SlideShare a Scribd company logo
1 of 52
Download to read offline
Quantum Computers
vs.
Computers Security
@veorq — http://aumasson.jp
Schrodinger equation
Entanglement
Bell states
EPR pairs
Wave functions
Uncertainty principle
Tensor products
Unitary matrices
Hilbert spaces
Nobody understands this stuff, and you don’t
need it to understand quantum computing
1. QC 101
2. In practice
3. Breaking crypto
4. Post-quantum crypto
5. Quantum key distribution
6. Quantum copy protection
7. Quantum machine learning
8. Conclusions
1. QC 101
Quantum mechanics
Nature’s operating system
Quantum mechanics
Mathematics
Gravity Electromagnetism Nuclear forcesApplications
OS
Hardware
Quantum mechanics
Particles in the universe behaves randomly
Their probabilities can be negative
"Negative energies and probabilities should
not be considered as nonsense. They are
well-defined concepts mathematically, like a
negative of money."
—Paul Dirac, 1942
α |0⟩ + β |1⟩
When observed
0 with probability α2
1 with probability β2
Once observed, stays either 0 or 1 forever
Quantum bit (qubit)
α0x00
|0x00⟩ + …+ α0xfe
|0xfe⟩ + α0xff
|0xff⟩
Again, the sum of probabilities α2
equals 1
The α’s are called amplitudes
Generalizes to 32- or 64-bit quantum words
Quantum byte
Set of quantum registers (bits/bytes/words)
Quantum assembly instructions:
Transform the probabilities of the register
Probabilities should still sum to 1
Linear math transforms (matrix products)
A program ends with a measurement
Quantum computer
Quantum computer simulators
Impossible with a classical computer
Possible with a quantum computer!
The killer app
You heard about NP-complete problems?
SAT, scheduling, Candy Crush, etc.
Solution hard to find, but easy to verify
QC does not solve NP-complete problems!
QC vs. hard problems
NNP
P
(easy)NNP
NP
(hard)
NNP
BQP (quantum)
Quantum speedup
Make the impossible possible
Example: Factoring integers
Hard classically (exponential-ish)
Easy with a quantum computer!
Obvious application: break RSA!
Quantum parallelism
“Qubits encode all values at the same time!”
Caveat: you can only observe one result
Different observations in different worlds
2. In practice
Factoring experiments
Only for numbers with special patterns
Not really the real thing (Shor)
Constructing quantum computers
Qubits obtained from physical phenomena
Photons (2 polarizations)
Molecules (2 nuclear spins)
Superconducting (different)
Major pain: correction or errors
Qubits mixed up with the environment
Quantum noise
Recent milestone
Partial error correction for a 9-qubit state
Google-sponsored research group
D-Wave
Canadian company, pioneer in QC research
Adiabatic computers, not real QC
512-qubit system
Quantum annealing
No Shor
Stability, error-correction
How much will cost “N quantum
operations” vs “N classical operations”?
Some algorithms need quantum RAM,
which we don’t really know how to do
Unlikely to come in the next decade, if ever
Many challenges
3. Breaking crypto
TL;DR: We’re doomed
RSA: broken
Diffie-Hellman: broken
Elliptic curves: broken
El Gamal: broken
RSA
No more RSA encryption or signatures
Based on the hardness of factoring
You know N = p*q, you search p and q
Hard on a classical computer (most probably)
Easy on a quantum computer!
Xe
mod N for e in [1, 2, 3, …] and some X
will repeat with a period dividing (p-1)(q-1)
A period gives information on p and q!
Shor’s algorithm:
1. Prepare qubits to encode X,X2
,X3
,X4
, ... simultaneously
2. Find the period using the Quantum Fourier Transform
3. Exploits the period to recover p and q
Shor’s idea to factor N=pq
Discrete logarithms
Problem behind Diffie-Hellman, ECC
You know g and gy
, you search y
Like factoring, a Hidden Subgroup Problem
Shor works too!
