A Shor Quantum Attack Method Against Public Key Cryptography ECC
A public-key cryptography and quantum technology, applied in the field of quantum cryptography, can solve the problems of small Qubit quantum computing attacks, which have not been solved well, and achieve the effect of strong versatility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] Such as figure 1 As shown, a Shor quantum attack method against public key cryptography ECC includes the following steps:
[0037] Step 1: Select an elliptic curve on a prime field p on a binary field, and output all coordinate points (x t ,y t ), 1≤t≤N; N is the number of coordinate points on the elliptic curve; the number of executions is set to 0;
[0038] Step 2: Select point P and point Q on the elliptic curve arbitrarily, satisfy P=kQ, k is the attack private key, and the output is the same as each point on the elliptic curve (x t ,y t ) corresponding to x t P+y t Q and x t point of P;
[0039] Step 3: Construct a periodic function whose period is k:
[0040] f(a)=x a mod p (1)
[0041] Among them, x is a number smaller than p and coprime with p, and a is any natural number;
[0042] Step 4: Create two quantum registers: set the initial state of the first quantum register to means n(n=log 2 The direct product of p+1) qubits; the initial state of t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


