SlideShare a Scribd company logo
1 of 38
Quantum Computing & Cryptography
Christian Schaffner
Research Center for Quantum Software
Institute for Logic, Language and Computation (ILLC)
University of Amsterdam
Landing Festival Berlin, 3 April 2019
A little thought experiment...
Quantum Computer
1. Superposition:
• Of different states
2. Interference:
• Of states
3. Entanglement:
• Of two or more physical systems
Quantum Physics
Quantum Physics
1. Superposition:
• Of different states
2. Interference:
• Of states
3. Entanglement:
• Of two or more physical systems
Superposition
• An object in different states simultaneously:
o A photon can be at two positions at the same time
o Schrödinger’s cat: dead and alive
• Experimentally verified:
o Small systems, such as photons
o Bigger systems, molecules…
Superposition: An experiment
detector 0
detector 1
superposition
collapse
detector 1
detector 0
superposition
collapse
50% detector 0 clicks
50% detector 1 clicks
detector 0
detector 1
Random Number Generator
Swiss company:
id Quantique
Quantum Physics
1. Superposition:
• Of different states
• Observation: collapse of the superposition
2. Interference
• Of an object in superposition
3. Entanglement
• Of two or more physical systems
detector 0
detector 1
no superposition but:
beamsplitter reflects 50%
and transmits 50%?
detector 0
detector 1
Mach-Zehnder interferometer
mirror
mirror
50% detector 0 clicks
50% detector 1 clicks
50%-50%
beamsplitter
detector 0
detector 1
mirror
mirror
detector 0
clicks
ALWAYS !!!
Mach-Zehnder interferometer
detector 0
mirror
mirror
interference
detector 1
superposition
detector 0
clicks
ALWAYS !!!
Try it yourself: http://quantumgame.io/
Quantum Physics
1. Superposition
• Of different states
• Observation: collapse of the superposition
2. Interference:
• Of an object in superposition
3. Entanglement:
• Of two or more physical systems
Quantum Physics
+ Computer Science =
Deutsch
1985
Feynman 1981
Video: Quantum Computers Animated
Quantum Bit (QuBit)
• Classical bit:
0 or 1
• Quantum bit:
superposition of 0 and 1
detector 1
detector 0
or
detector 0
detector 1
superposition
More Qubits
• 1 qubit superposition of 2 states
• 2 qubits superposition of 4 states
• 3 qubits superposition of 8 states
• 4 qubits superposition of 16 states
• 5 qubits superposition of 32 states
• 6 qubits superposition of 64 states
• 300 qubits superposition of 2300 states
Quantum Software: Fundamentally Different
• Qubit: superposition of 0 and 1
• 300 qubits: astronomical amount of parallel computation
• How to get the answer out??
- Measuring destroys computation!!
• Quantum Program
- Use interference to cancel undesired computations
• Does not always work!
Our focus: how can we optimally use the extra power?
Quantum Programming is like Composing
• Music
- Sound waves interfere
- Composer creates ‘beautiful’ interference of sound waves
• Quantum Computer
- Qubits in superposition interfere
- Quantum programmer ensures useful interference of qubit
states
What can you do with it?
• Simulation of nature
- Chemistry, material design, new medicines..
• Efficient communication
- Quantum internet, entanglement etc.
• Factorizing big numbers [Shor]
- Breaks frequently used cryptography
• Quantum cryptography [Bennett-Brassard-Ekert]
- Cryptography using quantum communication
• ??????
Progress In Building Qubits
• Many groups worldwide progress with building qubits
• Solid state:
- 50 solid-state qubits IBM
- 49 Intel
- 50 Google  72
- Fairly stable
• Trapped ions:
- 11 qubits Monroe
• D-Wave:
- 2048 qubits (not very stable)
https://quantumcomputingreport.com/
Isolation
vs
Control
What can you do with it?
• Simulation of nature
- Chemistry, material design, new medicines..
• Efficient communication
- Quantum internet, entanglement etc.
