Abstract
Classical cryptographic techniques are currently under the growing quantum computing threat. New techniques that quantum computing algorithms cannot break are urgently needed. We present such an encryption method. It builds upon quantum permutation logic gates or quantum permutation pads. It is universal in that it can be equally employed on classical computers, today’s Internet, and the upcoming quantum Internet. While the cryptographic technique is formulated in a quantum computing framework, it does not rely on physical properties uniquely present at the quantum level, such as no-cloning or entanglement of data. It achieves with today’s technology a level of security comparable to what will be possible to attain with tomorrow’s quantum technology. The mathematics behind the cryptographic technique, quantum representations of a symmetric group over a computational basis, is surprisingly simple. However, the challenge faced by an adversary wishing to break the code is intractable and uninterpretable, a property of Shannon’s perfect secrecy. We believe that the cryptographic technique presented in this article can be used in several different ways and modes. It can be integrated into numerous current Internet protocols, or the Internet of Things, making them quantum safe. In addition, it can be used to transition to the upcoming Internet quantum technology smoothly.




Similar content being viewed by others
Data availability
All data generated or analyzed during this study are included in this published article (and its Supplementary Information files).
References
Adams, C., Lloyd, S.: Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley (2003)
Aharonov, D., Ben-Or, M., Eban, E., Mahadev, U.: Interactive proofs for quantum computations. arXiv preprint arXiv:1704.04487 (2017)
Alagic, G., Broadbent, A., Fefferman, B., Gagliardoni, T., Schaffner, C., Jules, M.S.: Computational security of quantum encryption. In: International Conference on Information Theoretic Security, pp. 47–71. Springer (2016)
Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange’a new hope. In: 25Th USENIX Security Symposium (USENIX security 16), pp. 327–343 (2016)
Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J.C., Barends, R., Biswas, R., Boixo, S., Brandao, F.G., Buell, D.A., et al.: Quantum supremacy using a programmable superconducting processor. Nature 574(7779), 505–510 (2019)
Barbeau, M., Kranakis, E., Perez, N.: Authenticity, integrity, and replay protection in quantum data communications and networking. ACM Trans. Quantum Comput. 3(2), 1–22 (2022)
Barker, E., Mouha, N.: NIST special publication 800–67 revision 2: recommendation for the triple data encryption algorithm (TDEA) block Cipher. Natl. Inst. Stand. Technol. (NIST) (2017). https://doi.org/10.6028/NIST.SP.800-67r2
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7–11 (2014)
Bennett, C.H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)
Broadbent, A., Wainewright, E.: Efficient simulation for quantum message authentication. In: International Conference on Information Theoretic Security, pp. 72–91. Springer (2016)
Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R., Smith-Tone, D.: Report on Post-Quantum Cryptography. National Institute of Standards and Technology, https://nvlpubs.nist.gov/nistpubs/ir/2016/ NIST.IR.8105.pdf. Access: 2021-01-0
Costello, C., Jao, D., Longa, P., Naehrig, M., Renes, J., Urbanik, D.: Efficient compression of sidh public keys. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 679–706. Springer (2017)
Daniel, A., Lejla, B., et al.: Initial recommendations of long-term secure post-quantum systems. PQCRYPTO. EU. Horizon 2020 (2015)
Diaconis, P., Shahshahani, M.: The subgroup algorithm for generating uniform random variables. Probab. Eng. Inf. Sci. 1(1), 15–32 (1987)
Diamanti, E., Lo, H.K., Qi, B., Yuan, Z.: Practical challenges in quantum key distribution. NPJ Quantum Inf. 2(1), 1–12 (2016)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644–654 (1976)
Fisher, R.A., Yates, F.: Statistical tables: For biological, agricultural and medical research. Oliver and Boyd (1938)
Giampouris, D.: Short review on quantum key distribution protocols. GeNeDis 2016, 149–157 (2017)
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)
Hirschhorn, P.S., Hoffstein, J., Howgrave-Graham, N., Whyte, W.: Choosing NTRUEncrypt parameters in light of combined lattice reduction and MITM approaches. In: International Conference on Applied Cryptography and Network Security, pp. 437–455. Springer (2009)
Housley, R., Polk, T.: Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure. Wiley, Networking Council (2001)
Jones, N.C., Van Meter, R., Fowler, A.G., McMahon, P.L., Kim, J., Ladd, T.D., Yamamoto, Y.: Layered architecture for quantum computing. Phys. Rev. X 2(3), 031007 (2012)
Joseph, D., Ghionis, A., Ling, C., Mintert, F.: Not-so-adiabatic quantum computation for the shortest vector problem. Phys. Rev. Res. 2(1), 013361 (2020)
Kuang, R., Bettenburg, N.: Shannon perfect secrecy in a discrete hilbert space. In: 2020 IEEE International Conference on Quantum Computing and Engineering (QCE), pp. 249–255. IEEE (2020)
Kuang, R., Lou, D., He, A., Conlon, A.: Quantum safe lightweight cryptography with Quantum Permutation Pad. In: 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS), pp. 790–795. IEEE (2021)
Kuang, R., Lou, D., He, A., Conlon, A.: Quantum safe lightweight cryptography with quantum permutation pad. Adv. Sci., Technol. Eng. Syst. J. 6, 401–405 (2021)
