Post
Topic
Board Development & Technical Discussion
Re: Quantam: How Long Before Computers Crack Private Keys
by
johnyj
on 16/02/2020, 17:24:54 UTC
Can you give an example of how to use Shor's algorithm to break ECC? I have a friend that is a professor in QC department in one of the famous Chinese universities, he is unable to answer this question

Shor I can. Sorry.

The maths is I think well established and universally accepted. I am by no means an expert, but section 2 of this paper guides you through it.

ECC security is reliant on the effective impossibility of solving the Discrete Logarithm Problem; it being implausibly difficult to reverse elliptic curve point multiplication using "normal" computers.

Shor's algorithm is famous for solving prime factorisation for any given integer. This can be applied to discrete logarithms (see: https://en.wikipedia.org/wiki/Shor%27s_algorithm#Discrete_logarithms), because the algorithm is equivalent to the hidden subgroup problem for finite Abelian groups. I'll not go into it further because as I say I'm no expert and the maths gets beyond me at this point.


Thanks, that's a good explanation, at least it described a possible path toward that