SlideShare a Scribd company logo
1 of 11
Download to read offline
The Quantum Era and Quantum Key
Distribution

© 2014 ID Quantique SA, Switzerland | page

ID Quantique PROPRIETARY
The Quantum Era: Quantum
Computing
What is quantum computing and how does it work?
❑ 
❑ 
❑ 
❑ 
❑ 
❑ 
❑ 
❑ 

Different from digital computers based on transistors
Uses quantum properties, not binary code (qubits vs. bits)
Will solve certain problems much more quickly
Huge funding for development in US, China, etc.
PKI (asymmetric keys) encryption will be dead
Available in 5 to 10 years… or sooner?
Big question on how to ensure long-term encryption of data
Solution: Quantum Cryptography (Quantum Key Distribution)

© 2014 ID Quantique SA, Switzerland | page

ID Quantique PROPRIETARY
The road to quantum computing:
Where are we now?

Fig. 1 Seven stages in the development of quantum information processing.
M H Devoret, and R J Schoelkopf Science
2013;339:1169-1174 (published by AAAS)
© 2014 ID Quantique SA, Switzerland | page

ID Quantique PROPRIETARY
When do we need to start worrying?

Time
Vulnerability
Information
Exchange

Information lifetime
(based on legal, business or strategic constraints)

Time for migration
(from a few months to several years)

© 2014 ID Quantique SA, Switzerland | page

ID Quantique PROPRIETARY
What Protection is Available Today?
❑ 
❑ 
❑ 

Classical encryption products with upgrade possibility
•  ‘Quantum Era Ready’ platforms
Quantum Random Number Generator
•  True Random Number Generator exploiting quantum physics
Quantum Key Distribution (QKD)
•  Often referred to as ‘Quantum Cryptography’
•  Technology allows one to distribute sequence of random bit whose randomness
and secrecy are guaranteed by the laws of quantum physics. These sequences
can then be used as secret keys with conventional cryptography techniques to
guarantee the confidentiality of data transmissions

© 2014 ID Quantique SA, Switzerland | page

ID Quantique PROPRIETARY
Long Term Data Protection
Quantum Computing Era

2019-2024

2016

2015

2014

2013
Conventional

© 2014 ID Quantique SA, Switzerland | page

Quantum

ID Quantique PROPRIETARY
Click to edit Master title style

QUANTUM KEY DISTRIBUTION

© 2014 ID Quantique SA, Switzerland | page

ID Quantique PROPRIETARY
Using Quantum Physics to Secure
Information
How does Quantum Key Distribution work?
❑  QKD uses the fundamental laws of nature - quantum mechanics- to guarantee highlysecure data communications
•  Generation of highly-secure encryption keys (based on IDQ quantum RNG for
high entropy)
•  Provably secure communication channel ➔ QKD reveals presence of
eavesdropping attempts
•  Provable “forward secrecy” ➔ long-term data protection with no ability to decrypt
data through brute force attacks off-line

© 2014 ID Quantique SA, Switzerland | page

ID Quantique PROPRIETARY
Classical Encryption Key Distribution
Encrypted Message
Message

Message

AES 256
Symmetric Key

Public Key
Cryptography

AES 256
Symmetric Key

Decryption key
(private)
Encryption key (public)

❑  The symmetric AES 256 bit keys used to encrypt the data must be exchanged between
the sender & receiver.
❑  This is the most vulnerable point of current encryption solutions
❑  Conventional encryption techniques (public key cryptography, like RSA) use
mathematical “one way” functions

© 2014 ID Quantique SA, Switzerland | page

ID Quantique PROPRIETARY
The Weakest Link Today: Key Distribution
Encrypted Message
Message

Message

Key

Public Key
Cryptography

Key

Decryption key
(private)
Encryption key (public)

Vulnerable to…
Quantum Computing

Theoretical Progress
Progress in fundamental mathematics and
cryptanalysis renders classical
(mathematical) public key cryptography less
secure

Increase in Computing Power
Public key cryptography can be cracked if
sufficient computing power available. Hence
increasing size of public key lengths.
http://www.keylength.com

© 2014 ID Quantique SA, Switzerland | page

ID Quantique PROPRIETARY

A quantum computer could break public
key cryptography
http://en.wikipedia.org/wiki/Shor%27s_algorithm
Quantum Key Distribution (QKD)
Classical communications

"1"

"1"

"0"

Message

Quantum communications

"0"
Fragile !
Encrypted Message

Key

Message

Key

Future-proof security guaranteed by the laws of quantum physics:
eavesdroppers can be detected (measurement introduces disturbance).
Classical communication is like a tennis game. For example, if you intercept a tennis ball, you can “read” the tennis ball.
Quantum communications is replacing that tennis ball with a bubble. If you intercept a bubble, it pops and you can’t “read” it.

© 2014 ID Quantique SA, Switzerland | page

ID Quantique PROPRIETARY

More Related Content

What's hot

iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
Amit Debnath
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
Amit Singh
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
Prabhat Goel
 

What's hot (20)

Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
 
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysCryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
 
Key management
Key managementKey management
Key management
 
Cryptography on cloud
Cryptography on cloudCryptography on cloud
Cryptography on cloud
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Cryptography
CryptographyCryptography
Cryptography
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...A Review Paper on Secure authentication and data sharing in cloud storage usi...
A Review Paper on Secure authentication and data sharing in cloud storage usi...
 
key management
 key management key management
key management
 
Encryption
EncryptionEncryption
Encryption
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Java Crypto
Java CryptoJava Crypto
Java Crypto
 

Similar to The Quantum Era & Quantum Key Distribution

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
team-WIBU
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaper
Manuel Garza
 

Similar to The Quantum Era & Quantum Key Distribution (20)

How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: The Future of Unbreakable EncryptionExploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
 
ID Quantic encryption
ID Quantic encryptionID Quantic encryption
ID Quantic encryption
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...ADVA launches world’s first commercial optical transport solution with post-q...
ADVA launches world’s first commercial optical transport solution with post-q...
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe Networks(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe Networks
 
Quantum Computers New Generation of Computers Part 9 Quantum Computers Readin...
Quantum Computers New Generation of Computers Part 9 Quantum Computers Readin...Quantum Computers New Generation of Computers Part 9 Quantum Computers Readin...
Quantum Computers New Generation of Computers Part 9 Quantum Computers Readin...
 
Quantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic ModulesQuantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic Modules
 
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019 Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
 
Crypto quantum leap web
Crypto quantum leap webCrypto quantum leap web
Crypto quantum leap web
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaper
 
Prepare For Post-Quantum Cryptography
Prepare For Post-Quantum CryptographyPrepare For Post-Quantum Cryptography
Prepare For Post-Quantum Cryptography
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

The Quantum Era & Quantum Key Distribution

  • 1. The Quantum Era and Quantum Key Distribution © 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
  • 2. The Quantum Era: Quantum Computing What is quantum computing and how does it work? ❑  ❑  ❑  ❑  ❑  ❑  ❑  ❑  Different from digital computers based on transistors Uses quantum properties, not binary code (qubits vs. bits) Will solve certain problems much more quickly Huge funding for development in US, China, etc. PKI (asymmetric keys) encryption will be dead Available in 5 to 10 years… or sooner? Big question on how to ensure long-term encryption of data Solution: Quantum Cryptography (Quantum Key Distribution) © 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
  • 3. The road to quantum computing: Where are we now? Fig. 1 Seven stages in the development of quantum information processing. M H Devoret, and R J Schoelkopf Science 2013;339:1169-1174 (published by AAAS) © 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
  • 4. When do we need to start worrying? Time Vulnerability Information Exchange Information lifetime (based on legal, business or strategic constraints) Time for migration (from a few months to several years) © 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
  • 5. What Protection is Available Today? ❑  ❑  ❑  Classical encryption products with upgrade possibility •  ‘Quantum Era Ready’ platforms Quantum Random Number Generator •  True Random Number Generator exploiting quantum physics Quantum Key Distribution (QKD) •  Often referred to as ‘Quantum Cryptography’ •  Technology allows one to distribute sequence of random bit whose randomness and secrecy are guaranteed by the laws of quantum physics. These sequences can then be used as secret keys with conventional cryptography techniques to guarantee the confidentiality of data transmissions © 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
  • 6. Long Term Data Protection Quantum Computing Era 2019-2024 2016 2015 2014 2013 Conventional © 2014 ID Quantique SA, Switzerland | page Quantum ID Quantique PROPRIETARY
  • 7. Click to edit Master title style QUANTUM KEY DISTRIBUTION © 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
  • 8. Using Quantum Physics to Secure Information How does Quantum Key Distribution work? ❑  QKD uses the fundamental laws of nature - quantum mechanics- to guarantee highlysecure data communications •  Generation of highly-secure encryption keys (based on IDQ quantum RNG for high entropy) •  Provably secure communication channel ➔ QKD reveals presence of eavesdropping attempts •  Provable “forward secrecy” ➔ long-term data protection with no ability to decrypt data through brute force attacks off-line © 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
  • 9. Classical Encryption Key Distribution Encrypted Message Message Message AES 256 Symmetric Key Public Key Cryptography AES 256 Symmetric Key Decryption key (private) Encryption key (public) ❑  The symmetric AES 256 bit keys used to encrypt the data must be exchanged between the sender & receiver. ❑  This is the most vulnerable point of current encryption solutions ❑  Conventional encryption techniques (public key cryptography, like RSA) use mathematical “one way” functions © 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
  • 10. The Weakest Link Today: Key Distribution Encrypted Message Message Message Key Public Key Cryptography Key Decryption key (private) Encryption key (public) Vulnerable to… Quantum Computing Theoretical Progress Progress in fundamental mathematics and cryptanalysis renders classical (mathematical) public key cryptography less secure Increase in Computing Power Public key cryptography can be cracked if sufficient computing power available. Hence increasing size of public key lengths. http://www.keylength.com © 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY A quantum computer could break public key cryptography http://en.wikipedia.org/wiki/Shor%27s_algorithm
  • 11. Quantum Key Distribution (QKD) Classical communications "1" "1" "0" Message Quantum communications "0" Fragile ! Encrypted Message Key Message Key Future-proof security guaranteed by the laws of quantum physics: eavesdroppers can be detected (measurement introduces disturbance). Classical communication is like a tennis game. For example, if you intercept a tennis ball, you can “read” the tennis ball. Quantum communications is replacing that tennis ball with a bubble. If you intercept a bubble, it pops and you can’t “read” it. © 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY