{"id":381917,"date":"2017-05-08T16:42:58","date_gmt":"2017-05-08T23:42:58","guid":{"rendered":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/?p=381917"},"modified":"2017-05-09T06:00:45","modified_gmt":"2017-05-09T13:00:45","slug":"cryptography-quantum-computing-intersect","status":"publish","type":"post","link":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/blog\/cryptography-quantum-computing-intersect\/","title":{"rendered":"Where cryptography and quantum computing intersect"},"content":{"rendered":"<p><em>By <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/people\/klauter\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kristin Lauter<\/a>, Principal Researcher, Microsoft Research<\/em><\/p>\n<p>Last week I spent time at the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/aimath.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">American Institute of Mathematics <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>in San Jose, working with a group of 20 or so mathematicians and computer scientists on questions related to quantum arithmetic, at a conference co-organized by researchers in the Microsoft Research (MSR) <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/group\/quantum-architectures-and-computation-group-quarc\/\">Quantum Architectures and Computation (QuArC)<\/a> group. You might ask, why is a cryptographer working on this topic? (And also, when will we have a quantum computer? \ud83d\ude42 )<\/p>\n<p>I was at this <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/aimath.org\/pastworkshops\/arithgoldgates.html\" target=\"_blank\" rel=\"noopener noreferrer\">workshop <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>thanks to a surprising intersection between cryptography and quantum computing: An algorithm for breaking a cryptographic hash function which we found more than 10 years ago turns out to be relevant for designing efficient circuits for quantum arithmetic! In 2008, we published an efficient and constructive <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/eprint.iacr.org\/2008\/173.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">algorithm to find paths in LPS graphs <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>to break the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/eprint.iacr.org\/2006\/021.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">cryptographic hash function<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. The hash function was one in a family I had proposed in 2005 with Denis Charles (MSR) and Eyal Goren, professor, McGill University. Finding preimages for this hash function involved identifying paths in the well-known <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/link.springer.com\/article\/10.1007%2FBF02126799\" target=\"_blank\" rel=\"noopener noreferrer\">Lubotzky-Phillips-Sarnak (LPS) graphs<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, the celebrated Ramanujan (yes, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.imdb.com\/title\/tt0787524\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Man Who Knew Infinity<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>) graphs constructed in the 1980s. This had been an open problem for several decades; we were delighted when we solved it.<\/p>\n<p>But due to the stove pipes among research communities, our algorithm was not known to a group of researchers in quantum arithmetic, who wanted to solve this problem for a completely different reason. In 2014, Neil Ross and Peter Selinger published <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/arxiv.org\/abs\/1403.2975\" target=\"_blank\" rel=\"noopener noreferrer\">an algorithm <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>that they found independently in a different setting, but which turns out to be essentially the same as our algorithm. They were trying to solve the problem of decomposing operations on a single qubit into quantum circuits and for finding the shortest possible circuit.<\/p>\n<p>Researchers in the QuArC group at Microsoft Research, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/people\/vadym\/\">Vadym Kliuchnikov<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/people\/ksvore\/\">Krysta Svore<\/a>, <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/people\/martinro\/\">Martin Roetteler<\/a>, and others, had played a crucial role in developing a <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/arxiv.org\/abs\/1510.03888\" target=\"_blank\" rel=\"noopener noreferrer\">framework <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>for addressing questions in quantum arithmetic more broadly, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/arxiv.org\/abs\/1310.4150\" target=\"_blank\" rel=\"noopener noreferrer\">including for topological qubits<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, the focus of Microsoft&#8217;s approach to quantum computing (for Ising anyons, Fibonacci anyons, and metaplectic anyons).\u00a0 This is important for the future of quantum computing because once a quantum computer is built, we will need to efficiently express operations on qubits in terms of <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/en.wikipedia.org\/wiki\/Quantum_gate\" target=\"_blank\" rel=\"noopener noreferrer\">fundamental gates <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>that can be realized in the physical world.