Abstract
What would happen if all of the algorithms in public-key cryptography suddenly could be broken in seconds or minutes? Those algorithms, like RSA and elliptic curve cryptography are the ones that we depend on for Internet commerce. What if they were all of a sudden useless? Would society collapse? Would commerce be at an end? That is the promise and the danger of quantum computers .
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Remember Schrödinger’s cat. The cat in the closed box may either be dead or alive. Only when the box is opened do we know which state the cat is in. Qubits work the same way. Only when you observe (measure) them do you know what state they are in. Until that point there is the probability they are in any of the other possible states.
- 2.
- 3.
- 4.
For a list of many quantum computing algorithms see https://math.nist.gov/quantum/zoo/
- 5.
- 6.
Wiesner did try to get a version of his idea with an application to quantum currency published, but his paper was rejected. He resurrected his ideas a decade later and was finally able to get them published. This is the starting point for the Bennett and Brassard research that led to their 1984 paper.
- 7.
This is an admittedly over-simplified description of these physical concepts.
References
Aaronson, Scott. 2007. Shor, I’ll Do It. Shtetl-Optimized (blog). https://www.scottaaronson.com/blog/?p=208.
Altepeter, Joseph B. 2010. A Tale of Two Qubits: How Quantum Computers Work. Ars Technica (Online Magazine), January 18, 2010.
Bauer, Craig P. 2013. Secret History: The Story of Cryptology. Boca Raton: CRC Press.
Beall, Abigail, and Matthew Reynolds. 2018. What Are Quantum Computers and How Do They Work? News Magazine. WIRED Explains (blog). February 16, 2018. http://www.wired.co.uk/article/quantum-computing-explained.
Becker, Georg. 2008. Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis. Bochum: Ruhr-Universitat. https://www.emsec.rub.de/media/crypto/attachments/files/2011/04/becker_1.pdf.
Bennett, Charles, and Gilles Brassard. 1984. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the International Conference on Computers, Systems and Signal Processing, 175–179. Bangalore: IEEE Press. https://ac.els-cdn.com/S0304397514004241/1-s2.0-S0304397514004241-main.pdf?_tid=spdf-39fa8c91-ee23-435f-9ebc-e190fb9df4ed&acdnat=1519852813_d1ac5e5aac18dec5339c912906b01285.
Bernstein, Daniel. 2009. Introduction to Post-Quantum Cryptography. In Post-Quantum Cryptography, 1–14. Berlin: Springer-Verlag.
Bernstein, Daniel, Johannes Buckmann, and Erik Dahmen, eds. 2009. Post-Quantum Cryptography. Berlin: Springer-Verlag.
Cesare, Chris. 2015. Encryption Faces Quantum Foe. Nature, September 9, 2015.
Gidney, Craig. 2013. Grover’s quantum search algorithm. Twisted Oak (blog). March 5, 2013. http://twistedoakstudios.com/blog/Post2644_grovers-quantum-search-algorithm.
Grover, Lov. 1996. A Fast Quantum Mechanical Algorithm for Database Search. In Proceedings, 28th Annual ACM Symposium on the Theory of Computing (STOC), 212–219. Philadelphia. https://arxiv.org/pdf/quant-ph/9605043.pdf.
Hoffstein, Jeffrey, Jill Pipher, and Joseph H. Silverman. 1998. NTRU: A Ring Based Public Key Cryptosystem. In Lecture Notes in Computer Science 1423, 267–288. Portland: Springer-Verlag.
Preskill, John. 1998. Robust Solutions to Hard Problems. Nature, February 12, 1998.
Proos, John, and Christof Zalka. 2003. Shor’s Discrete Logarithm Quantum Algorithm for Elliptic Curves. Quantum Information and Computation 3 (4): 317–344.
Shor, Peter. 1994. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 124–134. Santa Fe: IEEE Computer Society Press. https://arxiv.org/abs/quant-ph/9508027v2.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Dooley, J.F. (2018). What Is Next in Cryptology?. In: History of Cryptography and Cryptanalysis. History of Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-90443-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-90443-6_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-90442-9
Online ISBN: 978-3-319-90443-6
eBook Packages: Computer ScienceComputer Science (R0)