kth.sePublications KTH
Operational message
There are currently operational disruptions. Troubleshooting is in progress.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
On factoring integers, and computing discrete logarithms and orders, quantumly
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS. Swedish NCSA, Swedish Armed Forces.ORCID iD: 0000-0002-7061-2374
2024 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

This thesis contains a collection of efficient quantum algorithms and classical pre- and post-processing algorithms for various number- and group-theoretical problems with concrete cryptanalytical applications. More specifically, the focus is on the integer factoring problem (IFP), the discrete logarithm problem (DLP), and the order-finding problem (OFP), and on certain important variations of these problems. It is for example explained

  • how the OFP and complete IFP may be solved efficiently in a single run of a reduced version of Shor's algorithm for the OFP with very high success probability, as evidenced by a lower bound that is 1 − o(1),
  • how the short DLP in groups of unknown order may be solved efficiently and with an advantage over Shor's algorithm for the DLP (that furthermore requires the order to be known), as evidenced by a lower bound on the single-run success probability that is 1 − o(1),
  • how the RSA IFP may be solved efficiently and with an advantage over Shor's algorithm for the IFP, by reducing the RSA IFP to a short DLP,
  • how the DLP may heuristically be solved efficiently, and with high success probability that is 1 − o(1), in a single run of a reduced version of Shor’s algorithm for the DLP that admits efficient implementation,
  • how the DLP may be solved in groups of unknown order, such as Schnorr groups, by jointly solving an OFP and a DLP at lower overall cost but higher per-run cost compared to first solving the OFP and then the DLP,
  • how tradeoffs — between the number of group operations that are evaluated quantumly and the number of runs that are required — may be achieved in all of the aforementioned algorithms, and
  • how all of the aforementioned algorithms may be simulated efficiently classically, for arbitrary large cryptographically relevant problem instances, when the solution to the instance is known, enabling the number of runs required when performing tradeoffs to be tightly estimated.

It is furthermore for example explained

  • how Regev's recent quantum algorithm for the IFP may be extended to the DLP and OFP, yielding i) a reduction in the circuit size and depth by a factor compared to Shor for these problems when working in , for N an n-bit integer, at the expense of performing runs, and ii) slight improvements of Regev's orginal algorithm for the IFP,
  • how the above algorithms may be simulated efficiently classically, for large special-form problem instances that are classically tractable, and
  • that Regev’s post-processing, and the post-processing for our extensions, are robust to an arbitrarily large fraction < 1 of the runs being bad.

The above has implications for cryptography based on the intractability of the IFP and DLP — including but not limited to for widely used schemes such as RSA, DSA and Diffie–Hellman. The algorithms in this thesis are all derived from, and make notable improvements to, the seminal works of Shor. Some of the contributions are joint works with other authors.

Abstract [sv]

Ifrågavarande avhandling innehåller en samling effektiva kvantalgoritmer samt klassiska för- och efterbehandlingsalgoritmer för en rad olika tal- och gruppteoretiska problem med konkreta kryptoanalytiska tillämpningar. Fokus ligger mer specifikt på heltalsfaktoriseringsproblemet (IFP), på det diskreta logaritmproblemet (DLP) och på problemet att bestämma ordningar (OFP), samt på vissa viktiga variationer av dessa problem. Exempelvis förklaras det

  • hur OFP och fullständig IFP kan lösas effektivt i en körning av en reducerad version av Shors algoritm för OFP med mycket hög sannolikhet, vilket styrks med en nedre gräns på sannolikheten som är 1 − o(1),
  • hur kort DLP i grupper av okänd ordning kan lösas effektivt och med ett övertag över Shors algoritm för DLP (som dessutom kräver att ordningen är känd), vilket styrks med en nedre gräns på sannolikheten att lyckas i en körning, där sannolikheten är 1 − o(1),
  • hur RSA IFP kan lösas effektivt och med ett övertag över Shors algoritm för IFP, genom att reducera RSA IFP till kort DLP,
  • hur DLP heuristiskt kan lösas effektivt, och med hög sannolikhet som är 1 − o(1), i en körning av en reducerad version av Shors algoritm för DLP som medger effektiv implementation,
  • hur DLP kan lösas i grupper av okänd ordning, såsom Schnorrgrupper, genom att samtidigt lösa OFP och DLP till lägre totalkostnad men högre kostnad per körning jämfört med att först lösa OFP och därefter DLP,
  • hur avvägningar — mellan antalet gruppoperationer som evalueras på kvantdatorn i varje körning och antalet körningar som krävs — kan göras i alla tidigare nämnda algoritmer, samt
  • hur alla tidigare nämnda algoritmer kan simuleras effektivt klassiskt, för godtyckliga stora kryptologiskt relevanta probleminstanser, när lösningen till instansen är känd, vilket möjliggör skarpa skattningar av antalet körningar som krävs när avvägningar av tidigare nämnda slag görs.

