SlideShare a Scribd company logo
1 of 19
Quantum Computers
New Generation of Computers
PART 9
QUANTUM COMPUTERS-
READINESS PLAN
Professor Lili Saghafi
Aug. 2015
Agenda
• QUANTUM COMPUTERS-READINESS PLAN
• RSA
• RSA problem
• SSL/TLS encryption
• (RLWE) problem
2
QUANTUM COMPUTERS-READINESS
PLAN
• Since instead of just computing in a linear binary way,
with the presence or absence of an electrical charge
being converted into "bits" of zeros or ones, Quantum
Computers can take the rich quantum properties of
subatomic particles and turn them into "Qubits" that
can be both zero and one at the same time.
• Quantum Computers could potentially run simulations
and solve problems that are far too big for today's
computers.
• But there is a catch: A Quantum Computer could also
break public encryption keys used today to keep data
safe.
QUANTUM-READINESS PLAN
• Quantum-readiness plan, providing advice
about where vulnerabilities might be in the
quantum-computer era, and strategies and
tools that could be implemented now to make
any transition into that era much easier.
RSA
• RSA is one of the first practical public-key
cryptosystems and is widely used for secure data
transmission. In such a cryptosystem, the encryption key is
public and differs from the decryption key which is kept
secret.
• In RSA, this asymmetry is based on the practical difficulty
of factoring the product of two large prime numbers,
the factoring problem. RSA is made of the initial letters of
the surnames of Ron Rivest, Adi Shamir and Leonard
Adleman, w
• ho first publicly described the algorithm in 1977. Clifford
Cocks, an English mathematician, had developed an
equivalent system in 1973, but it was not declassified until
1997.
RSA problem
• RSA problem , a user of RSA creates and then
publishes a public key based on the two
large prime numbers, along with an auxiliary
value. The prime numbers must be kept secret.
• Anyone can use the public key to encrypt a
message, but with currently published methods,
if the public key is large enough, only someone
with knowledge of the prime numbers can
feasibly decode the message.
RSA problem
• Breaking RSA encryption is known as the RSA
problem; whether it is as hard as the factoring
problem, it remains an open question.
• Quantum Computers are good for Data
encryption. Code are information in very large
number 768 bite number ,RSA code broken in
2010, it can take 3 years for Digital Computers.
1024 bite code number it takes 3000 years for
Digital Computers, and for Quantum Computers
in a minute.
RSA problem
• It was once believed that Quantum Computers could
only solve problems that had underlying mathematical
structures, such as code breaking.
• However, new algorithms have emerged that could
enable Quantum Machines to solve problems in fields
as diverse as weather prediction, materials science and
artificial intelligence.
• The ability of Quantum Computers to process massive
amounts of data in a relatively short amount of time
makes them extremely interesting to the scientific
community.
SSL/TLS encryption
• Now because of security vulnerability to
Quantum Computers , websites that use the
widespread SSL/TLS encryption standard
currently tend to make use of the RSA algorithm,
which mathematician Peter Shor showed in 1994
could be easily broken by a quantum computer.
• Shor’s approach could also be used to crack
elliptic curve cryptography, another primitive
increasingly used with SSL/TLS.
(RLWE) problem
• The research focuses on building a protocol using one
of the primitives currently thought to be difficult for
quantum computers to solve, called the “ring learning
with errors” (RLWE) problem.
• Practical application of this , is by seeing how to design
a key exchange protocol that’s suitable for use in
SSL/TLS and then implementing and testing it.
• Rather than multiplying large prime numbers together
as in RSA encryption, or using points on a curve as in
