F INAL Y EAR P ROJECT Quantum Computing, Cryptography and the Hidden Subgroup Problem Author: Dionysios Ntouka Supervisor: Dr. Matty Hoban A thesis submitted in fulfillment of the requirements for BSc Computer Science Degree May 25, 2021 iii “ Thank you to my supervisor Dr Matty Hoban for introducing me to this topic and guiding me to writing this report. Thank you to all my lecturers and teaching assistants for teaching me about Computer Science. Thank you to my parents. ” v UNIVERSITY OF LONDON Abstract Computing Department BSc Computer Science Degree Quantum Computing, Cryptography and the Hidden Subgroup Problem by Dionysios Ntouka Quantum computing has been developing the last three decades and with the in- vention of algorithms, such as Shor’s algorithm, their interest has increased even further. Shor’s algorithm can be reduced to an algorithm for solving a Hidden Sub- group Problem for Abelian group Z , which has an efficient algorithm, meaning that it can run in polynomial time. Thus, Shor’s algorithm can be used to factor numbers into their primes, which is not efficient on a classical computer but is on a quantum computer. In this project, examples of Shor’s algorithm, with Deutsch-Jozsa’s and Simon’s algorithms, are tested on a Qiskit simulator and on real quantum comput- ers. The problem of factoring numbers is the foundation of cryptographic schemes deployed and used in everyday devices and an efficient attack on them would be dire to a lot of infrastructure. So, post quantum cryptography has been of interest and some development has already been done, with algorithms devised based on non-Abelian groups or other mathematical properties safe from quantum comput- ing attacks, where an overview of them is given in this research. vii Contents Abstract v 1 Introduction 1 2 Quantum Computing 3 2.1 The birth of Quantum . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Some History on Quantum Computing . . . . . . . . . . . . . . . . . . 3 2.3 What is Quantum Computing . . . . . . . . . . . . . . . . . . . . . . . . 4 2.4 Qubits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.4.1 Single Qubit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.4.2 Multiple Qubits and Entanglement . . . . . . . . . . . . . . . . . 5 2.4.3 Entanglement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.5 Quantum Gates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.5.1 Single qubit gates . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 X gate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Y and Z gates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Hadamard gate . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.5.2 Multiple qubit gates . . . . . . . . . . . . . . . . . . . . . . . . . 7 Controlled-NOT gate . . . . . . . . . . . . . . . . . . . . . . . . . 7 Toffoli gate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 SWAP gate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.6 Quantum Fourier Transform . . . . . . . . . . . . . . . . . . . . . . . . . 9 3 Deutsch-Jozsa, Simon’s & Shor’s Algorithms 11 3.1 Deutsch-Jozsa Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.1.1 The Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.1.2 Classical approach . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.1.3 Quantum Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 11 How it works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2 Simon’s Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2.1 The Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2.2 Classical approach . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2.3 Quantum Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.3 Shor’s Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.3.1 The Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.3.2 Classical approach . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.3.3 Quantum Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 15 Some extra information . . . . . . . . . . . . . . . . . . . . . . . 17 4 The Hidden Subgroup Problem 19 4.1 The problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.2 Some problems in the form of HSP . . . . . . . . . . . . . . . . . . . . . 19 4.3 Standard Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 viii 4.4 An Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5 Implementation of the HSP Algorithms 23 5.1 Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 5.1.1 Qiskit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 5.1.2 IBM Q Experience . . . . . . . . . . . . . . . . . . . . . . . . . . 