\u00a0 One of the candidates identified are the Clifford+T gates.\u00a0 The connection between our LPS path-finding algorithm and this area was discovered in 2015 by <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/sites.google.com\/site\/alexandergamburd\/\" target=\"_blank\" rel=\"noopener noreferrer\">Alex Gamburd<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, professor, Graduate Center, CUNY, and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.math.princeton.edu\/directory\/peter-sarnak\" target=\"_blank\" rel=\"noopener noreferrer\">Peter Sarnak<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, professor, Princeton University, and now, topics from both cryptography and quantum arithmetic are included in the workshop.<\/p>\n<p>I have recently become interested in quantum computation for another reason that is important to the future of cryptography. The security of our e-commerce and cloud-based systems and the privacy of much of our data rely on the strength of currently deployed public key cryptographic systems such as RSA and Elliptic Curve Cryptography (ECC).\u00a0 Once robust quantum computers can be built at a large enough scale, polynomial time <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/en.wikipedia.org\/wiki\/Shor%27s_algorithm\" target=\"_blank\" rel=\"noopener noreferrer\">quantum algorithms <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>can be implemented to attack the underlying math problems for these cryptosystems, rendering them insecure. However, it is not clear how soon a sufficiently large and robust quantum computing device will be built, and also which architecture and gate set will be realizable. This makes it difficult to estimate the concrete security for cryptosystems of a given bit length in a post-quantum environment, and difficult to estimate the appropriate timeline for migration to new cryptosystems. In collaboration with researchers in QuArC, we have been developing concrete quantum estimates for breaking current encryption systems. At the workshop, we discussed various possible quantum gate sets that might become real; some of the project groups focused on developing the mathematics to implement efficient computation if those gate sets are built.<\/p>\n<p>There may be hard instances of the &#8220;path-finding problem&#8221;\u009d for explicit choices of expander graphs, and such graphs could be the foundation for post-quantum cryptosystems, meaning classical protocols that are resistant to quantum attacks. This year, the National Institute of Standards and Technology (NIST) is running an international <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/csrc.nist.gov\/groups\/ST\/post-quantum-crypto\/workshops.html\" target=\"_blank\" rel=\"noopener noreferrer\">Post-Quantum Cryptography (PQC)<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> competition, with submissions due in November, to determine possible replacements for currently deployed cryptographic systems. One of the possible candidates for standardization is based on the hard problem, path-finding in Supersingular Isogeny Graphs, introduced in our 2006 <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/eprint.iacr.org\/2006\/021.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">cryptographic hash function <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>paper.\u00a0 This paper was presented at an <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/csrc.nist.gov\/groups\/ST\/hash\/documents\/RumpSession_Benaloh.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">NIST workshop <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>in 2005, a workshop leading to standardizing the new cryptographic hash function <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/sha-3_standardization.html\" target=\"_blank\" rel=\"noopener noreferrer\">SHA-3<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, and was described in a <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/science.sciencemag.org\/content\/319\/5869\/news-summaries\" target=\"_blank\" rel=\"noopener noreferrer\">news article <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>in Science magazine in 2008.<\/p>\n<p>In that paper we proposed the hard problem of finding paths or cycles in the Supersingular Isogeny Graph. This hard problem has since been used as the basis for proposals for encryption, key exchange and digital signatures, which are the three tracks of the NIST competition. Supersingular Isogeny Graphs consist of vertices, which are isomorphism classes of supersingular elliptic curves in characteristic p, and the edges are isogenies, or maps between curves that are homomorphisms, thus the name Supersingular Isogeny Graph. Originally studied and generalized by <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/web.math.rochester.edu\/people\/faculty\/apizer\/\" target=\"_blank\" rel=\"noopener noreferrer\">Arnold Pizer<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, professor emeritus, University of Rochester, these graphs have connections to deep theorems in number theory and beautiful properties such as optimal expansion constants. The expansion constants ensure that relatively short walks on the graph quickly approximate the uniform distribution in the output.