• Title/Summary/Keyword: 양자컴퓨팅

Search Result 90, Processing Time 0.023 seconds

The Quantum Computing Industry from a Market Perspective (시장 측면에서 본 양자컴퓨팅 산업)

  • B.S. Cho;S.J. Lee;S.H. Jeong
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.3
    • /
    • pp.58-68
    • /
    • 2024
  • Quantum computing can be a game changer in all areas of economy security, and society, and it is expected to bring innovation to the entire industrial ecosystem. The competition in this industry is accelerating with various countries pushing for policies to preempt technology and maintain a technological advantage. The quantum computing market is expected to show commercial gains in 2027 as an inflection point. Initially, it is expected to replace the high-performance computing market. However the continuous growth of quantum computing will depend on the development innovative services such as ChatGPT in AI, and technological breakthroughs. We examine the definition and outlook, evolution and dynamics, and supply chain structure of the quantum computing industry in an attempt to unveil implications for its development.

Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK (SIMEC 경량암호에 대한 양자회로 구현 및 Post-Quantum 보안 강도 평가)

  • Song Gyeong Ju;Jang Kyung Bae;Sim Min Joo;Seo Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.181-188
    • /
    • 2023
  • Block cipher is not expected to be safe for quantum computer, as Grover's algorithm reduces the security strength by accelerating brute-force attacks on symmetric key ciphers. So it is necessary to check the post-quantum security strength by implementing quantum circuit for the target cipher. In this paper, we propose the optimal quantum circuit implementation result designed as a technique to minimize the use of quantum resources (qubits, quantum gates) for SIMECK lightweight cryptography, and explain the operation of each quantum circuit. The implemented SIMECK quantum circuit is used to check the estimation result of quantum resources and calculate the Grover attack cost. Finally, the post-quantum strength of SIMECK lightweight cryptography is evaluated. As a result of post-quantum security strength evaluation, all SIMECK family cipher failed to reach NIST security strength. Therefore, it is expected that the safety of SIMECK cipher is unclear when large-scale quantum computers appear. About this, it is judged that it would be appropriate to increase the block size, the number of rounds, and the key length to increase the security strength.

A Study on Attack against NTRU Signature Implementation and Its Countermeasure (NTRU 서명 시스템 구현에 대한 오류 주입 공격 및 대응 방안 연구)

  • Jang, Hocheol;Oh, Soohyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.551-561
    • /
    • 2018
  • As the computational technology using quantum computing has been developed, several threats on cryptographic systems are recently increasing. Therefore, many researches on post-quantum cryptosystems which can withstand the analysis attacks using quantum computers are actively underway. Nevertheless, the lattice-based NTRU system, one of the post-quantum cryptosystems, is pointed out that it may be vulnerable to the fault injection attack which uses the weakness of implementation of NTRU. In this paper, we investigate the fault injection attacks and their previous countermeasures on the NTRU signature system and propose a secure and efficient countermeasure to defeat it. As a simulation result, the proposed countermeasure has high fault detection ratio and low implementation costs.

Hierarchical Circuit Visualization for Large-Scale Quantum Computing (대규모 양자컴퓨팅 회로에 대한 계층적 시각화 기법)

  • Kim, JuHwan;Choi, Byung-Soo;Jo, Dongsik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.611-613
    • /
    • 2021
  • Recently, research and development of quantum computers, which exceed the limits of classical computers, have been actively carried out in various fields. Quantum computers, which use quantum mechanics principles in a way different from the electrical signal processing of classical computers, have various quantum mechanical phenomena such as quantum superposition and quantum entanglement. It goes through a very complicated calculation process compared to the calculation of a classical computer for performing an operation using its characteristics. In order to utilize each element efficiently and accurately, it is necessary to visualize the data before driving the actual quantum computer and perform error verification, optimization, reliability, and verification. However, when visualizing all the data of various elements configured inside the quantum computer, it is difficult to intuitively grasp the necessary data, so it is necessary to visualize the data selectively. In this paper, we visualize the data of various elements that make up a quantum computer, and hierarchically visualize the internal circuit components of a quantum computer that are complicatedly configured so that the data can be observed and utilized intuitively.

  • PDF

A Post-Quantum Multi-Signature Scheme (양자 컴퓨팅 환경에서 안전한 다중 서명 기법)

  • Ko, Chanyoung;Lee, Youngkyung;Lee, Kwangsu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.517-526
    • /
    • 2021
  • Recently, the acceleration of the development of quantum computers has raised the issue of the safety of factorization and discrete logarithm based digital signature schemes used in existing Internet environments. To solve the issue, several digital signature schemes are presented that are safe in post-quantum computing environments, including standardization work by the National Institute of Standards and Technology(NIST). In this paper, we design and present a multi-signature scheme based on the TACHYON announced by Behnia et al. in 2018 CCS conference, and prove the security. Multi-signature schemes are key techniques that can distribute the dependence of cryptocurrency-wallet on private keys in the cryptocurrency field, which has recently received much attention as an digital signature application, and many researchers and developers have recently been interested. The multi-signature scheme presented in this paper enables public key aggregation in a plain public key model, which does not require additional zero-knowledge proof, and can construct an effective scheme with only an aggregated public key.