elliptic curve cryptography, here the mathematical
operation is based on multiplying polynomials
together, then adding some random noise.
RLWE
• The result makes it “much harder” to crack.
• RLWE hasn’t been studied intensively enough to prove
that it would be any more secure against quantum
computers than the techniques currently in use, but
the primitive seems to be one of the better bets
currently out there.
• If after years of cryptanalytic research no one manages
to break it, then it may achieve the corresponding
levels of confidence that the research community has
in the difficulty of currently accepted problems, like
factoring or elliptic curve discrete log.
Thank you!
Great Audience
Professor Lili Saghafi
proflilisaghafi@gmail.com
© Prof. Lili Saghafi , All Rights Reserved
References, Images Credit• SAP Market Place https://websmp102.sap-ag.de/HOME#wrapper
• Forbeshttp://www.forbes.com/sites/sap/2013/10/28/how-fashion-retailer-burberry-keeps-customers-coming-back-for-more/
• Youtube
• Professor Saghafi’s blog https://sites.google.com/site/professorlilisaghafi/
• TED Talks
• TEDXtalks
• http://www.slideshare.net/lsaghafi/
• Timo Elliot
• https://sites.google.com/site/psuircb/
• http://fortune.com/
• Theoretical Physicists John Preskill and Spiros Michalakis
• Institute for Quantum Computing https://uwaterloo.ca/institute-for-quantum-computing/
• quantum physics realisation Data-Burger, scientific advisor: J. Bobroff, with the support of : Univ. Paris Sud, SFP, Triangle de la Physique, PALM, Sciences à l'Ecole,
ICAM-I2CAM
• Max Planck Institute for Physics (MPP) http://www.mpg.de/institutes
• D-Wave Systems
• References
• Frank Wilczek. Physics in 100 Years. MIT-CTP-4654, URL = http://t.co/ezfHZdriUp
• William Benzon and David G. Hays. Computational Linguistics and the Humanist. Computers and the Humanities 10: 265 – 274, 1976. URL
=https://www.academia.edu/1334653/Computational_Linguistics_and_the_Humanist
• Stanislaw Ulam. Tribute to John von Neumann, 1903-1957. Bulletin of the American Mathematical Society. Vol64, No. 3, May 1958, pp. 1-49, URL = https://docs.google.com/file/d/0B-5-
JeCa2Z7hbWcxTGsyU09HSTg/edit?pli=1
• I have already discussed this sense of singualirty in a post on 3 Quarks Daily: Redefining the Coming Singularity – It’s not what you think, URL
= http://www.3quarksdaily.com/3quarksdaily/2014/10/evolving-to-the-future-the-web-of-culture.html
• David Hays and I discuss this in a paper where we set forth a number of such far-reaching singularities in cultural evolution: William Benzon and David G. Hays. The Evolution of
Cognition. Journal of Social and Biological Structures 13(4): 297-320, 1990, URL = https://www.academia.edu/243486/The_Evolution_of_Cognition
• Neurobiology of Language – Peter Hagoort on the future of linguistics, URL =http://www.mpi.nl/departments/neurobiology-of-language/news/linguistics-quo-vadis-an-outsider-
perspective
• See, for example: Alex Mesoudi, Cultural Evolution: How Darwinian Theory Can Explain Human Culture & Synthesize the Social Sciences, Chicago: 2011.
• Lewens, Tim, “Cultural Evolution”, The Stanford Encyclopedia of Philosophy (Spring 2013 Edition), Edward N. Zalta (ed.), URL
= http://plato.stanford.edu/archives/spr2013/entries/evolution-cultural/ Cultural evolution is a major interest of mine.
• Here’s a collection of publications and working papers, URL =https://independent.academia.edu/BillBenzon/Cultural-Evolution
• Helen Epstein. Music Talks: Conversations with Musicians. McGraw-Hill Book Company, 1987, p. 52.
• [discuss these ideas in more detail in Beethoven’s Anvil, Basic Books, 2001, pp. 47-68, 192-193, 206-210, 219-221, and in
• The Magic of the Bell: How Networks of Social Actors Create Cultural Beings, Working Paper, 2015, URL
=https://www.academia.edu/11767211/The_Magic_of_the_Bell_How_Networks_of_Social_Actors_Create_Cultural_Beings
19
© Prof. Lili Saghafi , All Rights Reserved

More Related Content

What's hot

Quantum computers
Quantum   computersQuantum   computers
Quantum computersOmkar Cool
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiProfessor Lili Saghafi
 
Quantum Computers Best Awarded Presentation
Quantum Computers Best Awarded PresentationQuantum Computers Best Awarded Presentation
Quantum Computers Best Awarded PresentationGarvit Bajpai
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureVernBrownell
 
D-WaveQuantum ComputingAccess & applications via cloud deployment
D-WaveQuantum ComputingAccess & applications via cloud deploymentD-WaveQuantum ComputingAccess & applications via cloud deployment
D-WaveQuantum ComputingAccess & applications via cloud deploymentRakuten Group, Inc.
 
Quantum computing
Quantum computingQuantum computing
Quantum computingSamira Riki
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum ComputersDeepti.B
 
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiQuantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiProfessor Lili Saghafi
 
Quantum computers
Quantum computersQuantum computers
Quantum computersJAy Patel
 
Quantum computing
Quantum computingQuantum computing
Quantum computingTravisReid5
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingJonathan Tan
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum CommunicationsSrinivas Bukkuru
 
2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviterSergii Nechuiviter
 
QUANTUM COMPUTERS
QUANTUM COMPUTERSQUANTUM COMPUTERS
QUANTUM COMPUTERSJayant Raj
 

What's hot (20)

Quantum computers
Quantum   computersQuantum   computers
Quantum computers
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
 
Quantum Computers Best Awarded Presentation
Quantum Computers Best Awarded PresentationQuantum Computers Best Awarded Presentation
Quantum Computers Best Awarded Presentation
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
D-WaveQuantum ComputingAccess & applications via cloud deployment
D-WaveQuantum ComputingAccess & applications via cloud deploymentD-WaveQuantum ComputingAccess & applications via cloud deployment
D-WaveQuantum ComputingAccess & applications via cloud deployment
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
The Evolution of Quantum Computers
The Evolution of Quantum ComputersThe Evolution of Quantum Computers
The Evolution of Quantum Computers
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiQuantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum Computing ppt
Quantum Computing  pptQuantum Computing  ppt
Quantum Computing ppt
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
Quantum computing.ppt
Quantum computing.pptQuantum computing.ppt
Quantum computing.ppt
 
2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter
 
QUANTUM COMPUTERS
QUANTUM COMPUTERSQUANTUM COMPUTERS
QUANTUM COMPUTERS
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 

Viewers also liked

Research Methods in Education and Education Technology Prof Lili Saghafi Con...
Research Methods in Education and Education Technology Prof Lili Saghafi  Con...Research Methods in Education and Education Technology Prof Lili Saghafi  Con...
Research Methods in Education and Education Technology Prof Lili Saghafi Con...Professor Lili Saghafi
 
Agile Project Management By Professor Lili Saghafi
Agile Project Management By Professor Lili Saghafi Agile Project Management By Professor Lili Saghafi
Agile Project Management By Professor Lili Saghafi Professor Lili Saghafi
 
Big data and Predictive Analytics By : Professor Lili Saghafi
Big data and Predictive Analytics By : Professor Lili SaghafiBig data and Predictive Analytics By : Professor Lili Saghafi
Big data and Predictive Analytics By : Professor Lili SaghafiProfessor Lili Saghafi
 
Nanotech presentation
Nanotech presentationNanotech presentation
Nanotech presentationjayly03
 
Nanotechnology: Basic introduction to the nanotechnology.
Nanotechnology: Basic introduction to the nanotechnology.Nanotechnology: Basic introduction to the nanotechnology.
Nanotechnology: Basic introduction to the nanotechnology.Sathya Sujani
 
Nanotechnology
NanotechnologyNanotechnology
NanotechnologyKANNAN
 
NANOTECHNOLOGY AND IT'S APPLICATIONS
NANOTECHNOLOGY AND IT'S APPLICATIONSNANOTECHNOLOGY AND IT'S APPLICATIONS
NANOTECHNOLOGY AND IT'S APPLICATIONSCHINMOY PAUL
 

Viewers also liked (10)

Research Methods in Education and Education Technology Prof Lili Saghafi Con...
Research Methods in Education and Education Technology Prof Lili Saghafi  Con...Research Methods in Education and Education Technology Prof Lili Saghafi  Con...
Research Methods in Education and Education Technology Prof Lili Saghafi Con...
 
