• Complain

Yan - Quantum Attacks on Public-Key Cryptosystems

Here you can read online Yan - Quantum Attacks on Public-Key Cryptosystems full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Boston;MA;New York;NY u.a, year: 2013, publisher: Springer US, genre: Children. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Yan Quantum Attacks on Public-Key Cryptosystems
  • Book:
    Quantum Attacks on Public-Key Cryptosystems
  • Author:
  • Publisher:
    Springer US
  • Genre:
  • Year:
    2013
  • City:
    Boston;MA;New York;NY u.a
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Quantum Attacks on Public-Key Cryptosystems: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Quantum Attacks on Public-Key Cryptosystems" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Yan: author's other books


Who wrote Quantum Attacks on Public-Key Cryptosystems? Find out the surname, the name of the author of the book and a list of all author's works by series.

Quantum Attacks on Public-Key Cryptosystems — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Quantum Attacks on Public-Key Cryptosystems" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Song Y. Yan Quantum Attacks on Public-Key Cryptosystems 2013 10.1007/978-1-4419-7722-9_1 Springer Science+Business Media, LLC 2013
1. Classic and Quantum Computation
Song Y. Yan 1
(1)
Department of Mathematics, Harvard University, Cambridge, MA, USA
Abstract
In this chapter, we shall first give an account of the basic concepts and results in classical computability and complexity and then, the quantum computability and complexity, which will be used throughout the book.
Anyone who is not shocked by quantum theory has not understood it.
Niels Bohr (18851962)
The 1922 Nobel Laureate in Physics
In this chapter, we shall first give an account of the basic concepts and results in classical computability and complexity and then, the quantum computability and complexity, which will be used throughout the book.
1.1 Classical Computability Theory
Computability studies what a computer can do and what a computer cannot do. As a Turing machine can do everything that a real computer can do, our study of computability will be within the theoretical framework of Turing machines.
Turing Machines
The idea and the theory of Turing machines were first proposed and studied by the great English logician and mathematician Alan Turing (19121954) in his seminal paper [). First of all, we shall present a formal definition of the Turing machine.
Fig 11 Alan Turing and the first page of his 1936 paper Definition 11 A - photo 1
Fig. 1.1
Alan Turing and the first page of his 1936 paper
Definition 1.1.
A standard multitape Turing machine , M (see Fig.), is an algebraic system defined by
Quantum Attacks on Public-Key Cryptosystems - image 2
(1.1)
where
Q is a finite set of internal states .
is a finite set of symbols called the input alphabet . We assume that Quantum Attacks on Public-Key Cryptosystems - image 3 .
is a finite set of symbols called the tape alphabet .
is the transition function, which is defined by
(a)
If M is a deterministic Turing machine (DTM), then
12 b If M is a nondeterministic Turing machine NDTM then 13 - photo 4
(1.2)
(b)
If M is a nondeterministic Turing machine (NDTM), then
13 where L and R specify the movement of the readwrite head left or right - photo 5
(1.3)
where L and R specify the movement of the readwrite head left or right . When k =1, it is just a standard one-tape Turing machine.
is a special symbol called the blank q 0 Q is the initial state F Q - photo 6 is a special symbol called the blank .
q 0 Q is the initial state .
F Q is the set of final states .
Fig 12 k -tape k 1 Turing machine Turing machines although simple and - photo 7
Fig. 1.2
k -tape ( k 1) Turing machine
Turing machines, although simple and abstract, provide us with a most suitablemodel of computation for modern digital and even quantum computers.
Example 1.1.
Given two positive integers x and y , design a Turing machine that computes x + y . First, we have to choose some convention for representing positive integers. For simplicity, we will use unary notation in which any positive integer x is represented by Quantum Attacks on Public-Key Cryptosystems - image 8 , such that| w ( x )|= x . Thus in this notation, 4 will be represented by 1111. We must also decide how x and y are placed on the tape initially and how their sum is to appear at the end of the computation. It is assumed that w ( x ) and w ( y ) are on the tape in unary notation, separated by a single 0, with the readwrite head on the leftmost symbol of w ( x ). After the computation, w ( x + y ) will be on the tape followed by a single 0, and the readwrite head will be positioned at the left end of the result. We therefore want to design a Turing machine for performing the computation
where q f F is a final state and indicates an unspecified number of steps as - photo 9
where q f F is a final state and indicates an unspecified number of steps as follows Constructing a program - photo 10 indicates an unspecified number of steps as follows:
Constructing a program for this is relatively simple All we need to do is to - photo 11
Constructing a program for this is relatively simple. All we need to do is to move the separating 0 to the right end of w ( y ), so that the addition amounts to nothing more than the coalition of the two strings. To achieve this, we construct
Quantum Attacks on Public-Key Cryptosystems - image 12
with
Quantum Attacks on Public-Key Cryptosystems - image 13
Quantum Attacks on Public-Key Cryptosystems - image 14
Quantum Attacks on Public-Key Cryptosystems - image 15
Quantum Attacks on Public-Key Cryptosystems - image 16
Quantum Attacks on Public-Key Cryptosystems - image 17
Quantum Attacks on Public-Key Cryptosystems - image 18
Quantum Attacks on Public-Key Cryptosystems - image 19
Quantum Attacks on Public-Key Cryptosystems - image 20
Note that in moving the 0 right we temporarily create an extra 1, a fact that is remembered by putting the machine into state q 1. The transition ( q 2,1)=( q 3,0, R ) is needed to remove this at the end of the computation. This can be seen from the sequence of instantaneous descriptions for adding 111 to 11:
Quantum Attacks on Public-Key Cryptosystems - image 21
or briefly as follows:
Quantum Attacks on Public-Key Cryptosystems - image 22
The ChurchTuring Thesis
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Quantum Attacks on Public-Key Cryptosystems»

Look at similar books to Quantum Attacks on Public-Key Cryptosystems. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Quantum Attacks on Public-Key Cryptosystems»

Discussion, reviews of the book Quantum Attacks on Public-Key Cryptosystems and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.