Kuang, R., Lou, D., He, A., McKenzie, C., Redding, M.: Pseudo quantum random number generator with quantum permutation pad. In: 2021 IEEE International Conference on Quantum Computing and Engineering (QCE), pp. 359–364. IEEE (2021)
Laudenbach, F., Pacher, C., Fung, C.H.F., Poppe, A., Peev, M., Schrenk, B., Hentschel, M., Walther, P., Hübel, H.: Continuous-variable quantum key distribution with gaussian modulation-the theory of practical implementations. Adv. Quantum Technol. 1(1), 1800011 (2018)
Lou, D., Kuang, R., He, A.: Entropy transformation and expansion with Quantum Permutation Pad for 5G secure networks. In: The IEEE 21st International Conference on Communication Technology. IEEE (2021)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. Discrete Mathematics and Its Applications, CRC Press (2018)
Menezes, A.J., Okamoto, T., Vanstone, S.A.: Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inf. Theor. 39(5), 1639–1646 (1993)
Misoczki, R., Tillich, J.P., Sendrier, N., Barreto, P.S.: MDPC-McEliece: New McEliece variants from moderate density parity-check codes. In: 2013 IEEE international symposium on information theory, pp. 2069–2073. IEEE (2013)
Mosca, M.: Cybersecurity in an era with quantum computers: will we be ready? IEEE Secur. Priv. 16(5), 38–41 (2018)
National Institute of Standards and Technology: Advanced Encryption Standard (AES). https://csrc.nist.gov/publications/detail/fips/197/final. Access: 2021-01-0
National Security Agency – Central Security Service: Quantum Key Distribution (QKD) and Quantum Cryptography (QC). National Institute of Standards and Technology, https://www.nsa.gov/what-we-do/cybersecurity/quantum-key-distribution-qkd-and-quantum-cryptography-qc/. Access: 2021-01-01 (2020)
Nielsen, M., Chuang, I.: Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press (2010)
NIST: Report on post-quantum cryptography. Online: https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8105.pdf (2016)
NIST: Post-quantum cryptography. Online: https://csrc.nist.gov/projects/post-quantum-cryptography (2021)
O’Connor, L.: On the distribution of characteristics in bijective mappings. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 360–370. Springer (1993)
Perepechaenko, M., Kuang, R.: Quantum encrypted communication between two IMBQ systems using quantum permutation pad. In: 11th International Conference on Communications, Circuits and Systems (ICCCAS) (2022)
Peterson, L., Davie, B.: Computer Networks: A Systems Approach. Elsevier Science (2011)
Petzoldt, A., Bulygin, S., Buchmann, J.: Selecting parameters for the rainbow signature scheme. In: International Workshop on Post-Quantum Cryptography, pp. 218–240. Springer (2010)
Pirker, A., Dür, W.: A quantum network stack and protocols for reliable entanglement-based networks. New J. Phys. 21(3), 033003 (2019)
Quantropi Toolkit Starter. https://github.com/quantropi/quantropi-toolkit-starter. Access: 2021-01-0 (2021)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Techn. J. 28(4), 656–715 (1949)
Shende, V.V., Prasad, A.K., Markov, I.L., Hayes, J.P.: Synthesis of reversible logic circuits. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 22(6), 710–722 (2003)
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)
St-Jules, M.: Secure Quantum Encryption. Master’s thesis, School of Graduate Studies and Research, University of Ottawa, Ottawa, Ontario, Canada. (2016)
van Oorschot, P.: Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin. Springer International Publishing, Information Security and Cryptography (2021)
Wainewright, E.: Ecient Simulation for Quantum Message Authentication. Master’s thesis, School of Graduate Studies and Research, University of Ottawa, Ottawa, Ontario, Canada. (2016)
Wang, Y.: Revised quantum resistant public key encryption scheme RLCE and IND-CCA2 security for McEliece schemes. IACR Cryptol. ePrint Arch. 2017, 206 (2017)
Weyl, H.: The Classical Groups: Their Invariants and Representations (PMS-1). Princeton Landmarks in Mathematics and Physics. Princeton University Press (2016)
Xu, F., Ma, X., Zhang, Q., Lo, H.K., Pan, J.W.: Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92(2), 025002 (2020)
Zhong, H.S., Wang, H., Deng, Y.H., Chen, M.C., Peng, L.C., Luo, Y.H., Qin, J., Wu, D., Ding, X., Hu, Y., et al.: Quantum computational advantage using photons. Science 370(6523), 1460–1463 (2020)
Zukowski, M., Zeilinger, A., Horne, M.A., Ekert, A.K.: “Event-ready-detectors” Bell experiment via entanglement swapping. Phys. Rev. Lett. 71(26) (1993)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A: Quantum gate interpretation of QKD
Let us consider the one-qubit computational basis \(\{ |0\rangle , |1\rangle \}\). QKD can be expressed by quantum gate operations. In the computational basis \(B_1=\{ |0\rangle , |1\rangle \}\), encoding can be interpreted as the application the identity gate \(I = \left( \begin{matrix} 1 &{} 0 \\ 0 &{} 1 \end{matrix} \right) \) to the basis vectors \(|0\rangle =[1,0]^T\) and \(|1\rangle =[0,1]^T\). The encoding in the Hadamard basis \(B_2 = \{ |-\rangle , |+\rangle \}\), can be interpreted as of the application of the Hadamard gate \(H = \frac{1}{\sqrt{2}}\left( \begin{matrix} 1 &{} 1 \\ 1 &{} -1 \end{matrix} \right) \). Encoding of \(|0\rangle \) is performed by multiplying with the Hadamard gate, that is, \(H|0\rangle =|+\rangle \). Similarly, the encoding \(|1\rangle \) corresponds to the product \(H|1\rangle =|-\rangle \).