• Factorizing big numbers [Shor]
- Breaks frequently used cryptography
• Quantum cryptography [Bennett-Brassard-Ekert]
- Cryptography using quantum communication
• ??????
“Cyber Security provides security, safety and privacy solutions that are vital for our
economy including but not limited to critical infrastructures, smart cities, cloud computing,
online services and e-government.”
Cloud computing
Internet of Things (IoT)
Payment systems, eHealth
Auto-updates – Digital Signatures
Secure Browsing - TLS/SSL
VPN – IPSec
Secure email – s/MIME, PGP
RSA, DSA, DH, ECDH, …
AES, 3-DES, SHA, …
based on slides by Michele Mosca
Cyber Security
• Peter Shor 1994: efficient quantum algorithm for
factoring integer numbers
• 15 = 3 * 5
• 27 = 3 * 3 * 3
• 31 = 1 * 31
• 57 = 3 * 19
• 91 = 7 * 13
• 173 = 1 * 173
• RSA-100 =
1522605027922533360535618378132637429718068114961380688657908494580122963258952897654000350692006139
= 37975227936943673922808872755445627854565536638199 ×
40094690950920881030683735292761468389214899724061
Quantum Algorithm for Factorization
• Peter Shor 1994: efficient quantum algorithm
for factoring integer numbers
• For a 600-digit number (RSA-2048)
• Classical: age of universe (exponential time)
• Quantum: few minutes (polynomial time)
• Consequence: Large enough quantum
computers break all currently used public-key
cryptosystems!!!
Quantum Computer Breaks Public-Key Crypto
Security level
systems
Conventional attacks Quantum attacks
Symmetric-key
encryption (AES-256)
256 bits of security 128 bits
Hash functions
(SHA3-256)
128 bits 85 bits
Public-key crypto
(key exchange, digital
signatures, encryption)
(RSA-2048, ECC-256)
112 bits ~ 0 bits
Products, services, businesses relying on security either stop functioning or
do not provide expected levels of security!
Current Cryptography Under Quantum Attack
time
2019
Depends on:
• How long do you need to keep your secrets secure? (x years)
• How much time will it take to re-tool the existing
infrastructure? (y years)
• How long will it take for a large-scale quantum computer to be
built? (z years)
• Theorem (Mosca): If x + y > z, then worry.
y x
z secrets revealed
2029 ?
• If x > z or y > z,
you are in big trouble!
slide by Michele Mosca
When Do We Need To Worry?
• NIST “competition”: 82 submissions (23 signature, 59 encryption schemes)
• Aug 2019: Second-round workshop in California
• Expected: 3-5 years of crypto-analysis
• New standards, world-wide adoption
• Wanted: new assumptions to replace factoring and discrete logarithms
in order to build conventional public-key cryptography
[https://csrc.nist.gov/Projects/Post-Quantum-Cryptography ]
Conventional Quantum-Safe Cryptography
The Future is Quantum: Governments
• QuTech in Delft, NL: €135 million
• €18.8 Mio for 10 years: Quantum Software Consortium
• Germany: €650 million for quantum technologies
• UK: £235 million five-year in quantum computing
• Sweden: €100 million for 10 years for WACQT
• EU Flagship: €1 billion and a duration of 10 years
• US: $1.2 billion National Quantum Initiative Act
• China: $1 billion initial funding for National Laboratory for
Quantum Information Sciences
• Canada, Australia, Singapore, …
https://sciencebusiness.net/news/eu-runs-catch-
governments-pledge-more-cash-quantum-computing
The Future is Quantum: Business
• Quantum networks
• Quantum cloud
Y. Dulek, C. Schaffner, and F. Speelman, arXiv:1603.09717
Quantum homomorphic encryption for polynomial-sized
circuits
Summary
superposition
interference
time
2019
y x
z secrets revealed
2029 ?
Security
systems
Standard
attacks
Quantum
attacks
Symmetric
256 bits of
security
128 bits
Hash 128 bits 85 bits
Public-key 112 bits ~ 0 bits
“About your cat Mister Schrödinger…
I’ve got good and bad news.”
Thank you for your attention!
Get in touch: schaffner@qusoft.org

