Sharing sensitive supply chain information

A study on vulnerabilities in RSA encryption systems from the use of the shor algorithm

Authors

  • Rodrigo de Souza Fatec de Franco da Rocha
  • Antônio Cesar Galhardi Unidade de Pós-Graduação, Extensão e Pesquisa - Centro Estadual de Educação Tecnológica Paula Souza

Keywords:

cryptography, machine learning, Shor's algorithm, cybersecurity

Abstract

This work proposes a comparative analysis of algorithms, considering Shor's Algorithm as a basis. The ChatGPT artificial intelligence tool is used in the work, asking it to create codes in the Qiskit language and quantum computing at two moments: August 2023 and February 2024. The results showed that there was considerable learning from the ChatGPT tool in relation to better strategies for implementing the algorithm, in such a way that, considering the last suggestion, from February 2024, there is a considerable risk to RSA encryption, if this type of code is implemented without supervision in remote access environments to quantum computers. It is noteworthy that the risk to RSA encryption has direct implications for contemporary logistics, especially in the sharing of sensitive information in the supply chain, increasing the need to develop information security solutions that make it possible to prevent or mitigate the consequences of such advancement.

Downloads

Download data is not yet available.

References

CASTRO, C. C. Criptografia RSA. Trabalho de Conclusão de Curso - Universidade Federal de Santa Catarina, Departamento de Matemática (MAT), Centro de Blumenau, Curso de Licenciatura em Matemática, Blumenau, 2019.

JOHNSTON, E.R.; HARIGAN, N.; SEGOVIA, M.G. Programming quantum computers. O'Reilly Media, Inc., Sebastopol, 2029.

PARADA, I.U. Aplicação de processamento quântico para aceleração da resolução de autômatos probabilísticos. Trabalho de conclusão de curso (Bacharelado em Engenharia Mecatrônica) — Universidade de Brasília, Brasília, 2019.

PORTUGAL, R.; MARQUEZINO, F. Introdução à Programação de Computadores Quânticos. Sociedade Brasileira de Computação, 2019.

RAMESH, K.; RAVISHANKARAN, S.; JOSHI, A.; CHANDRASEKARAN, K. A survey of design techniques for conversational agents. International Conference on Information, Communication and Computing Technology, Springer, Singapore, 2017.

SHOR, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. 35th Annual Symposiumon Foundations of Computer Science, Santa Fe, NM, Nov. 20–22, 1994, IEEE Computer Society Press, pp. 124–134, 1994.

TONELI, D.A. Desenvolvimento de um tutorial para o ensino de computação quântica. Trabalho de Conclusão de Curso – Unifesp, 2022.

TEIXEIRA, M.A.F. Números inteiros e criptografia RSA. Dissertação (mestrado) - Universidade Estadual Paulista (Unesp), Instituto de Geociências e Ciências Exatas, Rio Claro, 2020.

UZEDA, E. E. F.; DALLASEN, R. V.; SANTOS, M. C.; ROLLWAGEN, A. F.; RIBEIRO, D. D.; FIGUEIREDO, J. A. O. Utilização do algoritmo de Shor para quebra de criptografia RSA em computadores quânticos. Salão do Conhecimento, Unijuí, Ijuí, 2022.

VIEIRA, L.A.; ALBUQUERQUE, C.D. Um estudo passo a passo do Algoritmo de Shor. Proceeding Series of the Brazilian Society of Computational and Applied Mathematics, v. 7, n. 1, 2020.

WESTE, N.H.E., HARRIS, D. M. CMOS VLSI Design A Circuits and Systems Perspective. Addison – Wesley, New York, 2009.

Published

2025-01-09

How to Cite

Souza, R. de, & Galhardi, A. C. (2025). Sharing sensitive supply chain information: A study on vulnerabilities in RSA encryption systems from the use of the shor algorithm . Advances in Global Innovation & Technology, 3(2), e32015. Retrieved from https://revista.fateczl.edu.br/index.php/git/article/view/263

Similar Articles

You may also start an advanced similarity search for this article.