Physicist: What follows is the famous Shor algorithm, which can break any RSA encryption key.
The problem: RSA, the most common form of public key encryption, is based on the fact that large numbers are hard to factor. Without going into too much detail, an encryption key M, is the product of two large primes P and Q (M=PQ), and breaking the key comes down to finding P and Q, given M. This is difficult and can’t be done in any reasonable time for large values of M.
For example, M=6563955109193980058697529924699940996676491413219355771. What are P and Q?
(ans: 8764325985409367513190343 and 748940091927375783904810247597. Prime numbers supplied by numberempire.com)
One method involves modular arithmetic. In modular math you take a number, M, and every time you deal with a number larger than M, you subtract M until you’re dealing with a number smaller than M. Clocks are the most commonly seen example of “mod 12” arithmetic. For example, 31 o’clock is the same as 19 o’clock is the same as 7 o’clock.
You could re-write that as . There’s a lot of interesting stuff (card tricks) involving modular math in this older post, so if you’re not familiar with modular math jump over there real quick.
Now check this out:
This pattern: 1,2,4,8,1,2,4,8,1,… will repeat forever. Here’s why that’s useful. For a given A (it doesn’t really matter what A is), if you can find the lowest value, r, for which then, if r is even, you can do this:
If r isn’t even you change A and try again. When you say something is equal to , what you mean is that it’s a multiple of M. So and have factors in common with M, and yet (for mathy reasons) neither of them is a multiple of M on its own.
So in the “15” example, A=2, M=15, and r=4.
Boom! There are your factors! P=3 and Q=5.
For large values of M however, you can’t just raise A to higher and higher powers and wait until . Heavens no. For example, if you were trying this technique on the M from the top of this section you’d find that .
It’s easy to raise A to a large power once, but there isn’t enough time in the universe to raise it to every power up to some huge number.
Enter quantum computing. A quantum computer has no problem raising A to many, many powers at the same time.
The solution (The Shor algorithm): So the name of the game is to find that “r” value. It has two properties: it’s the smallest number such that , and as you raise A to higher and higher powers r is how long it takes for the pattern to repeat (like in the “15” example; 1,2,4,8,1,2,4,8,…).
In a nutshell: You’d like to find the value of r such that the function () repeats every r, so that you can do the “” trick. Since this function has such a nice, repeating pattern the “Fourier transform” is very sharp. The Fourier transform breaks down signals into their component frequencies, and a repeating function has a very definite frequency. You can use that frequency to give you r. The smaller r is, the faster the function repeats, and the higher the frequency, and the larger r is, the slower the function repeats, and the lower the frequency.
So why do you need a quantum computer to do this? You need the function to exist in the computer all at once. If (like in a conventional computer) you can only have one value at a time, suddenly it doesn’t make sense to talk about the “frequency” of the function.
In what follows I’ll go through the algorithm step by step, then run through an example (factoring 15), indicated by italics. It’s not necessary to understand all of the math in detail to understand the ideas. So please: don’t stress.
The computer starts with two registers. In what follows the notation “” means the first register holds a 1 and the second register holds a 2. Several of these added together means that the computer is in multiple states at the same time. For example: “” means that the computer is holding two states at the same time. 1 and 3 in the first register, 2 and 4 in the second register.
Step 1) Initialize the first register to an equal super-position of every possible number from 0 to N, where N is some power of 2 that’s larger than M2, and initialize the second register to zero.
N has to be a power of 2 because it’s dictated by the number of qbits in the first register, but for now, the only thing that’s important is that N is big.
The quantum state looks like this: .
In practice, for M=15, you’d want N>225. But never mind that now, to save space we’ll use N=16. The initialized state looks like:
The “1/4” in front of each term is there because the probability of an event is the square of the probability amplitude, which is what we’re looking at. The “1/4” means that each term has a 1/16 ( = (1/4)2 ) chance of being measured, if you measured right now. Which you don’t.
Step 2) Define . Take the first register, run it through f, and put the result in the second register.
Now:
It doesn’t really matter what A you pick, so generally smaller, easier A’s are the way to go.
In this example, , so now you have:
The same repeating 1,2,4,8,… pattern shows up.
Step 3) “Look” at the second register. One of the incredibly awesome things about quantum computing is that it’s sometimes necessary to entangle the outside of the computer with part of the internal mechanism. You can describe this as “wave function collapse” or “projection” or whatever. In this case, it has the effect that the vast majority of states “vanish”, and that those that remain are spaced at a regular interval (which turns out to be the “r” that the algorithm is looking for). One of the clever things about the Shor algorithm is that it doesn’t matter what you see, just that it is seen. (It doesn’t have to be seen by a person or anything). Lets say that the observed value of f(x) is “B”. The new state looks like:
This is just the collection of all of the inputs that could have lead to f(x)=B, starting at the lowest value of x that could do it () and then every rth number after that.