Härutöver förklaras det exempelvis

  • hur Regevs nya kvantalgoritm för IFP kan utökas till DLP och OFP, vilket leder till i) en reduktion av kretsstorleken och kretsdjupet med en faktor jämfört med Shor för dessa problem i , för N ett n-bitars heltal, på bekostnad av att körningar krävs, samt till ii) vissa förbättringar av Regevs ursprungliga algoritm för IFP,

  • hur ovan nämnda algoritmer kan simuleras effektivt klassiskt, för stora probleminstanser på särskild form som är klassiskt lösbara, samt

  • att Regevs klassiska efterbehandling, och den för våra utökningar, är robusta mot att en godtyckligt stor andel < 1 av körningarna är felaktiga.

Ovanstående har följdverkningar för kryptologi som baseras på IFP och DLP — inbegripet men inte begränsat till välanvända scheman såsom RSA, DSA och Diffie–Hellman. Algoritmerna i den här avhandlingen är alla derivat av, och gör alla betydande förbättringar av, Shors banbrytande arbeten. Några av bidragen är gemensamma arbeten med andra författare.

Place, publisher, year, edition, pages
Stockholm: KTH Royal Institute of Technology, 2024. , p. vii, 188
Series
TRITA-EECS-AVL ; 2024:71
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-354170ISBN: 978-91-8106-048-5 (print)OAI: oai:DiVA.org:kth-354170DiVA, id: diva2:1902626
Public defence
2024-10-25, F3, Lindstedtsvägen 26 & 28, Stockholm, 10:00 (English)
Opponent
Supervisors
Funder
Swedish Armed ForcesSwedish Research Council, 2022-06725Swedish Research Council, 2018-05973
Note

The Swedish NCSA that is a part of the Swedish Armed Forces provided support for this project in the form of time and funding. Computations at PDC at KTH were enabled by resources provided by the National Academic Infrastructure for Supercomputing in Sweden (NAISS), and its predecessor the Swedish National Infrastructure for Computing (SNIC), partially funded by the Swedish Research Council (VR) through grant agreements no. 2022-06725 and no. 2018-05973, respectively, as stated in the acknowledgements.

QC 20241002

Available from: 2024-10-02 Created: 2024-10-01 Last updated: 2025-12-03Bibliographically approved
List of papers
1. Quantum algorithms for computing short discrete logarithms and factoring RSA integers
Open this publication in new window or tab >>Quantum algorithms for computing short discrete logarithms and factoring RSA integers
2017 (English)In: 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, Springer Nature, 2017, Vol. 10346, p. 347-363Conference paper, Published paper (Refereed)
Abstract [en]

We generalize the quantum algorithm for computing short discrete logarithms previously introduced by Ekerå [2] so as to allow for various tradeoffs between the number of times that the algorithm need be executed on the one hand, and the complexity of the algorithm and the requirements it imposes on the quantum computer on the other hand. Furthermore, we describe applications of algorithms for computing short discrete logarithms. In particular, we show how other important problems such as those of factoring RSA integers and of finding the order of groups under side information may be recast as short discrete logarithm problems. This gives rise to an algorithm for factoring RSA integers that is less complex than Shor’s general factoring algorithm in the sense that it imposes smaller requirements on the quantum computer. In both our algorithm and Shor’s algorithm, the main hurdle is to compute a modular exponentiation in superposition. When factoring an n bit integer, the exponent is of length 2n bits in Shor’s algorithm, compared to slightly more than n/2 bits in our algorithm.

