Skip to main content

Questions tagged [quantum-computing]

A computation model which relies on quantum-mechanic phenomena, such as entanglement and superposition. This generalizes the probabilistic model of computation.

0 votes
1 answer
800 views

Why are quantum-proof cryptography algorithms being developed?

I noticed some new quantum cryptography algorithms are being developed. I know very little about quantum computing but my understanding is that it will just be a much more powerful computer and ...
david_adler's user avatar
4 votes
0 answers
142 views

Are Memory-Hard Functions de-facto quantum resistant?

Searches have returned absolutely no results on this question. With that in mind, I assume the answer is either painfully obvious ('of course quantum computers get no advantage when it comes to ...
user7778287's user avatar
2 votes
2 answers
211 views

Breaking the Even-Mansour Cipher with Quantum Period Finding: Probability of unwanted collision

The paper Breaking Symmetric Cryptosystems using Quantum Period Finding shows how to break the Even-Mansour Cipher using Simon's algorithm. The Even-Mansour uses two keys $k_1, k_2$ and a random ...
cryptobeginner's user avatar
0 votes
1 answer
225 views

AES and quantum computing

I am trying to understand the AES-256 encryption algorithm as it would be implemented on a gated quantum computer (actually, a simulator), and I am having some trouble understanding the theory behind ...
Robert Singleton's user avatar
5 votes
1 answer
2k views

Factoring 2048-bit integer with quantum computer?

In this paper, there is a statement in the abstract: Our construction uses $3n + 0.002n \log(n)$ logical qubits, $0.3n^3 + 0.0005n ^3\log(n)$ Toffolis, and $500n^2 +n^2 \log(n)$ measurement depth to ...
NB_1907's user avatar
  • 640
1 vote
1 answer
119 views

Can an adversary distinguish QROM from ROM with a single query?

I acknowledge that QROM differs from ROM (which can be considered as a specific QROM which performs a measurement to the input). For example, one can find a preimage for an arbitrary value with $O(N)$ ...
Henry's user avatar
  • 55
0 votes
1 answer
97 views

QKD measuring qubit with wrong bases

I'm trying to end the research work for my master thesis about BB84 QKD (and QBC) and a basic problem of quantum mechanics is blocking me. I'm trying to do a probability calculus of the action of ...
VitoShade's user avatar
4 votes
1 answer
172 views

A question about performing quantum computations on uniform superpositions

Let us consider the following situation. Let $U_f$ be a gate computing $f$ mapping $\{0,1\}^n$ to $\{0,1\}^n$. That is, $U_f\left\vert x,0^n\right\rangle=\left\vert x,f(x)\right\rangle$. Let $\left\...
Henry's user avatar
  • 55
5 votes
1 answer
187 views

What are the misconceptions of IBM's CEO Arvind Krishna talk on the "Axios on HBO" about the quantum computing

IBM CEO Arvind made a talk in HBO's Axios program. It seems that there are misconceptions/misleading/flaws in reasoning etc. What are those! Some of the details of the speech is given as; IBM says ...
kelalaka's user avatar
  • 49.1k
2 votes
1 answer
625 views

What is the current situation of quantum computers?

Like other research areas of cryptography, quantum computing consists of hidden and open fractions. Apparently, we can't say certain things about governments' capabilities where academical or ...
NB_1907's user avatar
  • 640
2 votes
0 answers
71 views

What are some "must-read" papers for someone getting into Quantum Cryptography? [closed]

I'm a graduate student that just finished a first course on quantum computation. I've also done a graduate-level course in (classical) cryptography. I'm interested in Quantum Cryptography and would ...
CSSTUDENT's user avatar
  • 121
2 votes
1 answer
150 views

Differences between Extractors and Privacy Amplification for Quantum Random Generators

We know that for the last step of QRNG: we need to separate quantum and classical noises from each other so we use extractors, after extractor we need privacy amplification step. At this point: if ...
quest's user avatar
  • 21
4 votes
1 answer
2k views

Is Mega.nz encryption vulnerable to brute force cracking by quantum computers?

I am interested in Mega.nz cloud storage. It is using end-to-end encryption. It says that it uses AES-128 to encrypt files And there are more details in their white paper But I saw that quantum ...
le menhir's user avatar
0 votes
0 answers
100 views

Using two or more encryption algorithms together, how do we compute the strength of the final encryption?

If two or more encryption algorithms are used together, how do we compute the strength of the final encryption? And how would the application perform against quantum computers? The first two tables ...
AED ER's user avatar
  • 11
1 vote
1 answer
224 views

Are MAC algorithms and digital signatures secure from quantum computers? If not, why?

I understand that asymmetric encryption is fundamentally deemed useless under Shor's Algorithm, and understand that symmetric encryption is somewhat quantum-resistant as long as the key-length is ...
CyberCrusader's user avatar

15 30 50 per page