The problem with this algorithm (and with other attempts to solve SAT
with a quantum computer) is that nobody knows how to build the quantum
function "completely_zero".
-- Mike
On 01/25/2015 12:25 PM, Tao Effect wrote:
Is he referring to this?
http://library.lanl.gov/cgi-bin/getfile?27-06.pdf
Nice find, I hadn't seen this link before.
Yeah, it seems to be talking about the same thing, but without the
explicit algorithm from the 2600 article, which is shown below for
"DES-type block ciphers":
1.
Instantiate a quantum register which contains 56 qubits, called
the key.
2.
Instantiate a classical register which contains 64 bits, called
the plaintext.
3.
Instantiate a classical register which contains 64 bits, called
the cyphertext.
4.
Build a quantum function called decrypt, which accepts a key and a
cyphertext, such that
it returns a 64-bit quantum word containing the decryption. (This
decrypts the cyphertext
using the key, according to the DES algorithm.)
5.
Build a quantum function called match, which accepts one quantum
register input called
qdata and one classical register input called cdata, which returns a
single quantum bit.
(This outputs a 1 bit if the two input words are identical, and
outputs a 0 if they are not
(This outputs a 1 bit if the two input words are identical, and
outputs a 0 if they are not
identical.)
6.
Build a quantum function called completely_zero, which accepts a
single qubit and
returns a classical bit value of 1 if and only if the input was a
pure |0> state. Return 0
otherwise.
7.
Iteration 0: Load the key register with a superposition of all
possible keys, such that bit
0 (the ls bit) of the key is equal to 1. (This will be a
superposition of 2**55 keys).
8.
Send key and cyphertext into the decrypt function. The output will
be a superposition of
2**55 different decryptions of the cyphertext.
9.
Send cyphertext and the output of the decrypt function into the
match function. (The
output will be mostly zero, since most of the trial keys are not
valid.)
10.
Send the output of the match function into the completely_zero
function.
11.
If the output of completely_zero is 1, then bit 0 (the ls bit) of
the result is equal to 0.
12.
Iteration 1: Load the key register with a superposition of all
possible keys, such that bit
1 of the key is equal to 1. (This will be a superposition of 2**55
keys).
13.
Send key and cyphertext into the decrypt function. The output will
be a superposition of
2**55 different decryptions of the cyphertext.
14.
Send cyphertext and the output of the decrypt function into the
match function. (The
output will be mostly zero, since most of the trial keys are not
valid.)
15.
Send the output of the match function into the completely_zero
function.
16.
If the output of completely_zero is 1, then bit 1 of the result is
equal to 0.
17.
Iteration 2-55: Repeat the above steps until Iteration 55.
18.
Complete. You now have all 56 bits of the cipher-key.
--
Please do not email me anything that you are not comfortable also
sharing with the NSA.
On Jan 25, 2015, at 11:38 AM, Tony Arcieri <[email protected]
<mailto:[email protected]>> wrote:
On Sun, Jan 25, 2015 at 11:11 AM, Tao Effect <[email protected]
<mailto:[email protected]>> wrote:
The document I'm looking at [1] is quite damning and indicates QM
systems break traditional symmetric ciphers like DES and AES in
no time at all using "20 questions" algorithm
Is he referring to this?
http://library.lanl.gov/cgi-bin/getfile?27-06.pdf
I'm not sure where "breaks AES-256 in less than one second" is coming
from, and it's hard to tell without the rest of the article being online.
--
Tony Arcieri
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging