More Related Content
Similar to The Quantum Era & Quantum Key Distribution (20)
The Quantum Era & Quantum Key Distribution
- 1. The Quantum Era and Quantum Key
Distribution
© 2014 ID Quantique SA, Switzerland | page
ID Quantique PROPRIETARY
- 2. The Quantum Era: Quantum
Computing
What is quantum computing and how does it work?
❑
❑
❑
❑
❑
❑
❑
❑
Different from digital computers based on transistors
Uses quantum properties, not binary code (qubits vs. bits)
Will solve certain problems much more quickly
Huge funding for development in US, China, etc.
PKI (asymmetric keys) encryption will be dead
Available in 5 to 10 years… or sooner?
Big question on how to ensure long-term encryption of data
Solution: Quantum Cryptography (Quantum Key Distribution)
© 2014 ID Quantique SA, Switzerland | page
ID Quantique PROPRIETARY
- 3. The road to quantum computing:
Where are we now?
Fig. 1 Seven stages in the development of quantum information processing.
M H Devoret, and R J Schoelkopf Science
2013;339:1169-1174 (published by AAAS)
© 2014 ID Quantique SA, Switzerland | page
ID Quantique PROPRIETARY
- 4. When do we need to start worrying?
Time
Vulnerability
Information
Exchange
Information lifetime
(based on legal, business or strategic constraints)
Time for migration
(from a few months to several years)
© 2014 ID Quantique SA, Switzerland | page
ID Quantique PROPRIETARY
- 5. What Protection is Available Today?
❑
❑
❑
Classical encryption products with upgrade possibility
• ‘Quantum Era Ready’ platforms
Quantum Random Number Generator
• True Random Number Generator exploiting quantum physics
Quantum Key Distribution (QKD)
• Often referred to as ‘Quantum Cryptography’
• Technology allows one to distribute sequence of random bit whose randomness
and secrecy are guaranteed by the laws of quantum physics. These sequences
can then be used as secret keys with conventional cryptography techniques to
guarantee the confidentiality of data transmissions
© 2014 ID Quantique SA, Switzerland | page
ID Quantique PROPRIETARY
- 6. Long Term Data Protection
Quantum Computing Era
2019-2024
2016
2015
2014
2013
Conventional
© 2014 ID Quantique SA, Switzerland | page
Quantum
ID Quantique PROPRIETARY
- 7. Click to edit Master title style
QUANTUM KEY DISTRIBUTION
© 2014 ID Quantique SA, Switzerland | page
ID Quantique PROPRIETARY
- 8. Using Quantum Physics to Secure
Information
How does Quantum Key Distribution work?
❑ QKD uses the fundamental laws of nature - quantum mechanics- to guarantee highlysecure data communications
• Generation of highly-secure encryption keys (based on IDQ quantum RNG for
high entropy)
• Provably secure communication channel ➔ QKD reveals presence of
eavesdropping attempts
• Provable “forward secrecy” ➔ long-term data protection with no ability to decrypt
data through brute force attacks off-line
© 2014 ID Quantique SA, Switzerland | page
ID Quantique PROPRIETARY
- 9. Classical Encryption Key Distribution
Encrypted Message
Message
Message
AES 256
Symmetric Key
Public Key
Cryptography
AES 256
Symmetric Key
Decryption key
(private)
Encryption key (public)
❑ The symmetric AES 256 bit keys used to encrypt the data must be exchanged between
the sender & receiver.
❑ This is the most vulnerable point of current encryption solutions
❑ Conventional encryption techniques (public key cryptography, like RSA) use
mathematical “one way” functions
© 2014 ID Quantique SA, Switzerland | page
ID Quantique PROPRIETARY
- 10. The Weakest Link Today: Key Distribution
Encrypted Message
Message
Message
Key
Public Key
Cryptography
Key
Decryption key
(private)
Encryption key (public)
Vulnerable to…
Quantum Computing
Theoretical Progress
Progress in fundamental mathematics and
cryptanalysis renders classical
(mathematical) public key cryptography less
secure
Increase in Computing Power
Public key cryptography can be cracked if
sufficient computing power available. Hence
increasing size of public key lengths.
http://www.keylength.com
© 2014 ID Quantique SA, Switzerland | page
ID Quantique PROPRIETARY
A quantum computer could break public
key cryptography
http://en.wikipedia.org/wiki/Shor%27s_algorithm
- 11. Quantum Key Distribution (QKD)
Classical communications
"1"
"1"
"0"
Message
Quantum communications
"0"
Fragile !
Encrypted Message
Key
Message
Key
Future-proof security guaranteed by the laws of quantum physics:
eavesdroppers can be detected (measurement introduces disturbance).
Classical communication is like a tennis game. For example, if you intercept a tennis ball, you can “read” the tennis ball.
Quantum communications is replacing that tennis ball with a bubble. If you intercept a bubble, it pops and you can’t “read” it.
© 2014 ID Quantique SA, Switzerland | page
ID Quantique PROPRIETARY