Quantum Algorithms for Cryptography
Just enough to understand Grover and Shor.
| Notation | Read aloud | Meaning |
|---|---|---|
| \(\lvert 0 \rangle\) | “ket zero” | Qubit in state 0 |
| \(\lvert 1 \rangle\) | “ket one” | Qubit in state 1 |
| \(\lvert + \rangle\) | “ket plus” | Equal superposition of 0 and 1 |
| \(\lvert - \rangle\) | “ket minus” | Equal superposition with a phase flip |
| \(\lvert 01 \rangle\) | “ket zero-one” | Two qubits: first is 0, second is 1 |
| \(\lvert \psi \rangle\) | “ket psi” | An arbitrary quantum state |
Finding a needle in a haystack, quantumly.
The one that breaks public-key cryptography.
Connecting the algorithms to the real world.
| Primitive | Classical security | Quantum threat | Mitigation |
|---|---|---|---|
| AES-128 | 128-bit | 64-bit (Grover) | Use AES-256 |
| AES-256 | 256-bit | 128-bit (Grover) | Already safe |
| ChaCha20 | 256-bit | 128-bit (Grover) | Already safe |
| RSA-2048 | \(\approx\) 112-bit | 0-bit (Shor) | ML-KEM (FIPS 203) |
| ECDH (P-256) | 128-bit | 0-bit (Shor) | ML-KEM (FIPS 203) |
| ECDSA (P-256) | 128-bit | 0-bit (Shor) | ML-DSA (FIPS 204) |
| Concept | Meaning | Used in |
|---|---|---|
| Grover’s algorithm | Quantum search: \(O(\sqrt{N})\) | Block Ciphers (AES security) |
| Shor’s algorithm | Quantum period-finding: polynomial time | Public Key Crypto (RSA/DH/ECDH) |
| Amplitude amplification | Boost correct answer via interference | Grover’s algorithm |
| QFT | Quantum Fourier Transform: finds periods | Shor’s algorithm |
| Harvest now, decrypt later | Record today, decrypt with future QC | All asymmetric crypto |
| ML-KEM (FIPS 203) | Post-quantum key encapsulation (lattice-based) | Replacing RSA/ECDH |
| ML-DSA (FIPS 204) | Post-quantum signatures (lattice-based) | Replacing ECDSA |
| SLH-DSA (FIPS 205) | Post-quantum signatures (hash-based) | Conservative fallback |