23 5.2 Deutsch-Jozsa algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.3 Simon’s algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 5.4 Shor’s algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 5.5 Thoughts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 6 HSP for non Abelian groups 31 6.1 Dihedral Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 6.1.1 Dihedral Hidden Subgroup Problem . . . . . . . . . . . . . . . . 32 Shortest Vector Problem . . . . . . . . . . . . . . . . . . . . . . . 33 6.2 Symmetric Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 6.2.1 Symmetric Hidden Subgroup Problem . . . . . . . . . . . . . . 34 Graph Isomorphism . . . . . . . . . . . . . . . . . . . . . . . . . 34 From Graph Isomorphism to SHSP . . . . . . . . . . . . . . . . . 35 7 From non-Abelian HSPs to Post Quantum Cryptography 37 7.1 Lattice-based cryptography . . . . . . . . . . . . . . . . . . . . . . . . . 37 7.2 Code-based cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . 37 7.3 Multivariate polynomial cryptography . . . . . . . . . . . . . . . . . . . 38 7.4 Hash-based cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . 38 8 Conclusion 39 8.1 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 A The Bloch Sphere 41 B IBM Quantum Experience 43 C Learning with Errors 47 D Stehle-Steinfled NTRU 49 E Merkle Signature Scheme 51 F Jupyter Notebooks 53 Bibliography 69 ix List of Figures 2.1 Bloch Sphere with example | ψ 〉 . . . . . . . . . . . . . . . . . . . . . . . 5 3.1 Quantum circuit for the Deutsch-Jozsa algorithm. . . . . . . . . . . . . 12 3.2 Quantum circuit for Simon’s Algorithm. . . . . . . . . . . . . . . . . . . 14 3.3 The quantum circuit used as part of Shor’s algorithm. . . . . . . . . . . 16 4.1 Quantum circuit diagram for the standard method . . . . . . . . . . . . 20 4.2 The circuit for the implementation of the standard method with the example G and S given . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 5.1 The IBM Quantum Composer interface . . . . . . . . . . . . . . . . . . 24 5.2 Selecting a quantum computer to run the algorithm/circuit . . . . . . . 24 5.3 The print of the Deutsch-Jozsa circuit from Qiskit implementation (balanced oracle) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 5.4 The print of the Deutsch-Jozsa circuit from Qiskit implementation (constant oracle) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 5.5 The results in the simulation (constant oracle) . . . . . . . . . . . . . . . 25 5.6 The results in the simulation (balanced oracle) . . . . . . . . . . . . . . 26 5.7 The results on the IBM quantum computer (Deutsch-Jozsa constant oracle) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 5.8 The results on the IBM quantum computer (Deutsch-Jozsa balanced oracle) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 5.9 The print of the Simon’s circuit from Qiskit implementation. . . . . . . 27 5.10 The results in the simulation (Simon) . . . . . . . . . . . . . . . . . . . . 27 5.11 The results on the IBM quantum computer (Simon) . . . . . . . . . . . 28 5.12 The print of the Shor’s circuit from Qiskit implementation. ([33]) . . . 28 5.13 The results in the simulation (Shor) . . . . . . . . . . . . . . . . . . . . . 29 5.14 The results on the IBM quantum computer (Shor) . . . . . . . . . . . . 29 6.1 Visual example of D 4 ; all permutations of the a square (4 angle regular polygon) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 6.2 Example of the shortest vector problem with two basis vectors in pur- ple and the shortest vector connected with the base point with green. . 33 A.1 The Bloch Sphere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 B.1 Result of running an example of Deutsch-Jozsa’s algorithm . . . . . . 44 B.2 Result of running an example of Simon’s algorithm . . . . . . . . . . . 45 B.3 Result of running an example of Shor’s algorithm . . . . . . . . . . . . 46 E.1 Merkle Authentication Tree (example of height h = 2) . . . . . . . . . . 