What about symmetric ciphers?
AES with a 128-bit key:
Classical: 128-bit security
Quantum: 64-bit security
Grover’s algorithm: searches in N items in
O(√N) time and O(log N) memory
Solution: upgrade to 256-bit AES
4. Post-quantum crypto
Alternatives to RSA, Diffie-Hellman, ECC
Resistance to QC can’t be totally proved
http://pqcrypto.org/
Post-quantum crypto
Hash-based signatures
Problem: inverting hash functions
Ideas from Lamport (1979), Merkle (1989)
Example of SPHINCS:
(http://sphincs.cr.yp.to/)
41 KB signatures
1 KB public and private keys
Slow (100s signatures/sec)
Multivariate signatures
Problem: solve complex systems of equations
First ideas in the 1980s
0 =X1
X2
X3
+ X1
X3
+ X2
X4
1 = X1
X3
X4
+ X2
X3
X4
0 = X1
X3
+ X2
X3
Many schemes have been broken...
Code-based crypto
Problem: decoding error-correcting codes
Schemes: McEliece (1979), Niederreiter (1986)
Limitations:
Large keys (100 KB+)
Fewer optimized implementations
Lattice-based crypto
Based on lattice problems (duh!)
Learning-with-errors: learn a simple function
given results with random noise
Encryption, signature
5. Quantum key distribution
Quantum key distribution (QKD)
Use of quantum phenomena to share a key
Kind of “quantum Diffie-Hellman”
Not quantum computing
Not quantum cryptography
“Security based on the laws of physics”
Eavesdropping will cause errors
Keys truly random
BB84
First QKD protocol, though not really quantum
Idea:
Send bits in the form of polarized photons
Can be observed in 2 ways, only one is right
Caveats
Like any security system, it’s complicated
Security
Eventually relies on classical crypto
Typically with frequent rekeying
QKD implementations have been attacked
"Quantum hacking"
(formerly NTNU, Norway)
Deployment
Dedicated optical fiber links
Point-to-point, limited distance (< 100 km)
6. Quantum copy protection
Quantum copy protection
Idea: leverage the no-cloning principle
(cos you can't know everything about something)
Quantum cash
Impossible to counterfeit, cos' physics (1969)
Bills include qubits with some secret encoding
⬆ ⬈ ⬇ ⬅⬉⬇⬈ ⬈ ⬆
Only the bank can authenticate bills...
Publicly verifiable quantum cash
Anyone can verify that a bill isn't counterfeit
Uses public-key crypto, non-quantum
Can be secure even with black-box verification
Quantum software protection
Using quantum techniques:
"Obfuscate" the functionality
Make copies impossible
verify(pwd) {
return pwd == "p4s5w0rD"
}
1. Turn verify() into a list of qubits
2. Verification: apply a transform that depends
on pwd, then measure the qubits
7. Quantum machine learning
Machine learning
“Science of getting computers to act without
being explicitly programmed” —Andrew Ng
Supervised Non-supervised
Successful for spam filtering, fraud detection,
OCR, recommendation systems
No silver bullet, but may help
ML being used for
Intrusion detection (network, endpoint)
Binary vulnerability discovery
Nevertheless, vendors give neither
Details on the techniques used, nor
Effectiveness figures or measurements
Machine learning and security
Quantum machine learning
“Port” of basic ML techniques to QC, like
k-mean clustering
Neural networks
Support vector machines
Many use Grover for a square-root speedup
Potential exponential speedup, but...
Quantum RAM (QRAM)
Awesome concept
Addresses are given in superposition
Read values are retrieved in superposition
Many QML algorithms need QRAM
But it'd be extremely complicated to build
8. Conclusions
Quantum computers s***
Because they...
ARE NOT superfaster computers
WOULD NOT solve NP-hard problems
MAY NEVER BE BUILT anyway
Quantum computers are awesome
Because they…
Would DESTROY all pubkey crypto deployed
Give a new meaning to "COMPUTING"
May teach us a lot about physics and Nature
Thank you!

