NTRUEncrypt cryptographic system can remain
relevant not only at the moment, but also in the future.
The purpose of this work is to develop and
implement the NTRUEncrypt cryptographic system
with a public key.
2 QUANTUM COMPUTERS
Quantum computers are machines that use the
properties of quantum physics to store data and
perform calculations. This can be extremely useful
for certain tasks, where they can significantly
outperform even supercomputers. Classic computers,
including smartphones and laptops, encode
information in binary "bits", which can have a value
of 0 or 1. In a quantum computer, the basic unit of
memory is the qubit (Wenbo Mao, 2015).
Bouquets are created using physical systems, such
as the spin of an electron or the orientation of a photon
(Uttar Pradesh, 2019). These systems can be
simultaneously arranged in many different
configurations, a property known as quantum
superposition. Qubits can also be inextricably linked
together by a phenomenon called quantum
entanglement. As a result, a series of qubits can
simultaneously represent different things.
For example, eight bits are enough for a classical
computer to represent any number from 0 to 255. But
eight dice is enough for a quantum computer to
represent every number from 0 to 255
simultaneously. (Uttar Pradesh, 2019). A few
hundred entangled qubits will be enough to represent
more numbers than the atoms in the universe. In
situations where there are a large number of possible
combinations, quantum computers can consider them
simultaneously (Ryabko, 2012). Examples include
trying to find the prime factors of a very large
number, or the best route between two places.
However, there may also be many situations
where classical computers will still outperform
quantum computers. The computers of the future may
be a combination of both of these types. At the
moment, quantum computers are very sensitive: heat,
electromagnetic fields and collisions with air
molecules can lead to the loss of the quantum
properties of the qubit. This process, known as
quantum decoherence, causes the system to fail, and
this happens the faster the more particles involved
(Schneier B., 2002).
Creating hardware for a quantum computer is a
difficult task. Qubits are inherently very fragile and
can lose the information encoded in them very
quickly. The main objective is to keep the qubits
completely isolated from the environment, while
providing high-precision monitoring and reading of
the qubit state. In order to effectively separate the
qubits from any noise source and therefore maintain
a longer coherence time, these systems are usually
cooled to extremely low temperatures using liquid
helium, however this results in high operating costs.
There are many different ways to implement
qubits, such as trapped ions, superconducting rings,
and more. Each architecture has its own advantages
and disadvantages, and it is not yet clear which qubit
material is the most scalable(Ishmukhametov, 2011).
To provide a large number of parallel processes,
the quantum computing model uses several relatively
simple rules for converting input information. In
other words, it becomes possible to calculate its
values for all arguments in a single pass of the
function. This function is applied to the input data.
The input is data that is a superposition of all possible
values of the argument, therefore, the function must
accept and process such a sequence. In quantum
models, a function is a Hermitian matrix, that is, one
that has its own Hermitian-conjugate, and the product
of these matrices will eventually give a unit one. The
conjugate matrix can be obtained in two steps, the
first step is the transposition of the original matrix and
the second step is the substitution of their complex-
conjugate elements instead of the original elements.
If you multiply the resulting matrix by the vector of
the quantum register, you get a quantum register, such
that the sum of the squares of the coefficients for
quantum states is equal to one (Cheremushkin, 2009).
2.1 Comparison of RSA,
NTRUEncrypt, and ECC
Cryptosystems
Most of the most important information today is
transmitted via the global Internet, for example:
email, chat messages, video conferences, e-
commerce, and online banking data. The use of
public-key cryptosystems is the main way to protect
such data (Bolotov, 2006).
The most widely used cryptosystem is RSA, based
on the complexity of factorization of large numbers,
the Diffie-Hellman scheme, the digital signature
algorithm (DSA), the security of which is based on
the complexity of solving the discrete logarithm
problem in the field, a family of algorithms based on
elliptic curves. But all of them have certain
disadvantages, the main ones being either relatively
low speed, or relatively low stability at comparable
key and parameter sizes (Diffie-Hellman scheme and
other algorithms based on the discrete logarithm in
INFSEC 2021 - International Scientific and Practical Conference on Computer and Information Security