login
Home / Papers / Quantum Computing and Post Quantum Cryptography

Quantum Computing and Post Quantum Cryptography

12 Citations2021
Manish Kumar
International Journal of Innovative Research in Physics

Matlab implementation of Shor’s algorithm, used for integer factorization which is polynomial time for quantum computer, is presented and Quantum Proof Algorithm like Lattice-based cryptography used concept of good and bad base is discussed.

Abstract

The present knowledge we had in quantum computer and the most possible architecture of a quantum computer might be able to break RSA 2048 in future. In classical computer two bits represents any one of four bit information whereas in quantum due to superposition it can be represent all four states. For ‘n’ qubits system is analogous to 2n classical bits. Quantum teleportation, quantum entanglement and other makes it possible to break present cryptosystem. Shor’s Algorithm is used for integer factorization which is polynomial time for quantum computer. This can be threat for RSA security. In this paper matlab implementation of Shor’s algorithm is presented. Used classical way for getting period of function because classical computers not engage quantum phenomena. As numbers of iterations grow, probability of getting exact factor of ‘n’ acutely increased. This paper also discusses popular methods for making qubits like Silicon based Qubits in which electron is put inside nano material which is used as a transistor. In Superconducting circuit method insulator is used as a sandwich in between two metal layers. Used by Google, IBM, Intel, Microsoft. In Flux qubits method very small size loop of superconducting metal is used. This paper also discusses Quantum Proof Algorithm like Lattice-based cryptography used concept of good and bad base. In Learning with errors method if we have more equation then variable, it is over defined system. In Code based cryptography some matrixes allow for efficient error correction (good matrix) but most matrix’s does not (bad matrix) concept is used. In Hash based signatures scheme have long signatures or keys, but they are secure. Also discuss Multivariate Quantum proof algorithm. The abstract should contain maximum of 300 words. No abbreviation should be mentioned in the abstract. Give a brief summary of your research work.