Agile Project Management By Professor Lili Saghafi
Agile Project Management By Professor Lili Saghafi Agile Project Management By Professor Lili Saghafi
Agile Project Management By Professor Lili Saghafi
 
QUANTUM COMP 22
QUANTUM COMP 22QUANTUM COMP 22
QUANTUM COMP 22
 
Big data and Predictive Analytics By : Professor Lili Saghafi
Big data and Predictive Analytics By : Professor Lili SaghafiBig data and Predictive Analytics By : Professor Lili Saghafi
Big data and Predictive Analytics By : Professor Lili Saghafi
 
Nanotech presentation
Nanotech presentationNanotech presentation
Nanotech presentation
 
Nanotechnology: Basic introduction to the nanotechnology.
Nanotechnology: Basic introduction to the nanotechnology.Nanotechnology: Basic introduction to the nanotechnology.
Nanotechnology: Basic introduction to the nanotechnology.
 
Nano technology
Nano technologyNano technology
Nano technology
 
Nanotechnology
NanotechnologyNanotechnology
Nanotechnology
 
Nanotechnology ppt
Nanotechnology pptNanotechnology ppt
Nanotechnology ppt
 
NANOTECHNOLOGY AND IT'S APPLICATIONS
NANOTECHNOLOGY AND IT'S APPLICATIONSNANOTECHNOLOGY AND IT'S APPLICATIONS
NANOTECHNOLOGY AND IT'S APPLICATIONS
 

Similar to Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan

Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING                .docxRunning head QUANTUM COMPUTINGQUANTUM COMPUTING                .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docxcharisellington63520
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Milos Dunjic
 
Quantum Secured Blockchain
Quantum Secured BlockchainQuantum Secured Blockchain
Quantum Secured Blockchainravi sahal
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsDaniel Austin
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12Arindam Paul
 
Implication of rh and qc on information security sharad nalawade(author)
Implication of rh and qc on information security sharad nalawade(author)Implication of rh and qc on information security sharad nalawade(author)
Implication of rh and qc on information security sharad nalawade(author)Priyanka Aash
 
5 Reasons Why You Should Learn About Quantum Technologies.pptx
5 Reasons Why You Should Learn About Quantum Technologies.pptx5 Reasons Why You Should Learn About Quantum Technologies.pptx
5 Reasons Why You Should Learn About Quantum Technologies.pptxRosaTarekAyyash
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxRohanTakke
 
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forQuantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forCheapSSLsecurity
 
The Internet-of-things: Architecting for the deluge of data
The Internet-of-things: Architecting for the deluge of dataThe Internet-of-things: Architecting for the deluge of data
The Internet-of-things: Architecting for the deluge of databcantrill
 
ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperManuel Garza
 
01 introduction to cloud computing technology
01 introduction to cloud computing technology01 introduction to cloud computing technology
01 introduction to cloud computing technologyNan Sheng
 
北航云计算公开课01 introduction to cloud computing technology
北航云计算公开课01 introduction to cloud computing technology北航云计算公开课01 introduction to cloud computing technology
北航云计算公开课01 introduction to cloud computing technologyyhz87
 
Web History 101, or How the Future is Unwritten
Web History 101, or How the Future is UnwrittenWeb History 101, or How the Future is Unwritten
Web History 101, or How the Future is UnwrittenBookNet Canada
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentationVinayak Suresh
 
The Quantum Era & Quantum Key Distribution
The Quantum Era & Quantum Key Distribution The Quantum Era & Quantum Key Distribution
The Quantum Era & Quantum Key Distribution IDQuantique
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networksSabarishSanjeevi
 
RTC 2017 - The Power of Parallelism
RTC 2017 - The Power of ParallelismRTC 2017 - The Power of Parallelism
RTC 2017 - The Power of ParallelismRakuten Group, Inc.
 