Quantum encoding in the Hadamard basis is equivalent to the Hadamard gate operation on a state in the computational basis. It transforms basis vectors into states with superposition, for the purposes of secure communications. The receiver also applies the Hadamard gate to restore the superposition states back to a computational basis state, before measuring. A quantum state is prepared and measured in the computational basis, but a quantum gate transforms it into a superposition state for its secure communication. The reverse gate operation brings the superposition state back to its original state for measuring in the computational basis. However, a mismatched gate selection at the receiver leads to the measurement of a superposition state. This outcome must be avoided. Note that this interpretation of QKD uses two quantum gates, namely the identity gate (I) and Hadamard gate (H).
Appendix B: Symmetric group \(S_2\)
In \(S_2\), the permutation matrices are \(P_1= \left( \begin{matrix} 1 &{} 0 \\ 0 &{} 1 \end{matrix} \right) \) and \(P_2= \left( \begin{matrix} 0 &{} 1 \\ 1 &{} 0 \end{matrix} \right) \) (ref. [46]). \(P_1\) is also the identity permutation gate I, and \(P_2\) is the Pauli permutation gate X.
Lemma 3
The Hadamard basis is the eigenbasis of \(P_2\).
Proof
Permutation gate \(P_2\) is equal to the sum \(|+\rangle -|1\rangle \). \(\square \)
Appendix C: Key generation, encryption and decryption example
In the following example, classical key material is mapped to permutation gates, using Fisher–Yates shuffling algorithm. QPP is used for encryption and decryption. Security parameters n is 2 while M is 5. For the sake of simplicity, confusion and diffusion are omitted.
1.1 C.1 Encryption
Let us consider the plaintext Hello World as a toy example. Using an ASCII character table, the plaintext has the following binary representation:
The binary representation is segmented into two-bit segments with decimal values of segments as follows:

For this example, we use a simple permutation selection algorithm. Suppose that we have randomly selected five permutation matrices/gates:
Mapping every decimal value 0, 1, 2, and 3 of input segments to the column vectors \(|0\rangle =[1 0 0 0]^T\), \(|1\rangle =[0 1 0 0]^T\), \(|2\rangle =[0 0 1 0]^T\) and \(|3\rangle =[0 0 0 1]^T\). Let us ignore the randomization for this simple example and also take the position of a dispatching segment modulo \(M=5\) to be the dispatching index of QPP. Then, we perform \(P_d\) \(|m\rangle \) = \(|c\rangle \) with m as the decimal value of the dispatching segment, the ciphertext decimal values \(|c\rangle \) of segments are as follows:

The corresponding ciphertext binary representation is:
It is clearly shown that the bit randomness is improved: the number of zero bits is 53 and the number of one bits is 43 in the plaintext Hello World, but the number of zero bits is 49 and the number of one bits is 47 in the ciphertext.
1.2 C.2 Decryption
The corresponding inverse permutation gates are:
Decryption uses the same process as the encryption, but with transposed QPP and perform \(P_d^T\) \(|c\rangle = |m\rangle \). The application of every corresponding inverse permutation gate yields the original plaintext, in a decimal form:

It corresponds to the the ASCII binary:
That is the decrypted plaintext: Hello World.
The pre-shared key is a bit sequence. To achieve quantum-level security, the key length can be anything greater than 256 bits. The classical key material is expanded to determine a QPP pad. For 256 bits of entropy, a two-qubit QPP pad requires at least 56 permutation matrices with a classical key of 256 to 448 bits. A three-qubit QPP pad requires 17 permutation matrices with a key of 256 to 408 bits. A four-qubit QPP pad needs six permutation matrices with a key of 256 to 384 bits.
Rights and permissions
About this article
Cite this article
Kuang, R., Barbeau, M. Quantum permutation pad for universal quantum-safe cryptography. Quantum Inf Process 21, 211 (2022). https://doi.org/10.1007/s11128-022-03557-y
Received:
Accepted:
Published:
Version of record:
DOI: https://doi.org/10.1007/s11128-022-03557-y