51 xi List of Abbreviations QFT Quantum Fourier Transform HSP Hidden Subgroup Problem SHSP Symmetric Hidden Subgroup Problem DHSP Dihedral Hidden Subgroup Problem LWE Learning With Errors Ring-LWE Ring Learning With Error PQCSG Post Quantum Cryptography Study Group RSA Rivest–Shamir–Adleman (cryptographic scheme) AT&T American Telephone and Telegraph Company 1 Chapter 1 Introduction Cryptosystems based on the hardness of factoring numbers (such as RSA) have been used for encryption and digital signatures for years, due to the fact that factoring has been considered to be a hard problem, meaning that there are no efficient algorithms to find the prime factors of a number. Quantum computing, however, has shown that with enough development they are able to find prime factors using Shor’s algo- rithm, which is a quantum algorithm, or at least part of it has to run on a quantum computer. Shor’s algorithm is an algorithm which can be reduced to the Hidden Subgroup Problem, a general problem in which other problems can be reduced to this one. The reason why a quantum computer is able to solve the Hidden Subgroup Problem efficiently is the Quantum Fourier Transform. This operation and more generally the concept of quantum entanglement and superposition introduce the speedup that classical computing cannot take advantage of. This means that the cryptographic schemes used today are only going to be secure for some time before quantum computers are complex enough; consist of enough qubits (quantum bits). So there is a need to develop schemes which are im- pervious to attacks using quantum computers. That type of cryptography is called post quantum cryptography and there seems to be already development on the topic. Research Objectives 1. Describe how factoring is an example of a Hidden Subgroup Problem. 2. Describe how Quantum Algorithms can solve HSPs efficiently. 3. Give an overview of approaches to post quantum cryptography and their connec- tion to the Hidden Subgroup Problem. 3 Chapter 2 Quantum Computing 2.1 The birth of Quantum Before describing what quantum computing is, let’s give a brief explanation to why the idea of quantum exists at all. The theory of physics at the beginning of the 20th century had seen a number of problems and inconsistencies rise up. For example, by using as we what now call classical theory of physics, the existence of an ’ultra- violet catastrophe’ [60] proved to be a real problem where it showed that with the current understanding of electromagnetic energy absorption of a black body, and of electromagnetic radiation itself, is flawed. In the 1900s Max Planck come up with the idea of electromagnetic radiation be- ing regarded in terms of discrete packets, instead of just having wave properties [43], and later, Albert Einstein and Satyendra Nath Bose proposed that these packets are actual particles, those being photons [24]. Thus, there was a need for an introduction of a different set of rules/laws for physics on that space to abide to, so quantum physics and quantum mechanics was introduced. Quantum mechanics describe a world which is not deterministic [49], but probabilities describe the states of matter and uncertainty reigns. 2.2 Some History on Quantum Computing In 1980, physicist Paul Benioff presented a quantum mechanical model of the Tur- ing machine in his paper, where using a Schrödinger equation portraying a Turing machine a computer could function following the laws of quantum mechanics [6]. In May of 1981, there was a speech (keynote) conducted by Richard P. Feynman titled "Simulating Physics with Computers" in which the idea of quantum comput- ing was talked about . In 1982, there was a paper by Richard Feynman stating that in order for some quantum systems to be simulated on classical computing would be much harder, than on the quantum counterpart [25]. In 1985, David Deutsch presented the first universal quantum computer, the counterpart to the universal Turing machine, which is able to simulate any quan- tum system with at most a polynomial reduction [20]. Then, in 1992, David Deutsch with Richard Jozsa proposed the Deutsch-Jozsa problem, a simple problem which a quantum algorithm was able to solve exponentially faster than the classical de- terministic counterpart, showing the significance of quantum computers and the speedup they can provide in certain scenarios [21]. Being that this is an oracle prob- lem, it meant that there was a possible difference between the complexity classes EQP (Exact Quantum Polynomial time) and P (Polynomial time) [34]. One of the most important creations was Shor’s algorithms. In 1994, Peter Shor, working at AT&T’s Bell Labs, created an algorithm which could factor integers in 4 Chapter 2. Quantum Computing polynomial time. It solved the factoring problem and the discrete logarithm prob- lem, where the cryptosystems run nowadays depend on the difficulty of solving the former problem. With the making of the algorithm, the interest of quantum comput- ers rose quite higher. [59] More noteworthy events: - 1997: David Cory, Amr Fahmy, Timothy Havel [17] and Neil Gershenfeld, Isaac L. Chuang [28]: publish papers showing a method of implementing gates for quan- tum machines - 1998: first display of quantum algorithm running on a 2-qubit Nuclear Magnetic Resonance quantum computer that was able to solve Deutsch’s Algorithm [13] - 2001: Shor’s algorithm was run on IBM’s Almaden Research Center and Stan- ford University, where the number 15 was factorised with the use of "a billion billion molecules". [23] Many more important events happened especially after the millennium. Nowa- days, many universities and companies are involved in quantum computing, some of the notable ones being IBM [63], D-Wave[31], Microsoft Research [57] and Quan- tum Artificial Intelligence Lab by NASA, Google, and Universities Spaces Research Association [29]. 