Abstract
Shor proposed a quantum polynomial-time integer factorization algorithm to break the RSA public-key cryptosystem. In this paper, we propose a new quantum algorithm for breaking RSA by computing the order of the RSA ciphertext C. The new algorithm has the following properties: 1) recovering the RSA plaintext M from the ciphertext C without factoring n; 2) avoiding the even order of the element; 3) having higher success probability than Shor’s; 4) having the same complexity as Shor’s.
Similar content being viewed by others
References
Yan S Y. Computational Number Theory and Modern Cryptography [M]. Beijing: Higher Education Press, 2013(Ch).
Yan S Y. Number Theory for Computing [M]. 2nd Edition. Berlin: Springer-Verlag, 2002.
Yan S Y. Primality Testing and Integer Factorization in Public-key Cryptography [M]. 2nd Edition. Berlin: Springer-Verlag, 2009.
Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystems [J]. Communications of the ACM, 1978, 21(2): 120–126.
Pomerance C. Smooth numbers and the quadratic sieve [C] // Algorithmic Number Theory. Cambridge: University Press, 2008,44: 69–81.
Lenstra A K, Lenstra H W. The Development of the Number Field Sieve, Lecture Notes in Mathematics 1554 [M]. Berlin: Springer-Verlag, 1993.
Shor P W. Algorithms for quantum computation: discrete logarithms and factoring [C] // Proceedings of 35th Annual Symposium on Foundations of Computer Science. Washington D C: IEEE Computer Society Press, 1994: 124–134.
Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer [J]. SIAM Journal on Computing, 1997, 26(5): 1484–1509.
Yan S Y. Cryptanalytic Attacks on RSA [M]. Berlin: Spring-Verlag, 2008.
Nielson M A, Chuang I L. Quantum Computation and Quantum Information [M]. Cambridge: Cambridge University Press, 2000.
Long G L, Pei S Y, Zeng J Y. Recent Progress in Quantum Mechanics, Fourth Volume [M]. Beijing: Tsinghua University Press, 2007 ( Ch).
Wang Y H, Yan S Y. A new quantum algorithm for breaking RSA [J]. Computer Science, 2016, 43(4):24–27(Ch).
Zhang H G, Wang L N, Du R Y, et al. Research on information security discipline [J]. Journal of Wuhan University (Natural Science Edition), 2010, 56(5): 614–620(Ch).
Zhang H G, Han W B, Lai X J, et al. Survey on cyberspace security [J]. Science China Information Sciences, 2015, 58(11): 1101011–43.
Smolin J A, Smith G, Vargo A. Oversimplifying quantum factoring [J]. Nature, 2013, 499(7457): 163–165.
Gilowski M, Wendrich T, Müller T, et al. Gauss sum factoring with cold atoms [J]. Physical Review Letters, 2008,100(3): 0302011–4.
Peng X H, Liao Z Y, Xu N Y, et al. Quantum adiabatic algorithm for factorization and its experimental implementation [J]. Physical Review Letters, 2008, 101(22): 2204051–4.
Xu N Y, Zhu J, Lu D W, et al. Quantum factorization of 143 on a dipolar-coupling nuclear magnetic resonance system [J]. Physical Review Letters, 2012, 108(13): 1305011–5.
Geller M R, Zhou Z Y. Factoring 51 and 85 with 8 qubits [J]. Scientific Reports, 2013, 3(3023): 1–5.
Parker S, Plenio M B. Efficient factorization with a single qubit and logN mixed qubits [J]. Physical Review Letters, 2000, 85(14): 3049–3052.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (61303212, 61202386), the State Key Program of National Natural Science of China (61332019), the Major Research Plan of the National Natural Science Foundation of China (91018008, SKLSE-2015-A-02)
Biography: WANG Yahui, female, Ph.D. candidate, research direction: quantum computing and cryptography.
Rights and permissions
About this article
Cite this article
Wang, Y., Yan, S. & Zhang, H. A new quantum algorithm for computing RSA ciphertext period. Wuhan Univ. J. Nat. Sci. 22, 68–72 (2017). https://doi.org/10.1007/s11859-017-1218-5
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-017-1218-5