Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and How to Solve It

32 views

Published on

Chicago CyberSecurity January 2020

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and How to Solve It

  1. 1. CAMBRIDGE QUANTUM COMPUTING The Need for Certifiable Quantum Encryption and How to Solve it Mark Jackson, Ph.D. January 2020
  2. 2. 1) Post-quantum Encryption Algorithms 2) Quantum Communication 3) Certifiably Secure Key Generation Outline
  3. 3. Bit becomes Quantum Bit Bit Qubit Until we measure a qubit, it is in a “superposition” of being both a 1 and 0
  4. 4. In 1994 Peter Shor discovered a very important quantum program: decomposing integers into its prime factors Shor’s Algorithm 433 x 937 = 405,721 easy (multiplying) hard (factoring)
  5. 5. 99% of online encryption} Post-Quantum Encryption } 26 Candidates Announced by NIST in January 2019
  6. 6. Quantum Annealing: The New Threat to Cybersecurity
  7. 7. April 2019: Chinese Claim to Use Annealing for Decryption
  8. 8. Annealing: Hacking Within ~5 years? Credit: Fujitsu
  9. 9. Urgency: Mosca’s Inequality TIME TO TRANSITION TO QUANTUM ENCRYPTION TIME WISHED FOR DATA TO BE SECURE TIME FOR PROCESSORS TO BREACH CLASSICAL ENCRYPTION Time DANGER Don’t wait - upgrade your encryption now!
  10. 10. Quantum Communication
  11. 11. QKD Credit: Center for Quantum Technologies, Singapore Absolute Security through Quantum Entanglement
  12. 12. Creating a Quantum Network Works up to about ~100 km Similar networks being built in
 China, Switzerland, UK, and NYC
  13. 13. A Few Months Ago in the Washington Post Credit: (l) Jeanne Whalen and Daniel Hertzberg for The Washington Post; (r) Defense Systems August 2016: Micius Satellite
  14. 14. Last Month in the Washington Post
  15. 15. Start with a Secure Base Certifiable
 Random Numbers Post-Quantum
 Encryption Algorithms Cybersecurity Infrastructure
  16. 16. (Pseudo)Random Keys Can Be Hacked June 2017
  17. 17. Example: Heartbleed • In 2014 a vulnerability was discovered in the OpenSSL cryptographic library, making secret keys accessible • This allowed attackers to eavesdrop on communications, steal data, and impersonate from services and users
  18. 18. What is a Certifiable Random Number? • Cannot be predicted • Cannot be known by anyone else
  19. 19. RNG needed for QKD
  20. 20. Agility Shim Policy Server IronBridge (Remote) Crypto Libraries REST, PKCS#11, ICFS… Post Quantum Crypto. CQC Cryptographic / Engineering Team Client Infrastructure Customer Environment API Enforce Policies for Cryptographic Standards On-Premise Deployment Cloud Deployment IronBridgeTM Deployment US Patent Pending
  21. 21. Conclusion and Forecast Now 5 years 10 years Quantum
 Computers
 Exist Advantage from
 Financial
 Algorithms Quantum
 Encryption
 Exists Hacking
 possible from
 Quantum
 Computers Quantum
 Computers
 Fully
 Integrated Hacking
 likely from
 Quantum
 Computers
  22. 22. Q&A

×