SlideShare a Scribd company logo
1 of 19
Quantum Computers
New Generation of Computers
PART 9
QUANTUM COMPUTERS-
READINESS PLAN
Professor Lili Saghafi
Aug. 2015
Agenda
• QUANTUM COMPUTERS-READINESS PLAN
• RSA
• RSA problem
• SSL/TLS encryption
• (RLWE) problem
2
QUANTUM COMPUTERS-READINESS
PLAN
• Since instead of just computing in a linear binary way,
with the presence or absence of an electrical charge
being converted into "bits" of zeros or ones, Quantum
Computers can take the rich quantum properties of
subatomic particles and turn them into "Qubits" that
can be both zero and one at the same time.
• Quantum Computers could potentially run simulations
and solve problems that are far too big for today's
computers.
• But there is a catch: A Quantum Computer could also
break public encryption keys used today to keep data
safe.
QUANTUM-READINESS PLAN
• Quantum-readiness plan, providing advice
about where vulnerabilities might be in the
quantum-computer era, and strategies and
tools that could be implemented now to make
any transition into that era much easier.
RSA
• RSA is one of the first practical public-key
cryptosystems and is widely used for secure data
transmission. In such a cryptosystem, the encryption key is
public and differs from the decryption key which is kept
secret.
• In RSA, this asymmetry is based on the practical difficulty
of factoring the product of two large prime numbers,
the factoring problem. RSA is made of the initial letters of
the surnames of Ron Rivest, Adi Shamir and Leonard
Adleman, w
• ho first publicly described the algorithm in 1977. Clifford
Cocks, an English mathematician, had developed an
equivalent system in 1973, but it was not declassified until
1997.
RSA problem
• RSA problem , a user of RSA creates and then
publishes a public key based on the two
large prime numbers, along with an auxiliary
value. The prime numbers must be kept secret.
• Anyone can use the public key to encrypt a
message, but with currently published methods,
if the public key is large enough, only someone
with knowledge of the prime numbers can
feasibly decode the message.
RSA problem
• Breaking RSA encryption is known as the RSA
problem; whether it is as hard as the factoring
problem, it remains an open question.
• Quantum Computers are good for Data
encryption. Code are information in very large
number 768 bite number ,RSA code broken in
2010, it can take 3 years for Digital Computers.
1024 bite code number it takes 3000 years for
Digital Computers, and for Quantum Computers
in a minute.
RSA problem
• It was once believed that Quantum Computers could
only solve problems that had underlying mathematical
structures, such as code breaking.
• However, new algorithms have emerged that could
enable Quantum Machines to solve problems in fields
as diverse as weather prediction, materials science and
artificial intelligence.
• The ability of Quantum Computers to process massive
amounts of data in a relatively short amount of time
makes them extremely interesting to the scientific
community.
SSL/TLS encryption
• Now because of security vulnerability to
Quantum Computers , websites that use the
widespread SSL/TLS encryption standard
currently tend to make use of the RSA algorithm,
which mathematician Peter Shor showed in 1994
could be easily broken by a quantum computer.
• Shor’s approach could also be used to crack
elliptic curve cryptography, another primitive
increasingly used with SSL/TLS.
(RLWE) problem
• The research focuses on building a protocol using one
of the primitives currently thought to be difficult for
quantum computers to solve, called the “ring learning
with errors” (RLWE) problem.
• Practical application of this , is by seeing how to design
a key exchange protocol that’s suitable for use in
SSL/TLS and then implementing and testing it.
• Rather than multiplying large prime numbers together
as in RSA encryption, or using points on a curve as in