Place, publisher, year, edition, pages
Springer Nature, 2017
Series
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743 ; 10346
Keywords
Discrete logarithms, Factoring, RSA, Shor’s algorithms
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-211962 (URN)10.1007/978-3-319-59879-6_20 (DOI)000695499600020 ()2-s2.0-85021747281 (Scopus ID)
Conference
8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, Utrecht, Netherlands, 26-28 June 2017
Note

Part of proceedings ISBN 9783319598789

QC 20170816

Available from: 2017-08-16 Created: 2017-08-16 Last updated: 2024-11-05Bibliographically approved
2. On post-processing in the quantum algorithm for computing short discrete logarithms
Open this publication in new window or tab >>On post-processing in the quantum algorithm for computing short discrete logarithms
2020 (English)In: Designs, Codes and Cryptography, ISSN 0925-1022, E-ISSN 1573-7586, Vol. 88, no 11, p. 2313-2335Article in journal (Refereed) Published
Abstract [en]

We revisit the quantum algorithm for computing short discrete logarithms that was recently introduced by Ekerå and Håstad. By carefully analyzing the probability distribution induced by the algorithm, we show its success probability to be higher than previously reported. Inspired by our improved understanding of the distribution, we propose an improved post-processing algorithm that is considerably more efficient, enables better tradeoffs to be achieved, and requires fewer runs, than the original post-processing algorithm. To prove these claims, we construct a classical simulator for the quantum algorithm by sampling the probability distribution it induces for given logarithms. This simulator is in itself a key contribution. We use it to demonstrate that Ekerå–Håstad achieves an advantage over Shor, not only in each individual run, but also overall, when targeting cryptographically relevant instances of RSA and Diffie–Hellman with short exponents.

Place, publisher, year, edition, pages
Springer, 2020
Keywords
Discrete logarithms, Factoring, RSA, Shor’s algorithms, Quantum theory, Post processing, Postprocessing algorithms, Quantum algorithms, Probability distributions
National Category
Other Mathematics
Identifiers
urn:nbn:se:kth:diva-287980 (URN)10.1007/s10623-020-00783-2 (DOI)000556665200001 ()2-s2.0-85089080296 (Scopus ID)
Note

QC 20201230

Available from: 2020-12-30 Created: 2020-12-30 Last updated: 2024-10-01Bibliographically approved
3. On the success probability of the quantum algorithm for the short DLP
Open this publication in new window or tab >>On the success probability of the quantum algorithm for the short DLP
(English)Manuscript (preprint) (Other academic)
Abstract [en]

Ekerå and Håstad have introduced a variation of Shor's algorithm for the discrete logarithm problem (DLP). Unlike Shor's original algorithm, Ekerå–Håstad's algorithm solves the short DLP in groups of unknown order. In this work, we prove a lower bound on the probability of Ekerå-Håstad's algorithm recovering the short logarithm d in a single run. By our bound, the success probability can easily be pushed as high as 1−10^−10 for any short d. A key to achieving such a high success probability is to efficiently perform a limited search in the classical post-processing by leveraging meet-in-the-middle techniques. Asymptotically, in the limit as the bit length m of d tends to infinity, the success probability tends to one if the limits on the search space are parameterized in m. Our results are directly applicable to Diffie–Hellman in safe-prime groups with short exponents, and to RSA via a reduction from the RSA integer factoring problem (IFP) to the short DLP.

National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-353620 (URN)10.48550/arXiv.2309.01754 (DOI)
Note

QC 20240925

Available from: 2024-09-19 Created: 2024-09-19 Last updated: 2024-10-01Bibliographically approved
4. Quantum algorithms for computing general discrete logarithms and orders with tradeoffs
Open this publication in new window or tab >>Quantum algorithms for computing general discrete logarithms and orders with tradeoffs
2021 (English)In: Journal of Mathematical Cryptology, ISSN 1862-2976, E-ISSN 1862-2984, Vol. 15, no 1, p. 359-407Article in journal (Refereed) Published
Abstract [en]

We generalize our earlier works on computing short discrete logarithms with tradeoffs, and bridge them with Seifert's work on computing orders with tradeoffs, and with Shor's groundbreaking works on computing orders and general discrete logarithms. In particular, we enable tradeoffs when computing general discrete logarithms. Compared to Shor's algorithm, this yields a reduction by up to a factor of two in the number of group operations evaluated quantumly in each run, at the expense of having to perform multiple runs. Unlike Shor's algorithm, our algorithm does not require the group order to be known. It simultaneously computes both the order and the logarithm. We analyze the probability distributions induced by our algorithm, and by Shor's and Seifert's order-finding algorithms, describe how these algorithms may be simulated when the solution is known, and estimate the number of runs required for a given minimum success probability when making different tradeoffs.