Let’s say, for example, that you look at the second register and you see “8”. As a result the second register is in a “definite state” (), but the first register is still in a super-position of several states.
The states that “disappeared” are still being used. They’re just being used by different versions of you that saw different results (1, 2, and 4). That should be pretty off-putting, so just roll with it. Not that it matters, but in this case B=8, = 3, and r=4. This r is what the algorithm is looking for.
Step 4) Take the “quantum Fourier transform” of the first register. The Fourier transform takes in waves and spits out the frequencies of those waves. If you have a function, , then its Fourier transform is written “ ” (read “f hat”). A good way to picture the Fourier transform is as a piano keyboard. Sound itself is just air moving back and forth (), but if it’s moving back and forth quickly, then you must be playing the high keys ().
In this case the pattern of numbers that exist in the first register are all evenly spaced (r apart). This is a very regular tone, so the Fourier transform will have sharp spikes like the examples in the picture above. The new state, after the quantum Fourier transform is:
The Fourier transform is the part of this process that takes advantage of constructive and destructive interference.
The Fourier transform of the example state in step 3 is:
Yes, those are imaginary i’s (as in ), but it’s cool. The probability is equal to the square of the absolute value of each of those numbers, and the absolute value of i is 1. So, for example, . Each of these four values of k (0, 4, 8, and 12) has an equal one-in-four chance of being measured.
Step 5) Measure the first register. This will give you another number. The “spikiness” of the Fourier transform in the last step means that when you measure the value of the first register, you’ll be most likely to measure values of k such that is very near, or is equal to an integer. The last equation in step 4 is mostly fluff. The important part is the “” part. When is close to an integer, then this summation looks like “1+1+1+1+1….” and ends up very large. Otherwise, it ends up canceling itself out. For example, if , then the summation becomes “1-1+1-1+1-1…”.
This is just the very mathematical side of saying “the Fourier transform is very spiked”. For a better understanding of this math, look up “complex plane“, “complex exponential“, and “geometric sum“.
The probability of measuring any of the values of the state is 1/4. Notice that each value of k makes an integer! (remember that r=4 and N=16) Let’s say that (by random chance) we measure the first register and get k=12. It actually doesn’t matter which of the values we get (0, 4, 8, or 12), which is a big part of what makes this algorithm awesome (really awesome).
Step 6) Do some math. So, in step 5 you measure a value of k such that , where is an integer. You know what N is (it’s the number of input states from step 1), and you know what k is (just measured it), but r and are unknown. So what you’ve got is: , an approximation of one rational number with another.
I didn’t want to make a big deal about it, but for the number, M, that you’re factoring, you’ll need N>M2. And, since M>r, N>r2 as well. It turns out that, given this condition, for a given value of k you’ll have a uniquely determined and r. You don’t care what is, so chuck it out and keep r. The way you figure out what is from is by using a trick called “Approximation by Continued Fractions“.
In the last step the measured value was k=12. So, . In this case the approximation was exact, and r=4 and =3 (not that it matters).
So, finally, r=4! We now know that . So:
We can now say, with heads held high, that 15 = 3×5. Tell your friends!
The “15” example is a little ideal (but also simple enough that you can look at each step in detail), so here’s one more example of the math with bigger numbers.
Say M=77, and you want to find the factors. Then you choose A=2 (because it’s easiest), and since M2=5929, you choose N = 8192 (a 13 bit register). You run through the algorithm and find that k=5188 (it could have been any one of many values, but this is what you got this time). Now you know that , where r<M. Using approximation by continued fractions you find that the closest values of and r that work are . So, your guess for r is r=30.
The two numbers you get are: [230/2-1]77 = [32767]77 = 42 and [230/2+1]77 = [32769]77 = 44. Now obviously, neither 42 nor 44 are factors of 77. However, they each share a factor in common with 77. All you have to do now is find the greatest common divisor (which is an extremely fast operation).
gcd(77,42) = 7
gcd(77,44) = 11
The Shor algorithm works perfectly (gives you a useful value of k) more than 40% of the time. That may not sound great. But if it doesn’t work the first time, why not try it a few thousand more times? On a quantum computer, this algorithm is effectively instantaneous.
I left a couple of details out of the math here because, frankly, this post is a little over the top. If you read all the way to here, buy yourself a drink and take a nap. However, if you’re interested in exactly why you need N>M2, how to execute the quantum Fourier transform, and why the algorithm works better than 40% of the time, then there are some rough notes in this pdf: Shor.
