
{"id":8443,"date":"2022-12-14T14:18:21","date_gmt":"2022-12-14T05:18:21","guid":{"rendered":"http:\/\/infosec.pusan.ac.kr\/?page_id=8443"},"modified":"2025-12-23T13:00:05","modified_gmt":"2025-12-23T04:00:05","slug":"sub34","status":"publish","type":"page","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/sub34\/","title":{"rendered":"\uc591\uc790\ucef4\ud4e8\ud305 \ubc0f \uc554\ud638 \ud574\ub3c5"},"content":{"rendered":"<p>&nbsp;<\/p>\n<div class=\"sub31\">\n<p><!-- sub tab --><\/p>\n<div class=\"sub_tab\">\n<ul>\n<li><a href=\"index.php\/sub31\">AI\ubcf4\uc548 \ubc0f \uc0b0\uc5c5\uc6a9 AI<\/a><\/li>\n<li><a href=\"index.php\/sub35\">AI\uae30\ubc18 \uc790\uc5f0\uc5b4\ucc98\ub9ac<\/a><\/li>\n<li><a href=\"index.php\/sub32\">\ubc18\ub3c4\uccb4SoC \ubc0f \ubcf4\uc548<span class=\"pc840_v\"><\/span><\/a><\/li>\n<li><a href=\"index.php\/sub33\">\ube14\ub85d\uccb4\uc778<span class=\"pc840_v\"><\/span><\/a><\/li>\n<li><a class=\"on\"><span class=\"pc840_v\">\uc591\uc790\ucef4\ud4e8\ud305 \ubc0f \uc554\ud638 \ud574\ub3c5<\/span><\/a><\/li>\n<li><a href=\"index.php\/port-simulation\">\ud56d\ub9cc \uc2dc\ubbac\ub808\uc774\uc158<\/a><\/li>\n<\/ul>\n<\/div>\n<div class=\"space20\"><\/div>\n<h1>Quantum Computing &amp; Cryptanalysis<\/h1>\n<div class=\"line6\"><\/div>\n<div class=\"space20\"><\/div>\n<p><!--\n\n\n<blockquote>\n\n\n<h3><a href=\"https:\/\/aideadlin.es\/?sub=ML,CV,NLP,RO,SP,DM\">AI \ucee8\ud37c\ub7f0\uc2a4 \uc77c\uc815\uc548\ub0b4<strong><strong>(<\/strong>AI Conference Deadlines)<\/strong><\/a><\/h3>\n\n\n<\/blockquote>\n\n\n\n\n<div class=\"space20\"><\/div>\n\n\n\n\n<div class=\"line6\"><\/div>\n\n\n\n\n<div class=\"space20\"><\/div>\n\n\n--><\/p>\n<div class=\"sub_content_title\">Research on quantum circuits for cracking public-key cryptography<\/div>\n<div class=\"sub_content_txt\">\n<dl>\n<dt>\u25cb<\/dt>\n<dd>Building Shor\u2019s Algorithm circuit for cracking RSA\/ECC cryptosystem<\/dd>\n<dt style=\"padding-left: 10px;\">\u25a0<\/dt>\n<dd>Development of underlying subcircuits for cracking RSA<\/dd>\n<dt style=\"padding-left: 20px; padding-right: 5px;\">\u2013<\/dt>\n<dd>Quantum adder<\/dd>\n<dt style=\"padding-left: 20px; padding-right: 5px;\">\u2013<\/dt>\n<dd>Quantum modular adder<\/dd>\n<dt style=\"padding-left: 20px; padding-right: 5px;\">\u2013<\/dt>\n<dd>Quantum modular multiplication<\/dd>\n<dt style=\"padding-left: 20px; padding-right: 5px;\">\u2013<\/dt>\n<dd>Quantum modular exponentiation<\/dd>\n<dt style=\"padding-left: 10px;\">\u25a0<\/dt>\n<dd>Development of underlying subcircuits for cracking ECC (in prime curves, binary elliptic curves)<\/dd>\n<dt style=\"padding-left: 20px; padding-right: 5px;\">\u2013<\/dt>\n<dd>Quantum Multiplier <\/dd>\n<dt style=\"padding-left: 20px; padding-right: 5px;\">\u2013<\/dt>\n<dd>Quantum Inversion<\/dd>\n<dt style=\"padding-left: 20px; padding-right: 5px;\">\u2013<\/dt>\n<dd>Quantum Point Addition<\/dd>\n<dt style=\"padding-left: 10px;\">\u25a0<\/dt>\n<dd>Quantum circuit optimization (reducing overall depth, gate count, T-depth, etc)<\/dd>\n<dt style=\"padding-left: 10px;\">\u25a0<\/dt>\n<dd>Quantum circuit simulation (simulation on IBM Qiskit, Q-Crypton, etc)<\/dd>\n<dt style=\"padding-left: 