elliptic curve cryptography, here the mathematical
operation is based on multiplying polynomials
together, then adding some random noise.
RLWE
• The result makes it “much harder” to crack.
• RLWE hasn’t been studied intensively enough to prove
that it would be any more secure against quantum
computers than the techniques currently in use, but
the primitive seems to be one of the better bets
currently out there.
• If after years of cryptanalytic research no one manages
to break it, then it may achieve the corresponding
levels of confidence that the research community has
in the difficulty of currently accepted problems, like
factoring or elliptic curve discrete log.
Thank you!
Great Audience
Professor Lili Saghafi
proflilisaghafi@gmail.com
© Prof. Lili Saghafi , All Rights Reserved
References, Images Credit• SAP Market Place https://websmp102.sap-ag.de/HOME#wrapper
• Forbeshttp://www.forbes.com/sites/sap/2013/10/28/how-fashion-retailer-burberry-keeps-customers-coming-back-for-more/
• Youtube
• Professor Saghafi’s blog https://sites.google.com/site/professorlilisaghafi/
• TED Talks
• TEDXtalks
• http://www.slideshare.net/lsaghafi/
• Timo Elliot
• https://sites.google.com/site/psuircb/
• http://fortune.com/
• Theoretical Physicists John Preskill and Spiros Michalakis
• Institute for Quantum Computing https://uwaterloo.ca/institute-for-quantum-computing/
• quantum physics realisation Data-Burger, scientific advisor: J. Bobroff, with the support of : Univ. Paris Sud, SFP, Triangle de la Physique, PALM, Sciences à l'Ecole,
ICAM-I2CAM
• Max Planck Institute for Physics (MPP) http://www.mpg.de/institutes
• D-Wave Systems
• References
• Frank Wilczek. Physics in 100 Years. MIT-CTP-4654, URL = http://t.co/ezfHZdriUp
• William Benzon and David G. Hays. Computational Linguistics and the Humanist. Computers and the Humanities 10: 265 – 274, 1976. URL
=https://www.academia.edu/1334653/Computational_Linguistics_and_the_Humanist
• Stanislaw Ulam. Tribute to John von Neumann, 1903-1957. Bulletin of the American Mathematical Society. Vol64, No. 3, May 1958, pp. 1-49, URL = https://docs.google.com/file/d/0B-5-
JeCa2Z7hbWcxTGsyU09HSTg/edit?pli=1
• I have already discussed this sense of singualirty in a post on 3 Quarks Daily: Redefining the Coming Singularity – It’s not what you think, URL
= http://www.3quarksdaily.com/3quarksdaily/2014/10/evolving-to-the-future-the-web-of-culture.html
• David Hays and I discuss this in a paper where we set forth a number of such far-reaching singularities in cultural evolution: William Benzon and David G. Hays. The Evolution of
Cognition. Journal of Social and Biological Structures 13(4): 297-320, 1990, URL = https://www.academia.edu/243486/The_Evolution_of_Cognition
• Neurobiology of Language – Peter Hagoort on the future of linguistics, URL =http://www.mpi.nl/departments/neurobiology-of-language/news/linguistics-quo-vadis-an-outsider-
perspective
• See, for example: Alex Mesoudi, Cultural Evolution: How Darwinian Theory Can Explain Human Culture & Synthesize the Social Sciences, Chicago: 2011.
• Lewens, Tim, “Cultural Evolution”, The Stanford Encyclopedia of Philosophy (Spring 2013 Edition), Edward N. Zalta (ed.), URL
= http://plato.stanford.edu/archives/spr2013/entries/evolution-cultural/ Cultural evolution is a major interest of mine.
• Here’s a collection of publications and working papers, URL =https://independent.academia.edu/BillBenzon/Cultural-Evolution
• Helen Epstein. Music Talks: Conversations with Musicians. McGraw-Hill Book Company, 1987, p. 52.
• [discuss these ideas in more detail in Beethoven’s Anvil, Basic Books, 2001, pp. 47-68, 192-193, 206-210, 219-221, and in
• The Magic of the Bell: How Networks of Social Actors Create Cultural Beings, Working Paper, 2015, URL
=https://www.academia.edu/11767211/The_Magic_of_the_Bell_How_Networks_of_Social_Actors_Create_Cultural_Beings
19
© Prof. Lili Saghafi , All Rights Reserved

