?
Угрозы, связанные с применением квантовых эффектов в криптографии
In December 2022, an article was published about the implementation of Shor's algorithm on a quantum computer in China. In this paper, based on the experimental results of this article, some conclusions are drawn about the possibility of practical use of Shor's algorithm and similar algorithms on quantum computers to attack information security systems built on the basis of discrete logarithm problems. The issue of the dependence of the accuracy of calculations on the number of qubits in the system and the program depth (the number of sequential operations on a quantum system) is considered. An overview of the emergence and development of quantum key distribution technology is presented. A comparison with similar technologies in digital cryptography is made. A conclusion is made about the advantage of the latter in convenience, performance and provable resistance.