More Related Content

Similar to Schaffner Quantum Computing and Cryptography.pptx

Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptxgitrahekno
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum CommunicationsSrinivas Bukkuru
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptographyAkshay Shelake
 
Revolution of Quantum Computing in AI Era
Revolution of Quantum Computing in AI EraRevolution of Quantum Computing in AI Era
Revolution of Quantum Computing in AI EraPrinceBarpaga
 
Quantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksQuantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksMiranda Ghrist
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engDavid Vangulick
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingAhmed Banafa
 
quantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptxquantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptxtoget48099
 
csonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdfcsonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdfzoobiarana76
 
quantumcomputers-090715210946-phpapp01.pptx
quantumcomputers-090715210946-phpapp01.pptxquantumcomputers-090715210946-phpapp01.pptx
quantumcomputers-090715210946-phpapp01.pptxSateeshKumar410844
 
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forQuantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forCheapSSLsecurity
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Lec0.ppt
Lec0.pptLec0.ppt
Lec0.pptputmy
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxRohanTakke
 
Quantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTUREQuantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTURESMALAIAPPANSRIKANTH
 

Similar to Schaffner Quantum Computing and Cryptography.pptx (20)

Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
 
Revolution of Quantum Computing in AI Era
Revolution of Quantum Computing in AI EraRevolution of Quantum Computing in AI Era
Revolution of Quantum Computing in AI Era
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Distributed Systems in the Post-Moore Era.pptx
Distributed Systems in the Post-Moore Era.pptxDistributed Systems in the Post-Moore Era.pptx
Distributed Systems in the Post-Moore Era.pptx
 
Quantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksQuantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networks
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v eng
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
 
quantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptxquantum computing basics roll no 15.pptx
quantum computing basics roll no 15.pptx
 
csonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdfcsonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdf
 
Quantum Computation For AI
Quantum Computation For AIQuantum Computation For AI
Quantum Computation For AI
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
quantumcomputers-090715210946-phpapp01.pptx
quantumcomputers-090715210946-phpapp01.pptxquantumcomputers-090715210946-phpapp01.pptx
quantumcomputers-090715210946-phpapp01.pptx
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forQuantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out for
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Lec0.ppt
Lec0.pptLec0.ppt
Lec0.ppt
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Quantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTUREQuantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTURE
 

Recently uploaded

NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfNAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfWadeK3
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfmuntazimhurra
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physicsvishikhakeshava1
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 

Recently uploaded (20)

NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfNAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Biological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdfBiological Classification BioHack (3).pdf
Biological Classification BioHack (3).pdf
 
Work, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE PhysicsWork, Energy and Power for class 10 ICSE Physics
Work, Energy and Power for class 10 ICSE Physics
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 