10px;\">\u25a0<\/dt>\n<dd>Quantum resource estimation<\/dd>\n<dt>\u25cb<\/dt>\n<dd>Various research topics on quantum security<\/dd>\n<\/dl>\n<\/div>\n<div class=\"sub_img\">\n<h3>[Quantum Circuit for Cracking RSA Cryptosystem &#8211; High-Level Overview]<\/h3>\n<div class=\"clear\"><\/div>\n<p><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2022\/12\/figure17.png\" \/><\/p>\n<\/div>\n<\/div>\n<div class=\"sub_img\">\n<h3>[Example: Modular Adder Library Development on Q-Crypton Visualization (Vnote)]<\/h3>\n<div class=\"clear\"><\/div>\n<p><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2022\/12\/figure18.png\" \/><\/p>\n<\/div>\n<div class=\"space40\"><\/div>\n<div class=\"sub_content_title\">Research on Quantum Machine Learning<\/div>\n<div class=\"sub_content_txt\">\n<dl>\n<dt>\u25cb<\/dt>\n<dd>Study on hybrid quantum-classical deep learning for cyber security and cryptanalysis<\/dd>\n<\/dl>\n<\/div>\n<div class=\"sub_img\">\n<h3>[Hybrid Quantum-Classical Machine Operation Flow Example]<\/h3>\n<div class=\"clear\"><\/div>\n<p><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2022\/12\/figure19.png\" \/><\/p>\n<\/div>\n<div class=\"sub_img\">\n<h3>[Example of Hybrid Quantum-Classical Machine Learning Architecture]<\/h3>\n<div class=\"clear\"><\/div>\n<p><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2022\/12\/figure20.png\" \/>\n<\/div>\n<div class=\"sub_content_txt\">\n<dl>\n<dt>\u25cb<\/dt>\n<dd>Study on quantum federated learning <\/dd>\n<dt style=\"padding-left: 10px;\">\u25a0<\/dt>\n<dd>Study on quantum federated learning schemes<\/dd>\n<dt style=\"padding-left: 10px;\">\u25a0<\/dt>\n<dd>Study on implementation challenges such as development constraints, deployment strategies, and circumstances.<\/dd>\n<\/dl>\n<\/div>\n<div class=\"sub_img\">\n<h3>[Example of Quantum Federated Learning Schemes]<\/h3>\n<div class=\"clear\"><\/div>\n<p><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2022\/12\/figure21.png\" \/>\n<\/div>\n<div class=\"clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; AI\ubcf4\uc548 \ubc0f \uc0b0\uc5c5\uc6a9 AI AI\uae30\ubc18 \uc790\uc5f0\uc5b4\ucc98\ub9ac \ubc18\ub3c4\uccb4SoC \ubc0f \ubcf4\uc548 \ube14\ub85d\uccb4\uc778 \uc591\uc790\ucef4\ud4e8\ud305 \ubc0f \uc554\ud638 \ud574\ub3c5 \ud56d\ub9cc \uc2dc\ubbac\ub808\uc774\uc158 Quantum Computing &amp; Cryptanalysis Research on quantum circuits for cracking public-key cryptography \u25cb Building Shor\u2019s Algorithm circuit for cracking RSA\/ECC cryptosystem \u25a0 Development of underlying subcircuits for cracking RSA \u2013 Quantum adder \u2013 Quantum modular adder \u2013 Quantum [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-sub3.php","meta":{"footnotes":""},"class_list":["post-8443","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/8443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=8443"}],"version-history":[{"count":22,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/8443\/revisions"}],"predecessor-version":[{"id":9545,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/8443\/revisions\/9545"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=8443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}