.fti.dp.ua/j/article/download/119/158

Kotukh Y. Quantum cryptoanalysis of prospective asymmetric cryptosystems // Proceedings of conference “Cybersecurity in energy sector”. https://shorturl.at/1pbcK

Published

2024-09-26

How to Cite

Kotukh, Y., Khalimov, G., & Dzhura, I. (2024). The problem of finding periodicity in quantum cryptanalysis of group cryptography algorithms. Radiotekhnika, 3(218), 103–109. https://doi.org/10.30837/rt.2024.3.218.08

Issue

Section

Articles