Similar to Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan (20)

Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING                .docxRunning head QUANTUM COMPUTINGQUANTUM COMPUTING                .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
 
Quantum Secured Blockchain
Quantum Secured BlockchainQuantum Secured Blockchain
Quantum Secured Blockchain
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
Implication of rh and qc on information security sharad nalawade(author)
Implication of rh and qc on information security sharad nalawade(author)Implication of rh and qc on information security sharad nalawade(author)
Implication of rh and qc on information security sharad nalawade(author)
 
5 Reasons Why You Should Learn About Quantum Technologies.pptx
5 Reasons Why You Should Learn About Quantum Technologies.pptx5 Reasons Why You Should Learn About Quantum Technologies.pptx
5 Reasons Why You Should Learn About Quantum Technologies.pptx
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forQuantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out for
 
The Internet-of-things: Architecting for the deluge of data
The Internet-of-things: Architecting for the deluge of dataThe Internet-of-things: Architecting for the deluge of data
The Internet-of-things: Architecting for the deluge of data
 
ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaper
 
01 introduction to cloud computing technology
01 introduction to cloud computing technology01 introduction to cloud computing technology
01 introduction to cloud computing technology
 
北航云计算公开课01 introduction to cloud computing technology
北航云计算公开课01 introduction to cloud computing technology北航云计算公开课01 introduction to cloud computing technology
北航云计算公开课01 introduction to cloud computing technology
 
Web History 101, or How the Future is Unwritten
Web History 101, or How the Future is UnwrittenWeb History 101, or How the Future is Unwritten
Web History 101, or How the Future is Unwritten
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
Big data business case
Big data   business caseBig data   business case
Big data business case
 
The Quantum Era & Quantum Key Distribution
The Quantum Era & Quantum Key Distribution The Quantum Era & Quantum Key Distribution
The Quantum Era & Quantum Key Distribution
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networks
 
RTC 2017 - The Power of Parallelism
RTC 2017 - The Power of ParallelismRTC 2017 - The Power of Parallelism
RTC 2017 - The Power of Parallelism
 

More from Professor Lili Saghafi

Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data,  By : Prof. Lili SaghafiArtificial Intelligence and the importance of Data,  By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data, By : Prof. Lili SaghafiProfessor Lili Saghafi
 
Introduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: FundamentalsIntroduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: FundamentalsProfessor Lili Saghafi
 
Software Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili SaghafiSoftware Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili SaghafiProfessor Lili Saghafi
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiProfessor Lili Saghafi
 
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Professor Lili Saghafi
 
Introduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili SaghafiIntroduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili SaghafiProfessor Lili Saghafi
 
Introduction to Blockchain Technology By Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili SaghafiIntroduction to Blockchain Technology By Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili SaghafiProfessor Lili Saghafi
 
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Professor Lili Saghafi
 
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Professor Lili Saghafi
 
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili SaghafiMachine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili SaghafiProfessor Lili Saghafi
 
Machine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili SaghafiMachine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili SaghafiProfessor Lili Saghafi
 
What is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili SaghafiWhat is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili SaghafiProfessor Lili Saghafi
 
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiEffective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiProfessor Lili Saghafi
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiProfessor Lili Saghafi
 
Data Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili SaghafiData Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili SaghafiProfessor Lili Saghafi
 
Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Professor Lili Saghafi
 
Data Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili SaghafiData Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili SaghafiProfessor Lili Saghafi
 
New Assessments in Higher Education with Computers by: Prof Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi New Assessments in Higher Education with Computers by: Prof Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi Professor Lili Saghafi
 

More from Professor Lili Saghafi (20)

Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data,  By : Prof. Lili SaghafiArtificial Intelligence and the importance of Data,  By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Ai
AiAi
Ai
 
Introduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: FundamentalsIntroduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: Fundamentals
 
Software Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili SaghafiSoftware Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili Saghafi
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
 
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
 
Introduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili SaghafiIntroduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili Saghafi
 
Introduction to Blockchain Technology By Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili SaghafiIntroduction to Blockchain Technology By Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili Saghafi
 
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
 
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
 
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili SaghafiMachine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
 
Machine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili SaghafiMachine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili Saghafi
 
What is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili SaghafiWhat is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili Saghafi
 
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiEffective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
Data Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili SaghafiData Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili Saghafi
 
Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi
 
Data Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili SaghafiData Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili Saghafi
 
New Assessments in Higher Education with Computers by: Prof Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi New Assessments in Higher Education with Computers by: Prof Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi
 

Recently uploaded

SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan

  • 1. Quantum Computers New Generation of Computers PART 9 QUANTUM COMPUTERS- READINESS PLAN Professor Lili Saghafi Aug. 2015
  • 2. Agenda • QUANTUM COMPUTERS-READINESS PLAN • RSA • RSA problem • SSL/TLS encryption • (RLWE) problem 2
  • 3. QUANTUM COMPUTERS-READINESS PLAN • Since instead of just computing in a linear binary way, with the presence or absence of an electrical charge being converted into "bits" of zeros or ones, Quantum Computers can take the rich quantum properties of subatomic particles and turn them into "Qubits" that can be both zero and one at the same time. • Quantum Computers could potentially run simulations and solve problems that are far too big for today's computers. • But there is a catch: A Quantum Computer could also break public encryption keys used today to keep data safe.
  • 4.
  • 5. QUANTUM-READINESS PLAN • Quantum-readiness plan, providing advice about where vulnerabilities might be in the quantum-computer era, and strategies and tools that could be implemented now to make any transition into that era much easier.
  • 6. RSA • RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. • In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, w • ho first publicly described the algorithm in 1977. Clifford Cocks, an English mathematician, had developed an equivalent system in 1973, but it was not declassified until 1997.
  • 7.
  • 8. RSA problem • RSA problem , a user of RSA creates and then publishes a public key based on the two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. • Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime numbers can feasibly decode the message.
  • 9.
  • 10. RSA problem • Breaking RSA encryption is known as the RSA problem; whether it is as hard as the factoring problem, it remains an open question. • Quantum Computers are good for Data encryption. Code are information in very large number 768 bite number ,RSA code broken in 2010, it can take 3 years for Digital Computers. 1024 bite code number it takes 3000 years for Digital Computers, and for Quantum Computers in a minute.
  • 11. RSA problem • It was once believed that Quantum Computers could only solve problems that had underlying mathematical structures, such as code breaking. • However, new algorithms have emerged that could enable Quantum Machines to solve problems in fields as diverse as weather prediction, materials science and artificial intelligence. • The ability of Quantum Computers to process massive amounts of data in a relatively short amount of time makes them extremely interesting to the scientific community.
  • 12.
  • 13. SSL/TLS encryption • Now because of security vulnerability to Quantum Computers , websites that use the widespread SSL/TLS encryption standard currently tend to make use of the RSA algorithm, which mathematician Peter Shor showed in 1994 could be easily broken by a quantum computer. • Shor’s approach could also be used to crack elliptic curve cryptography, another primitive increasingly used with SSL/TLS.
  • 14. (RLWE) problem • The research focuses on building a protocol using one of the primitives currently thought to be difficult for quantum computers to solve, called the “ring learning with errors” (RLWE) problem. • Practical application of this , is by seeing how to design a key exchange protocol that’s suitable for use in SSL/TLS and then implementing and testing it. • Rather than multiplying large prime numbers together as in RSA encryption, or using points on a curve as in elliptic curve cryptography, here the mathematical operation is based on multiplying polynomials together, then adding some random noise.
  • 15.
  • 16. RLWE • The result makes it “much harder” to crack. • RLWE hasn’t been studied intensively enough to prove that it would be any more secure against quantum computers than the techniques currently in use, but the primitive seems to be one of the better bets currently out there. • If after years of cryptanalytic research no one manages to break it, then it may achieve the corresponding levels of confidence that the research community has in the difficulty of currently accepted problems, like factoring or elliptic curve discrete log.
  • 17.
  • 18. Thank you! Great Audience Professor Lili Saghafi proflilisaghafi@gmail.com © Prof. Lili Saghafi , All Rights Reserved
  • 19. References, Images Credit• SAP Market Place https://websmp102.sap-ag.de/HOME#wrapper • Forbeshttp://www.forbes.com/sites/sap/2013/10/28/how-fashion-retailer-burberry-keeps-customers-coming-back-for-more/ • Youtube • Professor Saghafi’s blog https://sites.google.com/site/professorlilisaghafi/ • TED Talks • TEDXtalks • http://www.slideshare.net/lsaghafi/ • Timo Elliot • https://sites.google.com/site/psuircb/ • http://fortune.com/ • Theoretical Physicists John Preskill and Spiros Michalakis • Institute for Quantum Computing https://uwaterloo.ca/institute-for-quantum-computing/ • quantum physics realisation Data-Burger, scientific advisor: J. Bobroff, with the support of : Univ. Paris Sud, SFP, Triangle de la Physique, PALM, Sciences à l'Ecole, ICAM-I2CAM • Max Planck Institute for Physics (MPP) http://www.mpg.de/institutes • D-Wave Systems • References • Frank Wilczek. Physics in 100 Years. MIT-CTP-4654, URL = http://t.co/ezfHZdriUp • William Benzon and David G. Hays. Computational Linguistics and the Humanist. Computers and the Humanities 10: 265 – 274, 1976. URL =https://www.academia.edu/1334653/Computational_Linguistics_and_the_Humanist • Stanislaw Ulam. Tribute to John von Neumann, 1903-1957. Bulletin of the American Mathematical Society. Vol64, No. 3, May 1958, pp. 1-49, URL = https://docs.google.com/file/d/0B-5- JeCa2Z7hbWcxTGsyU09HSTg/edit?pli=1 • I have already discussed this sense of singualirty in a post on 3 Quarks Daily: Redefining the Coming Singularity – It’s not what you think, URL = http://www.3quarksdaily.com/3quarksdaily/2014/10/evolving-to-the-future-the-web-of-culture.html • David Hays and I discuss this in a paper where we set forth a number of such far-reaching singularities in cultural evolution: William Benzon and David G. Hays. The Evolution of Cognition. Journal of Social and Biological Structures 13(4): 297-320, 1990, URL = https://www.academia.edu/243486/The_Evolution_of_Cognition • Neurobiology of Language – Peter Hagoort on the future of linguistics, URL =http://www.mpi.nl/departments/neurobiology-of-language/news/linguistics-quo-vadis-an-outsider- perspective • See, for example: Alex Mesoudi, Cultural Evolution: How Darwinian Theory Can Explain Human Culture & Synthesize the Social Sciences, Chicago: 2011. • Lewens, Tim, “Cultural Evolution”, The Stanford Encyclopedia of Philosophy (Spring 2013 Edition), Edward N. Zalta (ed.), URL = http://plato.stanford.edu/archives/spr2013/entries/evolution-cultural/ Cultural evolution is a major interest of mine. • Here’s a collection of publications and working papers, URL =https://independent.academia.edu/BillBenzon/Cultural-Evolution • Helen Epstein. Music Talks: Conversations with Musicians. McGraw-Hill Book Company, 1987, p. 52. • [discuss these ideas in more detail in Beethoven’s Anvil, Basic Books, 2001, pp. 47-68, 192-193, 206-210, 219-221, and in • The Magic of the Bell: How Networks of Social Actors Create Cultural Beings, Working Paper, 2015, URL =https://www.academia.edu/11767211/The_Magic_of_the_Bell_How_Networks_of_Social_Actors_Create_Cultural_Beings 19 © Prof. Lili Saghafi , All Rights Reserved