More Related Content

What's hot

Recurrent Neural Networks II (D2L3 Deep Learning for Speech and Language UPC ...
Recurrent Neural Networks II (D2L3 Deep Learning for Speech and Language UPC ...Recurrent Neural Networks II (D2L3 Deep Learning for Speech and Language UPC ...
Recurrent Neural Networks II (D2L3 Deep Learning for Speech and Language UPC ...Universitat Politècnica de Catalunya
 
Programming Language Memory Models: What do Shared Variables Mean?
Programming Language Memory Models: What do Shared Variables Mean?Programming Language Memory Models: What do Shared Variables Mean?
Programming Language Memory Models: What do Shared Variables Mean?greenwop
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantSasha Lazarevic
 
Deep Learning for Computer Vision: Recurrent Neural Networks (UPC 2016)
Deep Learning for Computer Vision: Recurrent Neural Networks (UPC 2016)Deep Learning for Computer Vision: Recurrent Neural Networks (UPC 2016)
Deep Learning for Computer Vision: Recurrent Neural Networks (UPC 2016)Universitat Politècnica de Catalunya
 
Tears for quantum fears
Tears for quantum fearsTears for quantum fears
Tears for quantum fearsMark Carney
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Recurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: TheoryRecurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: TheoryAndrii Gakhov
 
Recurrent Neural Networks (D2L8 Insight@DCU Machine Learning Workshop 2017)
Recurrent Neural Networks (D2L8 Insight@DCU Machine Learning Workshop 2017)Recurrent Neural Networks (D2L8 Insight@DCU Machine Learning Workshop 2017)
Recurrent Neural Networks (D2L8 Insight@DCU Machine Learning Workshop 2017)Universitat Politècnica de Catalunya
 
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...Universitat Politècnica de Catalunya
 
Recurrent Neural Networks
Recurrent Neural NetworksRecurrent Neural Networks
Recurrent Neural NetworksSharath TS
 
Recurrent Neural Network (RNN) | RNN LSTM Tutorial | Deep Learning Course | S...
Recurrent Neural Network (RNN) | RNN LSTM Tutorial | Deep Learning Course | S...Recurrent Neural Network (RNN) | RNN LSTM Tutorial | Deep Learning Course | S...
Recurrent Neural Network (RNN) | RNN LSTM Tutorial | Deep Learning Course | S...Simplilearn
 

What's hot (15)

Quantum Roles in Quantum Computing
Quantum Roles in Quantum ComputingQuantum Roles in Quantum Computing
Quantum Roles in Quantum Computing
 
Recurrent Neural Networks II (D2L3 Deep Learning for Speech and Language UPC ...
Recurrent Neural Networks II (D2L3 Deep Learning for Speech and Language UPC ...Recurrent Neural Networks II (D2L3 Deep Learning for Speech and Language UPC ...
Recurrent Neural Networks II (D2L3 Deep Learning for Speech and Language UPC ...
 
Programming Language Memory Models: What do Shared Variables Mean?
Programming Language Memory Models: What do Shared Variables Mean?Programming Language Memory Models: What do Shared Variables Mean?
Programming Language Memory Models: What do Shared Variables Mean?
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is Important
 
Deep Learning for Computer Vision: Recurrent Neural Networks (UPC 2016)
Deep Learning for Computer Vision: Recurrent Neural Networks (UPC 2016)Deep Learning for Computer Vision: Recurrent Neural Networks (UPC 2016)
Deep Learning for Computer Vision: Recurrent Neural Networks (UPC 2016)
 
Tears for quantum fears
Tears for quantum fearsTears for quantum fears
Tears for quantum fears
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
 
Recurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: TheoryRecurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: Theory
 
Recurrent Neural Networks (D2L8 Insight@DCU Machine Learning Workshop 2017)
Recurrent Neural Networks (D2L8 Insight@DCU Machine Learning Workshop 2017)Recurrent Neural Networks (D2L8 Insight@DCU Machine Learning Workshop 2017)
Recurrent Neural Networks (D2L8 Insight@DCU Machine Learning Workshop 2017)
 
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
 
AINL 2016: Skornyakov
AINL 2016: SkornyakovAINL 2016: Skornyakov
AINL 2016: Skornyakov
 
Recurrent Neural Networks
Recurrent Neural NetworksRecurrent Neural Networks
Recurrent Neural Networks
 
Recurrent Neural Network (RNN) | RNN LSTM Tutorial | Deep Learning Course | S...
Recurrent Neural Network (RNN) | RNN LSTM Tutorial | Deep Learning Course | S...Recurrent Neural Network (RNN) | RNN LSTM Tutorial | Deep Learning Course | S...
Recurrent Neural Network (RNN) | RNN LSTM Tutorial | Deep Learning Course | S...
 