Accelerated Implementation of NTRU on GPU for Efficient Key Exchange in Multi-Client Environment (다중 사용자 환경에서 효과적인 키 교환을 위한 GPU 기반의 NTRU 고속구현)

  • Seong, Hyoeun;Kim, Yewon;Yeom, Yongjin;Kang, Ju-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.481-496
    • /
    • 2021
  • It is imperative to migrate the current public key cryptosystem to a quantum-resistance system ahead of the realization of large-scale quantum computing technology. The National Institute of Standards and Technology, NIST, is promoting a public standardization project for Post-Quantum Cryptography(PQC) and also many research efforts have been conducted to apply PQC to TLS(Transport Layer Security) protocols, which are used for Internet communication security. In this paper, we propose a scenario in which a server and multi-clients share session keys on TLS by using the parallelized NTRU which is PQC in the key exchange process. In addition, we propose a method of accelerating NTRU using GPU and analyze its efficiency in an environment where a server needs to process large-scale data simultaneously.

Quantum Inspired Eco-system Transformation in Augmented Reality (양자 기법 기반 증강현실 객체 간 생태계 변형)

  • Kim, Ju-Hwan;Jo, Dongsik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.573-575
    • /
    • 2019
  • Recently, augmented reality (AR) technology has been widely used in a variety of fields such as defense, medical, education, and entertainment. In the augmented reality environment, a user can interact a virtual object by the user 's specific behaviors. Also, it is necessary to use a technique to automatically interacts among the generated virtual objects. In this paper, we propose an authoring model to apply augmented reality environments based on quantum computing inspired entanglement and overlapping phenomenon. For example, it is possible to allow the user to automatically increase and decrease the number of the object with the characteristics of the virtual object without user intervention. As a tested platform for this purpose, this paper provide an augmented reality eco-system environment with automatic interaction among virtual animals.

  • PDF

최첨단 가상현실 시스템 SeeMore

  • Jo, Se-Yeon
    • Journal of Scientific & Technological Knowledge Infrastructure
    • /
    • s.8
    • /
    • pp.113-118
    • /
    • 2002
  • 한국과학기술정보연구원 (KISTI) 슈퍼컴퓨팅센터의 SeeMore는 국내에서 처음으로 구현된 시스템으로 지난 해 4월에 설치되었으며, 복잡하고 방대한 계산결과를 가상현실 공간상에서 시각화하여, 효과적인 해석을 가능하게 하는 과학적 가시화 시스템이라고 할 수 있다. SeeMore에서 활용될 수 있는 적용 분야는 가상현실, 과학적 데이터의 시각화, 복잡한 데이터의 분석, 기상모델링, 양자화학, 생물정보학, 물리적 현상의 모델링에 이르기까지 무궁무진하다.

  • PDF

범밀도 함수 계산을 이용한 Bi2Se3 (111)의 산소 흡착 농도 연구

  • Sin, Eun-Ha
    • Proceeding of EDISON Challenge
    • /
    • 2014.03a
    • /
    • pp.492-494
    • /
    • 2014
  • 위상부도체(Topological insulator, (TI))는 특이한 금속성 표면 성질을 가지며 이 물질에 대해 많은 물성연구가 이루어져 오고 있다. TI 물질 중 하나인 $Bi_2Se_3$는 스핀트로닉스 또는 양자 컴퓨팅 분야에 전망이 밝은 물질이다. 본 논문에서는 $Bi_2Se_3$ (111) 표면의 산화농도에 대해 조사하였다. 결함이 없는 깨끗한 표면에서는 산소의 농도가 높을 때 에너지적으로 안정하며 표면결함이 있을 때에는 표면결함과 결합한 산소의 농도가 낮을 때 에너지적으로 안정한 것으로 나타났다. $Bi_2Se_3$ (111) 표면 산화 연구에서는 표면 점결함의 존재와 산소 농도를 함께 고려해야 할 것이다.

  • PDF

Isogeny 기반 암호의 최신 연구 동향

  • Kim, Suhri
    • Review of KIISC
    • /
    • v.32 no.1
    • /
    • pp.19-29
    • /
    • 2022
  • 2011 Jao와 De Feo에 의해 제안된 SIDH가 기존 타원곡선 사이의 isogeny를 이용한 암호보다 효율적인 성능을 제공하고, 그 후 2016년 Costello 등의 효율적인 연산 방법으로 SIDH 속도가 3배 이상 향상되면서, 타원곡선 사이의 isogeny를 이용한 암호가 양자 컴퓨팅 환경에서 RSA와 ECC를 대체할 암호로 주목을 받기 시작했다. 특히 isogeny 기반 암호는 다른 PQC 암호에 비해 작은 키 사이즈를 제공한다는 장점으로 현재까지 활발히 연구가 진행되고 있으며, SIDH를 기반으로 둔 SIKE는 NIST PQC 표준화 공모전 Round 3의 대체 후보이다. 다른 PQC 암호에 비해 속도가 느리다는 점이 isogeny 기반 암호의 단점인 만큼, isogeny 기반 암호는 처음 제안된 후 10년 동안 최적화를 중심으로 큰 발전을 이뤄왔다. 본 논문에서는 isogeny 기반 암호의 최신 연구 동향을 소개한다.