Place, publisher, year, edition, pages
Walter de Gruyter GmbH, 2021
Keywords
Discrete logarithms, Order finding, Shor's algorithms
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-300236 (URN)10.1515/jmc-2020-0006 (DOI)000684289500009 ()2-s2.0-85105351064 (Scopus ID)
Note

QC 20210830

Available from: 2021-08-30 Created: 2021-08-30 Last updated: 2024-10-01Bibliographically approved
5. Revisiting Shor's quantum algorithm for computing general discrete logarithms
Open this publication in new window or tab >>Revisiting Shor's quantum algorithm for computing general discrete logarithms
(English)Manuscript (preprint) (Other academic)
Abstract [en]

We heuristically show that Shor's algorithm for computing general discrete logarithms achieves an expected success probability of approximately 60% to 82% in a single run when modified to enable efficient implementation with the semi-classical Fourier transform. By slightly increasing the number of group operations that are evaluated quantumly and performing a single limited search in the classical post-processing, or by performing two limited searches in the post-processing, we show how the algorithm can be further modified to achieve a success probability that heuristically exceeds 99% in a single run. We provide concrete heuristic estimates of the success probability of the modified algorithm, as a function of the group order r, the size of the search space in the classical post-processing, and the additional number of group operations evaluated quantumly. In the limit as r tends to infinity, we heuristically show that the success probability tends to one. In analogy with our earlier works, we show how the modified quantum algorithm may be heuristically simulated classically when the logarithm d and r are both known. Furthermore, we heuristically show how slightly better tradeoffs may be achieved, compared to our earlier works, if r is known when computing d. We generalize our heuristic to cover some of our earlier works, and compare it to the non-heuristic analyses in those works.

National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-353619 (URN)10.48550/arXiv.1905.09084 (DOI)
Note

QC 20240925

Available from: 2024-09-19 Created: 2024-09-19 Last updated: 2024-10-01Bibliographically approved
6. On completely factoring any integer efficiently in a single run of an order-finding algorithm
Open this publication in new window or tab >>On completely factoring any integer efficiently in a single run of an order-finding algorithm
2021 (English)In: Quantum Information Processing, ISSN 1570-0755, E-ISSN 1573-1332, Vol. 20, no 6, article id 205Article in journal (Refereed) Published
Abstract [en]

We show that given the order of a single element selected uniformly at random from ZN∗, we can with very high probability, and for any integer N, efficiently find the complete factorization of N in polynomial time. This implies that a single run of the quantum part of Shor’s factoring algorithm is usually sufficient. All prime factors of N can then be recovered with negligible computational cost in a classical post-processing step. The classical algorithm required for this step is essentially due to Miller.

Place, publisher, year, edition, pages
Springer Nature, 2021
Keywords
Factoring, Order finding, Shor’s algorithms, Magnetic materials, Quantum optics, Computational costs, Finding algorithm, High probability, Integer-N, Polynomial-time, Post processing, Prime factors, Single element, Polynomial approximation
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-309987 (URN)10.1007/s11128-021-03069-1 (DOI)001427318500002 ()2-s2.0-85107447870 (Scopus ID)
Note

QC 20220317

Available from: 2022-03-17 Created: 2022-03-17 Last updated: 2025-12-05Bibliographically approved
7. On the Success Probability of Quantum Order Finding
Open this publication in new window or tab >>On the Success Probability of Quantum Order Finding
2024 (English)In: ACM Transactions on Quantum Computing, ISSN 2643-6809, Vol. 5, no 2, article id 11Article in journal (Refereed) Published
Abstract [en]