Rnn & Lstm
Rnn & LstmRnn & Lstm
Rnn & Lstm
 

Similar to DEF CON 23 - Phillip Aumasson - quantum computers vs computers security

Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfRonSteinfeld1
 
Quantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from ThemQuantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from Themmapmeld
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptxgitrahekno
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyCSNP
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum CryptographyAndrew Manoske
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computingachakracu
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxsanta142869
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasSoftware Guru
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Milos Dunjic
 

Similar to DEF CON 23 - Phillip Aumasson - quantum computers vs computers security (20)

Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
 
Quantum Computers.ppt
Quantum Computers.pptQuantum Computers.ppt
Quantum Computers.ppt
 
Quantum Computers.ppt
Quantum Computers.pptQuantum Computers.ppt
Quantum Computers.ppt
 
Quantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from ThemQuantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from Them
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptx
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
 
preskill.pptx
preskill.pptxpreskill.pptx
preskill.pptx
 

More from Felipe Prado

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryFelipe Prado
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...Felipe Prado
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsFelipe Prado
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionFelipe Prado
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101Felipe Prado
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentFelipe Prado
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareFelipe Prado
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...Felipe Prado
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationFelipe Prado
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceFelipe Prado
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionistFelipe Prado
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksFelipe Prado
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityFelipe Prado
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsFelipe Prado
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchFelipe Prado
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...Felipe Prado
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksFelipe Prado
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationFelipe Prado
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncFelipe Prado
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesFelipe Prado
 

More from Felipe Prado (20)

DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
 
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
DEF CON 24 - Bertin Bervis and James Jara - exploiting and attacking seismolo...
 
DEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got antsDEF CON 24 - Tamas Szakaly - help i got ants
DEF CON 24 - Tamas Szakaly - help i got ants
 
DEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryptionDEF CON 24 - Ladar Levison - compelled decryption
DEF CON 24 - Ladar Levison - compelled decryption
 
DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101DEF CON 24 - Clarence Chio - machine duping 101
DEF CON 24 - Clarence Chio - machine duping 101
 
DEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a governmentDEF CON 24 - Chris Rock - how to overthrow a government
DEF CON 24 - Chris Rock - how to overthrow a government
 
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardwareDEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
DEF CON 24 - Fitzpatrick and Grand - 101 ways to brick your hardware
 
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
DEF CON 24 - Rogan Dawes and Dominic White - universal serial aBUSe remote at...
 
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustrationDEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
DEF CON 24 - Jay Beale and Larry Pesce - phishing without frustration
 
DEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interfaceDEF CON 24 - Gorenc Sands - hacker machine interface
DEF CON 24 - Gorenc Sands - hacker machine interface
 
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionistDEF CON 24 - Allan Cecil and DwangoAC -  tasbot the perfectionist
DEF CON 24 - Allan Cecil and DwangoAC - tasbot the perfectionist
 
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locksDEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
DEF CON 24 - Rose and Ramsey - picking bluetooth low energy locks
 
DEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud securityDEF CON 24 - Rich Mogull - pragmatic cloud security
DEF CON 24 - Rich Mogull - pragmatic cloud security
 
DEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portalsDEF CON 24 - Grant Bugher - Bypassing captive portals
DEF CON 24 - Grant Bugher - Bypassing captive portals
 
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitchDEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
 
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
DEF CON 24 - Plore - side -channel attacks on high security electronic safe l...
 
