2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA) 2020
DOI: 10.1109/iccca49541.2020.9250806
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Quantum Computing technique for cracking RSA using Shor’s Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 56 publications
(20 citation statements)
references
References 27 publications
0
20
0
Order By: Relevance
“…To avoid disclosing any information about the spied asset, the attacker could use an approach similar to ransomware [25], [26] to encrypt all pictures with a public key and keep the private key in the drone base station. Although effective to some extent, this approach is not suitable, considering the purposes of the attacker, for two main reasons: (a) if the attacker does not encrypt the data by using post-quantum cryptography techniques, the enemy could use quantum computing techniques, similar to the ones discussed in [27], [28], to break the encryption schema. Regardless of the amount of time that a quantum computing technique may take to break the encryption, the simple fact that all data is stored in one device increases the chance of deciphering.…”
Section: Threat Modelmentioning
confidence: 99%
“…To avoid disclosing any information about the spied asset, the attacker could use an approach similar to ransomware [25], [26] to encrypt all pictures with a public key and keep the private key in the drone base station. Although effective to some extent, this approach is not suitable, considering the purposes of the attacker, for two main reasons: (a) if the attacker does not encrypt the data by using post-quantum cryptography techniques, the enemy could use quantum computing techniques, similar to the ones discussed in [27], [28], to break the encryption schema. Regardless of the amount of time that a quantum computing technique may take to break the encryption, the simple fact that all data is stored in one device increases the chance of deciphering.…”
Section: Threat Modelmentioning
confidence: 99%
“…1) Shor's Algorithm: The Shor's factoring algorithm enhances the method of finding the period of a function faster. Shor proposed a quantum algorithm to factorize integers efficiently than a classical computer [64]. A classical reduction of determining a factoring problem is computationally complex, slow, and limited processing power.…”
Section: F Quantum Search Algorithms For Machine Learningmentioning
confidence: 99%
“…This result is likely to be a strong constraint for protocols and a high additional cost for the user. In addition, with the practical application of quantum computers, it is likely that cryptography based on computational security, such as Rivest-Shamir-Adleman (RSA), which is currently in use, will crack in the future [5].…”
Section: . Introductionmentioning
confidence: 99%