Schaffner Quantum Computing and Cryptography.pptx

  • 1. Quantum Computing & Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Landing Festival Berlin, 3 April 2019
  • 2. A little thought experiment...
  • 4.
  • 5. 1. Superposition: • Of different states 2. Interference: • Of states 3. Entanglement: • Of two or more physical systems Quantum Physics
  • 6. Quantum Physics 1. Superposition: • Of different states 2. Interference: • Of states 3. Entanglement: • Of two or more physical systems
  • 7. Superposition • An object in different states simultaneously: o A photon can be at two positions at the same time o Schrödinger’s cat: dead and alive • Experimentally verified: o Small systems, such as photons o Bigger systems, molecules…
  • 11. 50% detector 0 clicks 50% detector 1 clicks detector 0 detector 1
  • 12. Random Number Generator Swiss company: id Quantique
  • 13.
  • 14.
  • 15. Quantum Physics 1. Superposition: • Of different states • Observation: collapse of the superposition 2. Interference • Of an object in superposition 3. Entanglement • Of two or more physical systems
  • 16. detector 0 detector 1 no superposition but: beamsplitter reflects 50% and transmits 50%?
  • 17. detector 0 detector 1 Mach-Zehnder interferometer mirror mirror 50% detector 0 clicks 50% detector 1 clicks 50%-50% beamsplitter
  • 18. detector 0 detector 1 mirror mirror detector 0 clicks ALWAYS !!! Mach-Zehnder interferometer
  • 19. detector 0 mirror mirror interference detector 1 superposition detector 0 clicks ALWAYS !!! Try it yourself: http://quantumgame.io/
  • 20. Quantum Physics 1. Superposition • Of different states • Observation: collapse of the superposition 2. Interference: • Of an object in superposition 3. Entanglement: • Of two or more physical systems
  • 21. Quantum Physics + Computer Science = Deutsch 1985 Feynman 1981 Video: Quantum Computers Animated
  • 22. Quantum Bit (QuBit) • Classical bit: 0 or 1 • Quantum bit: superposition of 0 and 1 detector 1 detector 0 or detector 0 detector 1 superposition
  • 23. More Qubits • 1 qubit superposition of 2 states • 2 qubits superposition of 4 states • 3 qubits superposition of 8 states • 4 qubits superposition of 16 states • 5 qubits superposition of 32 states • 6 qubits superposition of 64 states • 300 qubits superposition of 2300 states
  • 24. Quantum Software: Fundamentally Different • Qubit: superposition of 0 and 1 • 300 qubits: astronomical amount of parallel computation • How to get the answer out?? - Measuring destroys computation!! • Quantum Program - Use interference to cancel undesired computations • Does not always work! Our focus: how can we optimally use the extra power?
  • 25. Quantum Programming is like Composing • Music - Sound waves interfere - Composer creates ‘beautiful’ interference of sound waves • Quantum Computer - Qubits in superposition interfere - Quantum programmer ensures useful interference of qubit states
  • 26. What can you do with it? • Simulation of nature - Chemistry, material design, new medicines.. • Efficient communication - Quantum internet, entanglement etc. • Factorizing big numbers [Shor] - Breaks frequently used cryptography • Quantum cryptography [Bennett-Brassard-Ekert] - Cryptography using quantum communication • ??????
  • 27. Progress In Building Qubits • Many groups worldwide progress with building qubits • Solid state: - 50 solid-state qubits IBM - 49 Intel - 50 Google  72 - Fairly stable • Trapped ions: - 11 qubits Monroe • D-Wave: - 2048 qubits (not very stable) https://quantumcomputingreport.com/ Isolation vs Control
  • 28. What can you do with it? • Simulation of nature - Chemistry, material design, new medicines.. • Efficient communication - Quantum internet, entanglement etc. • Factorizing big numbers [Shor] - Breaks frequently used cryptography • Quantum cryptography [Bennett-Brassard-Ekert] - Cryptography using quantum communication • ??????
  • 29. “Cyber Security provides security, safety and privacy solutions that are vital for our economy including but not limited to critical infrastructures, smart cities, cloud computing, online services and e-government.” Cloud computing Internet of Things (IoT) Payment systems, eHealth Auto-updates – Digital Signatures Secure Browsing - TLS/SSL VPN – IPSec Secure email – s/MIME, PGP RSA, DSA, DH, ECDH, … AES, 3-DES, SHA, … based on slides by Michele Mosca Cyber Security
  • 30. • Peter Shor 1994: efficient quantum algorithm for factoring integer numbers • 15 = 3 * 5 • 27 = 3 * 3 * 3 • 31 = 1 * 31 • 57 = 3 * 19 • 91 = 7 * 13 • 173 = 1 * 173 • RSA-100 = 1522605027922533360535618378132637429718068114961380688657908494580122963258952897654000350692006139 = 37975227936943673922808872755445627854565536638199 × 40094690950920881030683735292761468389214899724061 Quantum Algorithm for Factorization
  • 31. • Peter Shor 1994: efficient quantum algorithm for factoring integer numbers • For a 600-digit number (RSA-2048) • Classical: age of universe (exponential time) • Quantum: few minutes (polynomial time) • Consequence: Large enough quantum computers break all currently used public-key cryptosystems!!! Quantum Computer Breaks Public-Key Crypto
  • 32. Security level systems Conventional attacks Quantum attacks Symmetric-key encryption (AES-256) 256 bits of security 128 bits Hash functions (SHA3-256) 128 bits 85 bits Public-key crypto (key exchange, digital signatures, encryption) (RSA-2048, ECC-256) 112 bits ~ 0 bits Products, services, businesses relying on security either stop functioning or do not provide expected levels of security! Current Cryptography Under Quantum Attack
  • 33. time 2019 Depends on: • How long do you need to keep your secrets secure? (x years) • How much time will it take to re-tool the existing infrastructure? (y years) • How long will it take for a large-scale quantum computer to be built? (z years) • Theorem (Mosca): If x + y > z, then worry. y x z secrets revealed 2029 ? • If x > z or y > z, you are in big trouble! slide by Michele Mosca When Do We Need To Worry?
  • 34. • NIST “competition”: 82 submissions (23 signature, 59 encryption schemes) • Aug 2019: Second-round workshop in California • Expected: 3-5 years of crypto-analysis • New standards, world-wide adoption • Wanted: new assumptions to replace factoring and discrete logarithms in order to build conventional public-key cryptography [https://csrc.nist.gov/Projects/Post-Quantum-Cryptography ] Conventional Quantum-Safe Cryptography
  • 35. The Future is Quantum: Governments • QuTech in Delft, NL: €135 million • €18.8 Mio for 10 years: Quantum Software Consortium • Germany: €650 million for quantum technologies • UK: £235 million five-year in quantum computing • Sweden: €100 million for 10 years for WACQT • EU Flagship: €1 billion and a duration of 10 years • US: $1.2 billion National Quantum Initiative Act • China: $1 billion initial funding for National Laboratory for Quantum Information Sciences • Canada, Australia, Singapore, … https://sciencebusiness.net/news/eu-runs-catch- governments-pledge-more-cash-quantum-computing
  • 36. The Future is Quantum: Business • Quantum networks • Quantum cloud Y. Dulek, C. Schaffner, and F. Speelman, arXiv:1603.09717 Quantum homomorphic encryption for polynomial-sized circuits
  • 37. Summary superposition interference time 2019 y x z secrets revealed 2029 ? Security systems Standard attacks Quantum attacks Symmetric 256 bits of security 128 bits Hash 128 bits 85 bits Public-key 112 bits ~ 0 bits
  • 38. “About your cat Mister Schrödinger… I’ve got good and bad news.” Thank you for your attention! Get in touch: schaffner@qusoft.org