More Related Content

What's hot

2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter
Sergii Nechuiviter
 

What's hot (20)

Quantum computers
Quantum   computersQuantum   computers
Quantum computers
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
 
Quantum Computers Best Awarded Presentation
Quantum Computers Best Awarded PresentationQuantum Computers Best Awarded Presentation
Quantum Computers Best Awarded Presentation
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
D-WaveQuantum ComputingAccess & applications via cloud deployment
D-WaveQuantum ComputingAccess & applications via cloud deploymentD-WaveQuantum ComputingAccess & applications via cloud deployment
D-WaveQuantum ComputingAccess & applications via cloud deployment
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
The Evolution of Quantum Computers
The Evolution of Quantum ComputersThe Evolution of Quantum Computers
The Evolution of Quantum Computers
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiQuantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum Computing ppt
Quantum Computing  pptQuantum Computing  ppt
Quantum Computing ppt
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
Quantum computing.ppt
Quantum computing.pptQuantum computing.ppt
Quantum computing.ppt
 
2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter2013.09.13 quantum computing has arrived s.nechuiviter
2013.09.13 quantum computing has arrived s.nechuiviter
 
QUANTUM COMPUTERS
QUANTUM COMPUTERSQUANTUM COMPUTERS
QUANTUM COMPUTERS
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 

Viewers also liked

Nanotech presentation
Nanotech presentationNanotech presentation
Nanotech presentation
jayly03
 

Viewers also liked (10)

Research Methods in Education and Education Technology Prof Lili Saghafi Con...
Research Methods in Education and Education Technology Prof Lili Saghafi  Con...Research Methods in Education and Education Technology Prof Lili Saghafi  Con...
Research Methods in Education and Education Technology Prof Lili Saghafi Con...
 
Agile Project Management By Professor Lili Saghafi
Agile Project Management By Professor Lili Saghafi Agile Project Management By Professor Lili Saghafi
Agile Project Management By Professor Lili Saghafi
 
QUANTUM COMP 22
QUANTUM COMP 22QUANTUM COMP 22
QUANTUM COMP 22
 
Big data and Predictive Analytics By : Professor Lili Saghafi
Big data and Predictive Analytics By : Professor Lili SaghafiBig data and Predictive Analytics By : Professor Lili Saghafi
Big data and Predictive Analytics By : Professor Lili Saghafi
 
Nanotech presentation
Nanotech presentationNanotech presentation
Nanotech presentation
 
Nanotechnology: Basic introduction to the nanotechnology.
Nanotechnology: Basic introduction to the nanotechnology.Nanotechnology: Basic introduction to the nanotechnology.
Nanotechnology: Basic introduction to the nanotechnology.
 
Nano technology
Nano technologyNano technology
Nano technology
 
Nanotechnology
NanotechnologyNanotechnology
Nanotechnology
 
Nanotechnology ppt
Nanotechnology pptNanotechnology ppt
Nanotechnology ppt
 
NANOTECHNOLOGY AND IT'S APPLICATIONS
NANOTECHNOLOGY AND IT'S APPLICATIONSNANOTECHNOLOGY AND IT'S APPLICATIONS
NANOTECHNOLOGY AND IT'S APPLICATIONS
 

Similar to Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan

Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING                .docxRunning head QUANTUM COMPUTINGQUANTUM COMPUTING                .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
charisellington63520
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
Arindam Paul
 
ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaper
Manuel Garza
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
Vinayak Suresh
 

Similar to Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan (20)

Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING                .docxRunning head QUANTUM COMPUTINGQUANTUM COMPUTING                .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
 
Quantum Secured Blockchain
Quantum Secured BlockchainQuantum Secured Blockchain
Quantum Secured Blockchain
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
Implication of rh and qc on information security sharad nalawade(author)
Implication of rh and qc on information security sharad nalawade(author)Implication of rh and qc on information security sharad nalawade(author)
Implication of rh and qc on information security sharad nalawade(author)
 