A commenter pointed out that the equations in this post may not be showing up for everyone. In partial remedy, here’s a pdf of the above post: quantum_RSA_Shor.
After reading trough the Wikipedia article I couldn’t imagine that you could explain it in a way that I would (rougly) understand, but you did! Thank you.
You read the whole thing?!
Thanks.
Really interesting! We just learned how RSA works in school
Just a little problem: That latex php-script on your page doesn’t work for me, the images don’t generate (which makes the last part a little hard to understand). Anyone else having issues with that?
Just discovered your site, it’s awesome gonna forward this article on to a couple of friends.
Pingback: Entanglement omnibus! | Ask a Mathematician / Ask a Physicist
Pingback: Q: How do you write algorithms to enycrypt things? | Ask a Mathematician / Ask a Physicist
I’ve heard somewhere that they’re also trying to build computers using molecules, like dna. In general would it work to try and simulate a factoring algorithm using real world things, and then let the physics of the interactions stand-in for the computer calculation? Since the real-world does all kinds of crazy calculations in no time. I was thinking maybe you could have two sound synthesizers, the kind where you can dial up or down their frequencies, to stand in as variables for the two prime number candidates. And then you’d have them interact in some special way and tune them, testing for when the output corresponds to the large product you’re seeking. Or, using molecules, maybe you have two populations that can vary and then have them biologically react in such a way that when the population sizes stabilize they’d represent your factors.
As quantum states are standing waves effectively, don’t they need some settling time? And wouldn’t this settling time get really huge for complicated problems, thus making quantum computers extraordinarily fast computers, but not fast enough to solve larger combinatorical problems within a universe life time?
Nope!
There is a kind of quantum computation called “adiabatic quantum computation” that resembles what you’re talking about. But the Shor algorithm isn’t designed to work like that. It can operate as fast as a few photons can whip through beams splitters, mirrors, fiber optic cables.
Or, in the case in which it was done, as fast as a few ions in a line can interact.
Pingback: Q: Since the real-world does all kinds of crazy calculations in no time, can we use physics to calculate stuff? | Ask a Mathematician / Ask a Physicist
Upon reading this, I wonder, what can be done to secure data against this new potential attack? The article focuses on RSA and does not really mention any other encryption technologies. Might any other current crypto algorithms prove to be more resistant to this kind of attack, or do they all depend on this same problem of factoring really large numbers?
There are a few others, like “elliptic curve encryption”. There are also some ways to protect against the Shor attack. The Shor algorithm only works against one key at a time, so if you have some way to hide your public key before encrypting stuff, then the Shor algorithm doesn’t have anything to work with.
However, the point of public key encryption is that it’s public (everything happens out in the open). The best known way to distribute an encryption key, completely in the open but securely, is to use quantum encryption. The idea there is that you can generate a string of random numbers that are shared between two people using entangled particles. The advantage of entangled particles is that the string of numbers you get at both ends are identical (at each end), completely random, and if someone else tries to “peak” at the data stream they “break the entanglement” and can be detected.
I read your article but did not understand all of it.
Could you give an estimate or comparison of calculation speed differences beltween say the most advanced present day most powerful and fastest supercomputer to that of a quntum computer? Using a complex equation that would require a long time to solve using present technology?
Please indulge me I am not an expert on this subject, just a very interested layman
Regards
Alan McDougall
Today there are only a handful of problems that quantum computers give a substantial speed up for. In this case, it would be solving an equation like PQ = 7,323,443,213 (find the factors of a big random number). For a number this size, say it takes 1 second to factor on both a quantum computer and a big ordinary computer.
For a number twice as long but a billion times larger, like PQ = 5,347,905,121,457,778,013, it would take twice as long on a quantum computer (2 seconds), but a billion times longer on a normal computer (32 years).
For a number three times as long and a billion, billion times bigger, like PQ = 2,654,348,900,361,474,778,451,121,009, it would take three times as long on a quantum computer (3 seconds), but a billion, billion times longer on a normal computer (about 2 ages-of-the-universe).
Pingback: Q: What is a Fourier transform? What is it used for? | Ask a Mathematician / Ask a Physicist
Pingback: The internet | When in doubt, bacon
Pingback: Episode 13: Quantum Computing | The Wonder of Reality
Is there a way to get a speedup even if the number doesn’t fit into a single quantum register? Even on modern non quantum computers the largest available register size is 256 bits while RSA keys are usually at least 1024 bits.
Pingback: Q: What is quantum supremacy? Is it awesome or worrisome? | Ask a Mathematician / Ask a Physicist