<\/p>\n<p>&nbsp;<\/p>\n<div id=\"attachment_381923\" style=\"width: 860px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-381923\" class=\"wp-image-381923\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2017\/05\/Supersingular-Isogeny-Graph-1024x924.jpg\" alt=\"Supersingular Isogeny Graph\" width=\"850\" height=\"767\" srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2017\/05\/Supersingular-Isogeny-Graph-1024x924.jpg 1024w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2017\/05\/Supersingular-Isogeny-Graph-300x271.jpg 300w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2017\/05\/Supersingular-Isogeny-Graph-768x693.jpg 768w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2017\/05\/Supersingular-Isogeny-Graph.jpg 1667w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><p id=\"caption-attachment-381923\" class=\"wp-caption-text\">A small example of a Supersingular Isogeny Graph, for the prime p=2521, graph image by Denis Charles, principal applied scientist, Microsoft Research<\/p><\/div>\n<p>Like many other public key systems, operations necessary to implement Supersingular Isogeny Graphs can be costly, so there is no guarantee that these systems would be competitive from a performance point of view. Also, like many of the other possible math-based candidates such as code-based cryptography, lattice-based cryptography and multivariate cryptosystems, relatively new math problems need to be studied for possible vulnerability to both classical and quantum algorithms. Thanks to the NIST PQC competition, we can expect mathematicians and cryptographers to be very busy during the next few years as we determine the best possible choices for our post-quantum cryptography standards.<\/p>\n<p><strong>Learn more<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/group\/cryptography-research\/\">Microsoft Research Cryptography Group<\/a><\/li>\n<li>Microsoft\u2019s work on quantum computing at <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/stationq.microsoft.com\/\">Station Q<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>By Kristin Lauter, Principal Researcher, Microsoft Research Last week I spent time at the American Institute of Mathematics in San Jose, working with a group of 20 or so mathematicians and computer scientists on questions related to quantum arithmetic, at a conference co-organized by researchers in the Microsoft Research (MSR) Quantum Architectures and Computation (QuArC) [&hellip;]<\/p>\n","protected":false},"author":39507,"featured_media":381971,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[],"msr_hide_image_in_river":0,"footnotes":""},"categories":[194472,205401],"tags":[234680,234692,234689,234686,234683,234695],"research-area":[13552,13558],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-381917","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptography","category-quantum","tag-american-institute-of-mathematics","tag-cryptographic-hash-function","tag-nist","tag-polynomial-time-quantum-algorithms","tag-quantum-arithmetic","tag-supersingular-isogeny-graphs","msr-research-area-hardware-devices","msr-research-area-security-privacy-cryptography","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[199565],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-events":[],"related-researchers":[],"msr_type":"Post","featured_image_thumbnail":"<img width=\"655\" height=\"280\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2017\/05\/Supersingular_Isogeny_blog.jpg\" class=\"img-object-cover\" alt=\"Supersingular Isogeny\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2017\/05\/Supersingular_Isogeny_blog.jpg 655w, https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-content\/uploads\/2017\/05\/Supersingular_Isogeny_blog-300x128.jpg 300w\" sizes=\"auto, (max-width: 655px) 100vw, 655px\" \/>","byline":"","formattedDate":"May 8, 2017","formattedExcerpt":"By Kristin Lauter, Principal Researcher, Microsoft Research Last week I spent time at the American Institute of Mathematics in San Jose, working with a group of 20 or so mathematicians and computer scientists on questions related to quantum arithmetic, at a conference co-organized by researchers&hellip;","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/posts\/381917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/users\/39507"}],"replies":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/comments?post=381917"}],"version-history":[{"count":11,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/posts\/381917\/revisions"}],"predecessor-version":[{"id":382193,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/posts\/381917\/revisions\/382193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media\/381971"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/media?parent=381917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/categories?post=381917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/tags?post=381917"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=381917"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=381917"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=381917"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=381917"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=381917"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=381917"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=381917"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=381917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}