Quantum Computing is Here To Disrupt Your Privacy Again

We all know that the Quantum Computing Industry observed a boom in resources and funding over the last 2 decades. The largest of the Tech companies want to build a piece of this remarkable machinery and bag the title of “Quantum Supremacy.” The term itself is very hard to define, in other words, it is ineffable!

Now a quick recap: In the last article, I talked about the basics of quantum computing and the very basics of the RSA algorithm. I mentioned something about the Lightsaber if you can recall. Can’t recall here’s a link. (In case! 😜)

Diving right into the topic
Let’s dive right in, shall we? (Image: Giphy)

The Ultimate Quantum Computing Weapon

In the year 1980, then very famous Richard Feynman sir tried his hand at Quantum Computing. He proposed a very crazy idea that if we could somehow develop a machine that reads qubits, that would be the biggest miracle of mankind so far. The possibilities he could think of were endless. Besides doing tasks that supercomputers weren’t capable of doing (or took a long time 🥱), scientists at that time did not seem to have anything on the plate that would attract the attention of brilliant minds or heavy pockets.

Richard Feynman and Quantum computing thought
Mr. Feynman explaining Quantum computing lectures. (Image: ayltai.medium)

The year 1994 changed the whole game when Peter Shor, an ex-Caltech sophomore published a paper that became the Crown Jewel of Quantum Computing syllabus. A paper that would set a roadmap for the future of Quantum Computing.

The Lightsaber: Shor’s Algorithm

The suspense is over now. As sketchy and techy as the name I gave it seems, this isn’t some kind of algorithm you can carry in your pocket, plug-in, and steal everything. It requires two major things, firstly a quantum computer and secondly error-reduction methods.

Ex-Sophomore of Caltech Peter Shor
Peter Shor the inventor of Shor’s algorithm. Professor of Applied Mathematics at MIT. (Image: Nature.com)

But let us first hear what Peter Shor has to say about his algorithm in his own words. “At first, I had only an intermediate result. I gave a talk about it at Bell Labs [in New Providence, New Jersey, where I was working at the time] on a Tuesday in April 1994. The news spread amazingly fast, and that weekend, computer scientist Umesh Vazirani called me. He said, “I hear you can factor on a quantum computer, tell me how it works.” At that point, I had not solved the factoring problem. I don’t know if you know the children’s game ‘telephone’, but somehow in five days, my result had turned into factoring as people were telling each other about it. And in those five days, I had solved factoring as well, so I could tell Umesh how to do it.”

In the previous article, I discussed the working basics of the RSA algorithm. All the encryption systems today use a composite number(N) that is a product of two co-prime numbers. The numbers are in the range of 200 digits. Shor’s algorithm provides an upper hand by providing a way to factor the number N and hence break the encryption.

Deciphering the Shor’s Algorithm

Now, this remarkable algorithm works in a certain number of steps. Any prior mathematical knowledge would prove beneficial now. (Just kidding! 😂)

Firstly, we have to choose a number ‘g’ (random) < N (composite number), a step that can be classically performed by human minds as well as traditional computers. One thing I’d like to mention is that ‘g’ doesn’t need to be an exact factor of N, but can also share factors with N.

Now I need you to understand one thing, that if A and B are co-prime then An = m*B + 1. (This is a proven formula.) Take 7 and 50, they don’t share a factor but 74 = 2401= 48*50 +1.

So our random guess follows gp = m*N +1 (p ≠ 0). Solving further gp -1 =m*N can be resolved into:

(gp/2 + 1)*( gp/2 – 1)= m*N

The terms on the left-hand side are the new and improved guesses. No matter if the terms are multiples of the factors of N, we have a pretty darn 2000-year-old efficient algorithm called “Euclid’s algorithm.”

The working of Shor's algorithm
How Shor’s algorithm works.

This is all folks, the algorithm that can break your privacy. But wait, you will say “If this is so simple, why can’t we run it on today’s computer already? 🤷‍♂️” I might say there are some major hurdles in between.

Traditional computers don’t have that much processing power to break the encryption. For reference, a normal desktop would take 2000 years to break a 78 digit long encryption. Secondly, there’s a slight chance that one of the numbers on the left side might be a multiple of N, in that case, the other would be a factor of ‘m’. Thirdly, the power ‘p’ might be odd, because of which we can’t use it.

But 37.5% of chance this algorithm works, great! But wait why is a Quantum Computer exactly needed? How do we find “p”? The answer lies in Quantum mechanics itself.

The Real Thief Is Here

The sole difference between quantum and classical computers is that quantum can perform operations simultaneously. Now, let’s take another guess ‘x’ and raise ‘g’ to that number. The classical would do this individually but quantum speeds up the process ridiculously fast. All thanks to Quantum Superposition.

a cartoon depicting the quantum superposition phenomenon
Cartoon that explains the weird concept of Quantum superposition. [Source- Pinterest]

It takes all the values of ‘x’ at and raises ‘g’ to that power. After that, we calculate the remainder(r) when divided by N and save it. We can’t measure directly because of the Quantum Measurement problem that would destroy the superposition. So we measure only the remainder ‘r’ of the saved superposition and we get a random number say ‘x’. There’s something special here that if we observe (not measure) the superposition we are left purely with the powers that resulted in the remainder ‘x’.

Measuring only the remainder, you are left with superposition of all possible states resulting in that remainder.
The superposition of all the possible states resulting in a certain remainder. (Image: minutephysics (YouTube))

How does this benefit us? It’s because of the repeating nature of power ‘p’. All the powers are period- ‘p’ apart. So the only challenge is to measure this period or Frequency and viola, you have the key!

You guessed it right! There’s also a twist here, to find ‘p’ you need to understand the crux of Shor’s Algorithm called the “Quantum Fourier Transform.

how QFT works
The working of QFT to give a frequency as output. (Image: minutephysics (YouTube))

The Jewel Of The Crown Jewel

While working of QFT is too complex to describe and we have lost a hint of details in previous sections. Thus, being a tad subtle here, I would like to mention that FT is widely used to find frequencies.

QFT working basics
QFT working described using Hadamard gate and Unitary rotation of individual qubits. (Image: Wikipedia/QFT)

Given an audio signal (wave) as input, FT changes the amplitudes converting it into a frequency graph. With a graph at your disposal, you can find the frequency and ultimately period.

Above all, I mentioned that by measuring ‘r’ we are left with a superposition of all states with remainder ‘x’. Every state results in a sin wave, with constructively and destructively interfering producing a wave with a frequency of . And as long as ‘p’ is even, and not a factor of N, you have The KEY.

The Post Quantum Computing Era

The subject of speculation; Is our data safe?
A cartoon describing the common questions regarding privacy.

To sum up, we explored how Quantum computing algorithms can prove a risk to the Internet’s security. Are we there yet? As much as I hate to be the bearer of the bad news, the answer is NO! The encryption algorithms RSA-768, RSA- 2048 are so big that we can factor them today even on World’s largest Q.Cs.

The Q.Cs need roughly 5900 qubits to factor a small RSA-230 algorithm. And there’s been a major wave of excitement because D-wave has constructed a 5900 qubits Q.C. Maybe one day, we would have a Quantum Internet that would take the cryptographic systems to a whole new level.

A computer would deserve to be called intelligent if it could deceive a human into believing that it was human.

Alan Turing

A vote of thanks to Minutephysics, nature.com and Qiskit.

Related articles

Meet APC: A Leading-Edge Technology to boost Old Combustion Engines

Combustion Engines are now experiencing a downfall, however, the researchers haven't failed to experiment with improvements.

QLED: The Brand New Quantum Torchbearer Of The Futuristic Tech

The display industry has long been satisfied with the evolution of OLED. But when a classical tech meets Quantum systems, a new tech QLED emerges that has the potential to replace OLED and probably bring futuristic foldable tech to life.

The Top 10 Mind-blowing Technologies That Stole The Spotlight In CES 2021

With 2021 kicking off and everyone filled with a...

Spicing Up Your Security: Salt and Pepper To Make Your Password Hash More Secure…

We live in a digital era where data is more precious than life. How is this data secured then? Well, it is with salt and pepper, not the spices, but the cryptographic ones. Read more about how these cryptospices improve your data security and protect your hash from hackers and crackers.

Smile Big Universe! You are Under 3200 Megapixel Surveillance!

Our Universe has many tricks up its sleeve. But Scientists have invented a camera of 3200 megapixel that can take clear snapshots of night-sky.
Harshil Bhanushali
Harshil Bhanushali
Pursuing Masters in Chemistry. I'm a Student of Curiosity exploring Wonders ranging from quantum to space. I'm also a tech enthusiastic and an amateur web designer.

9 COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here
Captcha verification failed!
CAPTCHA user score failed. Please contact us!