2.3 What is Quantum Computing Quantum computing is computation that is done using quantum events - such events being quantum entanglement or superposition. The machines that do these compu- tations are quantum computers and are based on qubits, the quantum equivalent of the classical bits. (Most of the information was taken from [49], some for Toffoli gates here [4], entanglement here [52] and eigenvalues/eigenvectors here [46]) 2.4 Qubits 2.4.1 Single Qubit Qubits play the same role as bits, however the two are different. They both have a state, however where a bit can have either states 0 or 1, a qubit can have an infinite amount of states. They do have the states | 0 〉 and | 1 〉 states which correspond to classical bit equivalent, and the notation used is called a Bra-Ket/Dirac notation (Bra being 〈| , Ket being |〉 ). When a qubit is in another state other than the previous two it is described as a linear combination of the two, what we call a superposition. | ψ 〉 = α | 0 〉 + β | 1 〉 where | ψ 〉 is the state and α and β are complex numbers. It can be said that the state is a vector in a complex vector space of two dimensions with | 0 〉 and | 1 〉 being the computational basis states. Measuring the state of the qubit is not possible in a single measurement - that is finding the values of α and β , as measuring a qubit makes it collapse and the output would be 0 or 1. The result being either 0 or 1 is actually a probability described by | α | 2 and | β | 2 respectively, meaning | α | 2 + | β | 2 = 1. As the previous equality resembles the equation of a sphere it can be rewritten as: | ψ 〉 = e i γ ( cos θ 2 | 0 〉 + e i φ sin θ 2 | 1 〉 ) where e i γ has no perceptible effects so: 2.4. Qubits 5 | ψ 〉 = cos θ 2 | 0 〉 + e i φ sin θ 2 | 1 〉 where the angles θ and ψ define a point in a three-dimensional sphere, the Bloch sphere (Figure 2.1) , which it can visually represent the state of a qubit. F IGURE 2.1: Bloch Sphere with example | ψ 〉 The surface of the Bloch sphere shows the fact that there can be infinite amount of states, as there infinite amount of points on the surface of a sphere. 2.4.2 Multiple Qubits and Entanglement Single qubits are not enough to solve problems, especially to show the benefit over classical bits, so more are needed. Let’s describe a state of two qubits. The compu- tational basis states for two classical bits are: | 00 〉 | 01 〉 | 10 〉 | 11 〉 , the quantum equiv- alent of the classical: 00, 01, 10, 11. In order to describe the states we need an ampli- tude for each one. | ψ 〉 = ψ 00 | 00 〉 + ψ 01 | 01 〉 ψ 10 | 10 〉 ψ 11 | 11 〉 with the probability of of measurement still holding the equality of: | ψ 00 | 2 + | ψ 01 | 2 + | ψ 10 | 2 + | ψ 11 | 2 = 1 and generalising: for n qubits there are 2 n amplitudes. Also, for two untangled qubits we can describe the combined state by getting the tensor product of the two f or : | ψ 〉 = [ ψ 0 ψ 1 ] , | φ 〉 = [ φ 0 φ 1 ] | φψ 〉 = | φ 〉 ⊗ | ψ 〉 = φ 0 × [ ψ 0 ψ 1 ] φ 1 × [ ψ 0 ψ 1 ] = ψ 0 φ 0 ψ 0 φ 1 ψ 1 φ 0 ψ 1 φ 1 and the tensor product is used to describe the combined state of any number of singular qubits. 6 Chapter 2. Quantum Computing 2.4.3 Entanglement There are some states that cannot described by the combination of singular qubits, such as the state: 1 √ 2 ( | 01 〉 + | 10 〉 ) which is known as a Bell state, the other ones being 1 √ 2 ( | 00 〉 + | 11 〉 ) , 1 √ 2 ( | 01 〉 − | 10 〉 ) and 1 √ 2 ( | 00 〉 − | 11 〉 ) which can be made using two qubits and a CNOT gate, which will be explained in the next segment. By looking at the amplitude for each state ( 1 √ 2 ( | 01 〉 + | 10 〉 ) = 1 √ 2 | 01 〉 + 1 √ 2 | 10 〉 → p ( | 01 〉 ) = 50%, p ( | 10 〉 ) = 50%) we can see that there is a 50% chance of getting either of the two state. As n = 2 and states : 2 6 = 2 2 this state cannot be described by the tensor product of two qubits. This means that, even with them being in a superposition, if one of the two qubits is measured, the other qubit will have a specific measurement outcome with 100% certainty. e.g. if the first qubit after measurement output 0: 1 √ 2 ( | 01 〉 + | 10 〉 ) → 1 st : | 0 〉 measure | 01 〉 Note: No operation on one qubit can affect the final output of the measurement of the other qubit after the entanglement has been carried out. This fact is a saving grace for the postulate that information cannot travel faster than light. This means that if the two qubits are separated a significant distance apart, there is no way with our current understanding that information can be sent from one place to the other, without needing to transfer classical information as well [52]. 