Current location - Training Enrollment Network - Mathematics courses - How to solve the problem of mathematical password collapse after the invention of quantum computer?
How to solve the problem of mathematical password collapse after the invention of quantum computer?
From personal communication to confidential information transmission, strict password protection is needed. At present, the common RSA encryption algorithms are based on a simple number theory fact: it is easy to multiply two large prime numbers, but it is extremely difficult to make their product into a prime factor, so the product can be exposed as an encryption key. For example, in the RSA algorithm, given a pair of public keys and private keys related to 3×5 = 15, one key is selected as the private key, and the other key is made public.

When 3 and 5 are replaced by 2048-bit prime numbers A and B, C represents the product of A and B. So it is relatively simple to verify whether A times B equals C, that is, it is easy to verify whether the key entered by the user is correct. However, it is very difficult to trace back from C to A and B. It takes more than 10 14 years for a classic computer, so it is almost impossible to encrypt and crack the classic calculation with this key. In addition, ECC algorithm is also the mainstream asymmetric encryption algorithm, which is usually used for key agreement and digital signature. Its characteristic is complex encryption, which is based on the finite field of elliptic curve, so it is difficult to be cracked by the traditional encryption algorithm in integer field.

Compared with RSA, ECC algorithm can use shorter keys to achieve the same or higher security as RSA algorithm. The deep integration of quantum technology and information technology has promoted the vigorous rise of the second quantum revolution represented by quantum communication, quantum calculation and quantum measurement. Quantum computing is a new computing mode, which follows the laws of quantum mechanics and controls quantum information units to calculate. It provides super computing power, which not only can quickly crack classical passwords, but also has broad application prospects in biopharmaceuticals, optimization problems, data retrieval and so on.

Bian Xiao made a detailed interpretation of this issue, hoping to help everyone. You can leave me a message in the comments section if you have any questions. You can comment with me more. If there is anything wrong, you can also interact with me more. If you like the author, you can also follow me. Your praise is the greatest help to me. Thank you.