Editor's Notes

  1. In het licht van recente experimentele successen en grote investeringen door o.a. Alphabet (voorheen Google), Microsoft, IBM en Intel is het realistisch dat er binnen 10-30 jaar een praktische quantumcomputer op de markt komt. Quantumcomputers kunnen exponentieel sneller algoritmes uitvoeren die aan de basis liggen van de meest gebruikte data-encryptiemethodes, zoals RSA.  Moeten we ons zorgen maken over een ‘cryptocalips’ wanneer de quantumcomputer er is? En hoe zit het met encryptiemethoden die tegen een quantumaanval bestand zijn, zoals post-quantum crypto en quantum key distribution? Zijn deze al op de markt en hoe moet uw organisatie hier mee aan de slag om optimaal voorbereid te zijn op de quantumtoekomst?
  2. Kwantum kennen die jongens natuurlijk niet, Maar Britten houden vast van James Bond en hun eigen Britse merk sport cars, Quantum Sports Cars, QSC, Hier afgebeeld de sexy sunrunner https://en.wikipedia.org/wiki/Quantum_Sports_Cars
  3. https://phys.org/news/2014-05-nondestructive-method-quantum.html Bron
  4. RSA-100 tooke a few days to factor in 1991. It now takes about 1 hour on a standard laptop.
  5. 15 = 3 * 5 51 = 3 * 17 123 * 456 = 56088
  6. Ask who knows the difference between private and public key! Explain the advantage of public-key crypto