2.5 Quantum Gates In order for qubits to apply qubits to solve a problem, there needs to be some sort of computation. In the case of classical computers, in the simplest way, wires and logic gates can be used to get information after processing data. In the case of quantum computing, there is the equivalent of wires, which depending on the implementa- tion of qubits can be different (e.g. for photons, just the travel of photons in a dark, isolated space), and quantum logic gates, and with the combination of the two quan- tum computation can be carried out. The types of gates can be divided into two groups: those affecting a single qubit and those affecting multiple qubits. 2.5.1 Single qubit gates These are the gates that are applied to a single qubit - have a single qubit as input and output (for quantum gates: number of input registers = number of output registers, because of their unitary nature). X gate The X gate can be described as the quantum equivalent of the classical NOT gate. In terms of the Bloch sphere, it is the rotation of the qubit state around the x axis by π radians. It maps | 0 〉 → | 1 〉 and | 1 〉 → | 0 〉 2.5. Quantum Gates 7 Gate representation: X Matrix representation: X ≡ [ 0 1 1 0 ] Y and Z gates The Y and Z gates are π radian rotations of the input state in terms of the y and z axis on the Bloch sphere respectively. Gate representations: Y Z Matrix representations: Y ≡ [ 0 − i i 0 ] , Z ≡ [ 1 0 0 − 1 ] Hadamard gate The Hadamard gate maps the basis states | 0 〉 → 1 √ 2 ( | 0 〉 + | 1 〉 ) and | 1 〉 → 1 √ 2 ( | 0 〉 − | 1 〉 ) by the coefficient 1 √ 2 it can be deduced that there is an equal probability of measuring 1 or 0, thus putting the qubit in a superposition. In the Bloch sphere, this is a rotation of π radians in the axis ˆ x + ˆ z √ 2 , ˆ x and ˆ z being the unitary vectors of the corresponding axes. This rotation can also be interpreted as a "square root" rotation of the X gate. This gate is the single qubit version of the Quantum Fourier Transform which is described later on. Gate representation: H Matrix representation: H ≡ 1 √ 2 [ 1 1 1 − 1 ] 2.5.2 Multiple qubit gates Controlled-NOT gate This gate carries out the X (NOT) operation on a target qubit depending on the state of the control qubit. e.g control: | 1 〉 and target: | 0 〉 : | 10 〉 CNOT − −− → | 11 〉 control: | 0 〉 and target: | 1 〉 : | 01 〉 CNOT − −− → | 01 〉 This gate can also be described as a XOR gate as it produces the | ψ ⊕ χ 〉 , where | χ 〉 and | ψ 〉 are states. However, one important distinction is that a XOR gate is not unitary as the gate as the input information is lost after the operation. That is not the case of CNOT gates as the input is preserved after the operation. Also, the CNOT gate is plays a similar role to NAND gates as any quantum circuit can be expressed using CNOT and single qubit gates, where NAND gates can be used to express any classical circuit. Gate representation: | χ 〉 • | χ 〉 | ψ 〉 | ψ ⊕ χ 〉 8 Chapter 2. Quantum Computing Matrix representation: CNOT ≡ 1 0 0 0 0 1 0 0 0 0 0 1 0 0 1 0 Toffoli gate The Toffoli gate is used to implement a classical algorithm on a quantum computer. It is composed of three input registers and three output registers, and the operation it carries out is similar to the operation of a classical NAND gate, where the target qubit is negated, if both control qubits are set to | 1 〉 . Unlike the NAND gate, this gate is reversible. As NAND gates can be used to express any classical circuit, Toffoli gates can be used to do the same. The Toffoli gate can be expressed as three CNOT operations. Gate representation using CNOT gates: • • • • • V V † V where V 2 = Toffoli, V is unitary, and V † be the conjugate transpose of V Gate representation: • • Matrix representation: Toffoli gate ≡ 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 SWAP gate This gate swaps the state of two qubits. This can be done either by applying three CNOT gates, or by just "swapping the wires" of the qubits. SWAP using CNOT gate: • • • Gate representation: × × Matrix representation: SWAP ≡ 1 0 0 0 0 0 1 0 0 1 0 0 0 0 0 1