5 Reasons Why You Should Learn About Quantum Technologies.pptx
5 Reasons Why You Should Learn About Quantum Technologies.pptx5 Reasons Why You Should Learn About Quantum Technologies.pptx
5 Reasons Why You Should Learn About Quantum Technologies.pptx
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forQuantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out for
 
The Internet-of-things: Architecting for the deluge of data
The Internet-of-things: Architecting for the deluge of dataThe Internet-of-things: Architecting for the deluge of data
The Internet-of-things: Architecting for the deluge of data
 
ITNW 2164 ResearchPaper
ITNW 2164 ResearchPaperITNW 2164 ResearchPaper
ITNW 2164 ResearchPaper
 
01 introduction to cloud computing technology
01 introduction to cloud computing technology01 introduction to cloud computing technology
01 introduction to cloud computing technology
 
北航云计算公开课01 introduction to cloud computing technology
北航云计算公开课01 introduction to cloud computing technology北航云计算公开课01 introduction to cloud computing technology
北航云计算公开课01 introduction to cloud computing technology
 
Web History 101, or How the Future is Unwritten
Web History 101, or How the Future is UnwrittenWeb History 101, or How the Future is Unwritten
Web History 101, or How the Future is Unwritten
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
Big data business case
Big data   business caseBig data   business case
Big data business case
 
The Quantum Era & Quantum Key Distribution
The Quantum Era & Quantum Key Distribution The Quantum Era & Quantum Key Distribution
The Quantum Era & Quantum Key Distribution
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Evolution of network - computer networks
Evolution of network - computer networksEvolution of network - computer networks
Evolution of network - computer networks
 
RTC 2017 - The Power of Parallelism
RTC 2017 - The Power of ParallelismRTC 2017 - The Power of Parallelism
RTC 2017 - The Power of Parallelism
 

More from Professor Lili Saghafi

More from Professor Lili Saghafi (20)

Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data,  By : Prof. Lili SaghafiArtificial Intelligence and the importance of Data,  By : Prof. Lili Saghafi
Artificial Intelligence and the importance of Data, By : Prof. Lili Saghafi
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Ai
AiAi
Ai
 
Introduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: FundamentalsIntroduction to Quantum Computing Lecture 1: Fundamentals
Introduction to Quantum Computing Lecture 1: Fundamentals
 
Software Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili SaghafiSoftware Engineering_Agile Software Development By: Professor Lili Saghafi
Software Engineering_Agile Software Development By: Professor Lili Saghafi
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
 
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
Programming Languages Categories / Programming Paradigm By: Prof. Lili Saghafi
 
Introduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili SaghafiIntroduction to blockchain lesson 2 By: Professor Lili Saghafi
Introduction to blockchain lesson 2 By: Professor Lili Saghafi
 
Introduction to Blockchain Technology By Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili SaghafiIntroduction to Blockchain Technology By Professor Lili Saghafi
Introduction to Blockchain Technology By Professor Lili Saghafi
 
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
Machine learning by using python lesson 3 Confusion Matrix By : Professor Lil...
 
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
Machine learning by using python lesson 2 Neural Networks By Professor Lili S...
 
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili SaghafiMachine learning by using python Lesson One Part 2 By Professor Lili Saghafi
Machine learning by using python Lesson One Part 2 By Professor Lili Saghafi
 
Machine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili SaghafiMachine learning by using python By: Professor Lili Saghafi
Machine learning by using python By: Professor Lili Saghafi
 
What is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili SaghafiWhat is digital humanities ,By: Professor Lili Saghafi
What is digital humanities ,By: Professor Lili Saghafi
 
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili SaghafiEffective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
Effective Algorithm for n Fibonacci Number By: Professor Lili Saghafi
 
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili SaghafiComputer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
Computer Security Cyber Security DOS_DDOS Attacks By: Professor Lili Saghafi
 
Data Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili SaghafiData Science unit 2 By: Professor Lili Saghafi
Data Science unit 2 By: Professor Lili Saghafi
 
Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi Data science unit 1 By: Professor Lili Saghafi
Data science unit 1 By: Professor Lili Saghafi
 
Data Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili SaghafiData Scientist By: Professor Lili Saghafi
Data Scientist By: Professor Lili Saghafi
 
New Assessments in Higher Education with Computers by: Prof Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi New Assessments in Higher Education with Computers by: Prof Lili Saghafi
New Assessments in Higher Education with Computers by: Prof Lili Saghafi
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Quantum Computers New Generation of Computers Part 9 Quantum Computers Readiness Plan

  • 1. Quantum Computers New Generation of Computers PART 9 QUANTUM COMPUTERS- READINESS PLAN Professor Lili Saghafi Aug. 2015
  • 2. Agenda • QUANTUM COMPUTERS-READINESS PLAN • RSA • RSA problem • SSL/TLS encryption • (RLWE) problem 2
  • 3. QUANTUM COMPUTERS-READINESS PLAN • Since instead of just computing in a linear binary way, with the presence or absence of an electrical charge being converted into "bits" of zeros or ones, Quantum Computers can take the rich quantum properties of subatomic particles and turn them into "Qubits" that can be both zero and one at the same time. • Quantum Computers could potentially run simulations and solve problems that are far too big for today's computers. • But there is a catch: A Quantum Computer could also break public encryption keys used today to keep data safe.
  • 4.
  • 5. QUANTUM-READINESS PLAN • Quantum-readiness plan, providing advice about where vulnerabilities might be in the quantum-computer era, and strategies and tools that could be implemented now to make any transition into that era much easier.
  • 6. RSA • RSA is one of the first practical public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. • In RSA, this asymmetry is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem. RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir and Leonard Adleman, w • ho first publicly described the algorithm in 1977. Clifford Cocks, an English mathematician, had developed an equivalent system in 1973, but it was not declassified until 1997.
  • 7.
  • 8. RSA problem • RSA problem , a user of RSA creates and then publishes a public key based on the two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. • Anyone can use the public key to encrypt a message, but with currently published methods, if the public key is large enough, only someone with knowledge of the prime numbers can feasibly decode the message.
  • 9.
  • 10. RSA problem • Breaking RSA encryption is known as the RSA problem; whether it is as hard as the factoring problem, it remains an open question. • Quantum Computers are good for Data encryption. Code are information in very large number 768 bite number ,RSA code broken in 2010, it can take 3 years for Digital Computers. 1024 bite code number it takes 3000 years for Digital Computers, and for Quantum Computers in a minute.
  • 11. RSA problem • It was once believed that Quantum Computers could only solve problems that had underlying mathematical structures, such as code breaking. • However, new algorithms have emerged that could enable Quantum Machines to solve problems in fields as diverse as weather prediction, materials science and artificial intelligence. • The ability of Quantum Computers to process massive amounts of data in a relatively short amount of time makes them extremely interesting to the scientific community.
  • 12.
  • 13. SSL/TLS encryption • Now because of security vulnerability to Quantum Computers , websites that use the widespread SSL/TLS encryption standard currently tend to make use of the RSA algorithm, which mathematician Peter Shor showed in 1994 could be easily broken by a quantum computer. • Shor’s approach could also be used to crack elliptic curve cryptography, another primitive increasingly used with SSL/TLS.
  • 14. (RLWE) problem • The research focuses on building a protocol using one of the primitives currently thought to be difficult for quantum computers to solve, called the “ring learning with errors” (RLWE) problem. • Practical application of this , is by seeing how to design a key exchange protocol that’s suitable for use in SSL/TLS and then implementing and testing it. • Rather than multiplying large prime numbers together as in RSA encryption, or using points on a curve as in elliptic curve cryptography, here the mathematical operation is based on multiplying polynomials together, then adding some random noise.
  • 15.
  • 16. RLWE • The result makes it “much harder” to crack. • RLWE hasn’t been studied intensively enough to prove that it would be any more secure against quantum computers than the techniques currently in use, but the primitive seems to be one of the better bets currently out there. • If after years of cryptanalytic research no one manages to break it, then it may achieve the corresponding levels of confidence that the research community has in the difficulty of currently accepted problems, like factoring or elliptic curve discrete log.
  • 17.
  • 18. Thank you! Great Audience Professor Lili Saghafi proflilisaghafi@gmail.com © Prof. Lili Saghafi , All Rights Reserved
  • 19. References, Images Credit• SAP Market Place https://websmp102.sap-ag.de/HOME#wrapper • Forbeshttp://www.forbes.com/sites/sap/2013/10/28/how-fashion-retailer-burberry-keeps-customers-coming-back-for-more/ • Youtube • Professor Saghafi’s blog https://sites.google.com/site/professorlilisaghafi/ • TED Talks • TEDXtalks • http://www.slideshare.net/lsaghafi/ • Timo Elliot • https://sites.google.com/site/psuircb/ • http://fortune.com/ • Theoretical Physicists John Preskill and Spiros Michalakis • Institute for Quantum Computing https://uwaterloo.ca/institute-for-quantum-computing/ • quantum physics realisation Data-Burger, scientific advisor: J. Bobroff, with the support of : Univ. Paris Sud, SFP, Triangle de la Physique, PALM, Sciences à l'Ecole, ICAM-I2CAM • Max Planck Institute for Physics (MPP) http://www.mpg.de/institutes • D-Wave Systems • References • Frank Wilczek. Physics in 100 Years. MIT-CTP-4654, URL = http://t.co/ezfHZdriUp • William Benzon and David G. Hays. Computational Linguistics and the Humanist. Computers and the Humanities 10: 265 – 274, 1976. URL =https://www.academia.edu/1334653/Computational_Linguistics_and_the_Humanist • Stanislaw Ulam. Tribute to John von Neumann, 1903-1957. Bulletin of the American Mathematical Society. Vol64, No. 3, May 1958, pp. 1-49, URL = https://docs.google.com/file/d/0B-5- JeCa2Z7hbWcxTGsyU09HSTg/edit?pli=1 • I have already discussed this sense of singualirty in a post on 3 Quarks Daily: Redefining the Coming Singularity – It’s not what you think, URL = http://www.3quarksdaily.com/3quarksdaily/2014/10/evolving-to-the-future-the-web-of-culture.html • David Hays and I discuss this in a paper where we set forth a number of such far-reaching singularities in cultural evolution: William Benzon and David G. Hays. The Evolution of Cognition. Journal of Social and Biological Structures 13(4): 297-320, 1990, URL = https://www.academia.edu/243486/The_Evolution_of_Cognition • Neurobiology of Language – Peter Hagoort on the future of linguistics, URL =http://www.mpi.nl/departments/neurobiology-of-language/news/linguistics-quo-vadis-an-outsider- perspective • See, for example: Alex Mesoudi, Cultural Evolution: How Darwinian Theory Can Explain Human Culture & Synthesize the Social Sciences, Chicago: 2011. • Lewens, Tim, “Cultural Evolution”, The Stanford Encyclopedia of Philosophy (Spring 2013 Edition), Edward N. Zalta (ed.), URL = http://plato.stanford.edu/archives/spr2013/entries/evolution-cultural/ Cultural evolution is a major interest of mine. • Here’s a collection of publications and working papers, URL =https://independent.academia.edu/BillBenzon/Cultural-Evolution • Helen Epstein. Music Talks: Conversations with Musicians. McGraw-Hill Book Company, 1987, p. 52. • [discuss these ideas in more detail in Beethoven’s Anvil, Basic Books, 2001, pp. 47-68, 192-193, 206-210, 219-221, and in • The Magic of the Bell: How Networks of Social Actors Create Cultural Beings, Working Paper, 2015, URL =https://www.academia.edu/11767211/The_Magic_of_the_Bell_How_Networks_of_Social_Actors_Create_Cultural_Beings 19 © Prof. Lili Saghafi , All Rights Reserved