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucksDEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
DEF CON 24 - Six Volts and Haystack - cheap tools for hacking heavy trucks
 
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitationDEF CON 24 - Dinesh and Shetty - practical android application exploitation
DEF CON 24 - Dinesh and Shetty - practical android application exploitation
 
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vncDEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
DEF CON 24 - Klijnsma and Tentler - stargate pivoting through vnc
 
DEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devicesDEF CON 24 - Antonio Joseph - fuzzing android devices
DEF CON 24 - Antonio Joseph - fuzzing android devices
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

DEF CON 23 - Phillip Aumasson - quantum computers vs computers security

  • 2. Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert spaces Nobody understands this stuff, and you don’t need it to understand quantum computing
  • 3. 1. QC 101 2. In practice 3. Breaking crypto 4. Post-quantum crypto 5. Quantum key distribution 6. Quantum copy protection 7. Quantum machine learning 8. Conclusions
  • 5. Quantum mechanics Nature’s operating system Quantum mechanics Mathematics Gravity Electromagnetism Nuclear forcesApplications OS Hardware
  • 6. Quantum mechanics Particles in the universe behaves randomly Their probabilities can be negative "Negative energies and probabilities should not be considered as nonsense. They are well-defined concepts mathematically, like a negative of money." —Paul Dirac, 1942
  • 7. α |0⟩ + β |1⟩ When observed 0 with probability α2 1 with probability β2 Once observed, stays either 0 or 1 forever Quantum bit (qubit)
  • 8. α0x00 |0x00⟩ + …+ α0xfe |0xfe⟩ + α0xff |0xff⟩ Again, the sum of probabilities α2 equals 1 The α’s are called amplitudes Generalizes to 32- or 64-bit quantum words Quantum byte
  • 9. Set of quantum registers (bits/bytes/words) Quantum assembly instructions: Transform the probabilities of the register Probabilities should still sum to 1 Linear math transforms (matrix products) A program ends with a measurement Quantum computer
  • 11. Impossible with a classical computer Possible with a quantum computer! The killer app
  • 12. You heard about NP-complete problems? SAT, scheduling, Candy Crush, etc. Solution hard to find, but easy to verify QC does not solve NP-complete problems! QC vs. hard problems NNP P (easy)NNP NP (hard) NNP BQP (quantum)
  • 13. Quantum speedup Make the impossible possible Example: Factoring integers Hard classically (exponential-ish) Easy with a quantum computer! Obvious application: break RSA!
  • 14. Quantum parallelism “Qubits encode all values at the same time!” Caveat: you can only observe one result Different observations in different worlds
  • 16. Factoring experiments Only for numbers with special patterns Not really the real thing (Shor)
  • 17. Constructing quantum computers Qubits obtained from physical phenomena Photons (2 polarizations) Molecules (2 nuclear spins) Superconducting (different) Major pain: correction or errors Qubits mixed up with the environment Quantum noise
  • 18. Recent milestone Partial error correction for a 9-qubit state Google-sponsored research group
  • 19. D-Wave Canadian company, pioneer in QC research Adiabatic computers, not real QC 512-qubit system Quantum annealing No Shor
  • 20. Stability, error-correction How much will cost “N quantum operations” vs “N classical operations”? Some algorithms need quantum RAM, which we don’t really know how to do Unlikely to come in the next decade, if ever Many challenges
  • 22. TL;DR: We’re doomed RSA: broken Diffie-Hellman: broken Elliptic curves: broken El Gamal: broken
  • 23. RSA No more RSA encryption or signatures Based on the hardness of factoring You know N = p*q, you search p and q Hard on a classical computer (most probably) Easy on a quantum computer!
  • 24. Xe mod N for e in [1, 2, 3, …] and some X will repeat with a period dividing (p-1)(q-1) A period gives information on p and q! Shor’s algorithm: 1. Prepare qubits to encode X,X2 ,X3 ,X4 , ... simultaneously 2. Find the period using the Quantum Fourier Transform 3. Exploits the period to recover p and q Shor’s idea to factor N=pq
  • 25. Discrete logarithms Problem behind Diffie-Hellman, ECC You know g and gy , you search y Like factoring, a Hidden Subgroup Problem Shor works too!
  • 26. What about symmetric ciphers? AES with a 128-bit key: Classical: 128-bit security Quantum: 64-bit security Grover’s algorithm: searches in N items in O(√N) time and O(log N) memory Solution: upgrade to 256-bit AES
  • 28. Alternatives to RSA, Diffie-Hellman, ECC Resistance to QC can’t be totally proved http://pqcrypto.org/ Post-quantum crypto
  • 29. Hash-based signatures Problem: inverting hash functions Ideas from Lamport (1979), Merkle (1989) Example of SPHINCS: (http://sphincs.cr.yp.to/) 41 KB signatures 1 KB public and private keys Slow (100s signatures/sec)
  • 30. Multivariate signatures Problem: solve complex systems of equations First ideas in the 1980s 0 =X1 X2 X3 + X1 X3 + X2 X4 1 = X1 X3 X4 + X2 X3 X4 0 = X1 X3 + X2 X3 Many schemes have been broken...
  • 31. Code-based crypto Problem: decoding error-correcting codes Schemes: McEliece (1979), Niederreiter (1986) Limitations: Large keys (100 KB+) Fewer optimized implementations
  • 32. Lattice-based crypto Based on lattice problems (duh!) Learning-with-errors: learn a simple function given results with random noise Encryption, signature
  • 33. 5. Quantum key distribution
  • 34. Quantum key distribution (QKD) Use of quantum phenomena to share a key Kind of “quantum Diffie-Hellman” Not quantum computing Not quantum cryptography “Security based on the laws of physics” Eavesdropping will cause errors Keys truly random
  • 35. BB84 First QKD protocol, though not really quantum Idea: Send bits in the form of polarized photons Can be observed in 2 ways, only one is right
  • 36. Caveats Like any security system, it’s complicated
  • 37. Security Eventually relies on classical crypto Typically with frequent rekeying QKD implementations have been attacked "Quantum hacking" (formerly NTNU, Norway)
  • 38. Deployment Dedicated optical fiber links Point-to-point, limited distance (< 100 km)
  • 39. 6. Quantum copy protection
  • 40. Quantum copy protection Idea: leverage the no-cloning principle (cos you can't know everything about something)
  • 41. Quantum cash Impossible to counterfeit, cos' physics (1969) Bills include qubits with some secret encoding ⬆ ⬈ ⬇ ⬅⬉⬇⬈ ⬈ ⬆ Only the bank can authenticate bills...
  • 42. Publicly verifiable quantum cash Anyone can verify that a bill isn't counterfeit Uses public-key crypto, non-quantum Can be secure even with black-box verification
  • 43. Quantum software protection Using quantum techniques: "Obfuscate" the functionality Make copies impossible verify(pwd) { return pwd == "p4s5w0rD" } 1. Turn verify() into a list of qubits 2. Verification: apply a transform that depends on pwd, then measure the qubits
  • 44. 7. Quantum machine learning
  • 45. Machine learning “Science of getting computers to act without being explicitly programmed” —Andrew Ng Supervised Non-supervised Successful for spam filtering, fraud detection, OCR, recommendation systems
  • 46. No silver bullet, but may help ML being used for Intrusion detection (network, endpoint) Binary vulnerability discovery Nevertheless, vendors give neither Details on the techniques used, nor Effectiveness figures or measurements Machine learning and security
  • 47. Quantum machine learning “Port” of basic ML techniques to QC, like k-mean clustering Neural networks Support vector machines Many use Grover for a square-root speedup Potential exponential speedup, but...
  • 48. Quantum RAM (QRAM) Awesome concept Addresses are given in superposition Read values are retrieved in superposition Many QML algorithms need QRAM But it'd be extremely complicated to build
  • 50. Quantum computers s*** Because they... ARE NOT superfaster computers WOULD NOT solve NP-hard problems MAY NEVER BE BUILT anyway
  • 51. Quantum computers are awesome Because they… Would DESTROY all pubkey crypto deployed Give a new meaning to "COMPUTING" May teach us a lot about physics and Nature