[17595] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RSA gets a reprieve?

daemon@ATHENA.MIT.EDU (Heyman, Michael)
Thu Jun 30 16:08:36 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Thu, 30 Jun 2005 15:16:58 -0400
From: "Heyman, Michael" <Michael.Heyman@sparta.com>
To: <cryptography@metzdowd.com>

From:
<www.newscientist.com/channel/info-tech/mg18625054.000>

    ATTEMPTS to build quantum computers could run up=20
    against a fundamental limit on how long useful=20
    information can persist inside them. Exceed the=20
    limit and information could just leak away,=20
    making computation impossible...Rather than=20
    remaining in a superposition of two states, a=20
    qubit will spontaneously collapse into one state=20
    or another (Physical Review Letters, vol 94,=20
    p 230401). "When we discovered this we were=20
    stunned," says van den Brink...the time limit=20
    for decoherence seems to grow shorter as systems=20
    get smaller. Zaanen says that for some of the=20
    most promising qubit technologies the limit=20
    would be about 1 second. It's not a problem at=20
    the moment, he says, because researchers are=20
    fighting to get coherence times up to around a=20
    microsecond. "But this fundamental limit is=20
    getting within reach."

This plus the "no-cloning theorem" means that if a quantum computer
cannot factor an RSA modulus in under a second, RSA will remain
unbreakable. (I'm not a quantum physicist or quantum computer programmer
so I don't even know if the no-cloning theorem, which states qubits of
unknown states cannot be copied, applies.)

-Michael Heyman

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post