We prove a lower bound on the probability of Shor’s order-finding algorithm successfully recovering the order r in a single run. The bound implies that by performing two limited searches in the classical post-processing part of the algorithm, a high success probability can be guaranteed, for any r, without re-running the quantum part or increasing the exponent length compared to Shor. Asymptotically, in the limit as r tends to infinity, the probability of successfully recovering r in a single run tends to one. Already for moderate r, a high success probability exceeding e.g. 1-10^-4 can be guaranteed. As corollaries, we prove analogous results for the probability of completely factoring any integer N in a single run of the order-finding algorithm.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2024
Keywords
Shor's algorithms, order finding, factoring
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-350808 (URN)10.1145/3655026 (DOI)001258169100005 ()2-s2.0-85196555750 (Scopus ID)
Note

QC 20240719

Available from: 2024-07-19 Created: 2024-07-19 Last updated: 2024-10-01Bibliographically approved
8. Extending Regev’s Factoring Algorithm to Compute Discrete Logarithms
Open this publication in new window or tab >>Extending Regev’s Factoring Algorithm to Compute Discrete Logarithms
2024 (English)In: Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Proceedings, Springer Nature , 2024, p. 211-242Conference paper, Published paper (Refereed)
Abstract [en]

Regev recently introduced a quantum factoring algorithm that may be perceived as a d-dimensional variation of Shor’s factoring algorithm. In this work, we extend Regev’s factoring algorithm to an algorithm for computing discrete logarithms in a natural way. Furthermore, we discuss natural extensions of Regev’s factoring algorithm to order finding, and to factoring completely via order finding. For all of these algorithms, we discuss various practical implementation considerations, including in particular the robustness of the post-processing.

Place, publisher, year, edition, pages
Springer Nature, 2024
Keywords
Discrete logarithms, Factoring, Quantum cryptanalysis
National Category
Mathematics
Identifiers
urn:nbn:se:kth:diva-350531 (URN)10.1007/978-3-031-62746-0_10 (DOI)001273561700010 ()2-s2.0-85197149248 (Scopus ID)
Conference
15th International Conference on Post-Quantum Cryptography, PQCrypto 2024, Oxford, United Kingdom, Jun 12 2024 - Jun 14 2024
Note

Part of ISBN 9783031627453

QC 20240716

Available from: 2024-07-16 Created: 2024-07-16 Last updated: 2025-05-13Bibliographically approved
9. A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography
Open this publication in new window or tab >>A high-level comparison of state-of-the-art quantum algorithms for breaking asymmetric cryptography
(English)Manuscript (preprint) (Other academic)
Abstract [en]

We provide a high-level cost comparison between Regev's quantum algorithm with Ekerå–Gärtner's extensions on the one hand, and existing state-of-the-art quantum algorithms for factoring and computing discrete logarithms on the other. This when targeting cryptographically relevant problem instances, and when accounting for the space-saving optimizations of Ragavan and Vaikuntanathan that apply to Regev's algorithm, and optimizations such as windowing that apply to the existing algorithms.

Our conclusion is that Regev's algorithm without the space-saving optimizations may achieve a per-run advantage, but not an overall advantage, if non-computational quantum memory is cheap. Regev's algorithm with the space-saving optimizations does not achieve an advantage, since it uses more computational memory, whilst also performing more work, per run and overall, compared to the existing state-of-the-art algorithms. As such, further optimizations are required for it to achieve an advantage for cryptographically relevant problem instances.

National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-353621 (URN)10.48550/arXiv.2405.14381 (DOI)
Note

Published version available at doi 10.62056/ayzojb0kr

QC 20240925

Available from: 2024-09-19 Created: 2024-09-19 Last updated: 2025-04-28Bibliographically approved

Open Access in DiVA

Kappa(3253 kB)3165 downloads
File information
File name FULLTEXT01.pdfFile size 3253 kBChecksum SHA-512
8dc8077612573b51c6b20beba6d16252f24dbeb42ab97a56c3251f265d5330cc7b198061362124af3aa7ef143a2d5cab35a47e50ecf0a7137cdb4fa2060f0910
Type fulltextMimetype application/pdf

Authority records

Ekerå, Martin

Search in DiVA

By author/editor
Ekerå, Martin
By organisation
Theoretical Computer Science, TCS
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 3170 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 3462 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf