This document outlines the agenda for an international conference on quantum computing, artificial intelligence, and related topics. The conference will feature several keynote speakers and panels discussing various applications and policy issues. Topics include the European Commission's work on AI, practical applications of quantum computing in medicine, the impact of AI and computing power on healthcare, and perspectives on quantum computing from various governments and companies. The document provides names, titles, and affiliations for multiple speakers as well as summaries of some of their planned presentations.
2. Opening Remarks: U.S. Congressman Bill Foster
Policy Issues in AI and Quantum
Computing
Mr. Killian Gross, European Commission Brussels, Head
of Unit DG CNECT A/2, Artificial Intelligence
The European Commission’s work on Artificial
Intelligence
Mr. Murray Thom, Vice President of Software and Cloud
Services, D-Wave Systems, Inc.
Practical Quantum Computing in Medicine
Conference Keynote: Dr. Christoph Zindel, Board
Member, Siemens Healthineers
Digital Transformation of Healthcare
through Artificial Intelligence
Dr. Gil Alterovitz, Director, National Artificial Intelligence
Institute, U.S. Department of Veterans Affairs
Artificial Intelligence R&D from Lab to Practice
Mr. Taro Shimada, Executive Officer, Corporate Senior
Vice President at Toshiba Corporation
Enabling the Quantum Internet of the Future
Conference Keynote: Maëva Ghonda,
Sustainability Scientist and Editor, IEEE Quantum
Computing Newsletter
Quantum Computing for Sustainability
Dr. Dorin Comaniciu, Senior Vice President of Artificial
Intelligence and Digital Innovation, Siemens Healthineers
The Impact of Artificial Intelligence and
Computing Power in Healthcare: From
Diagnosis to Digital Twin
Dr. Michele Mosca, CEO, evolutionQ
Toward Prosperity and Resilience in the
Quantum Era
Closing Remarks: Dr. Paul Lopata, Principal
Director Quantum Science, The Pentagon, Office of
the Under Secretary of the U.S. Department of
Defense
A U.S. Department of Defense Perspective
on Quantum Computing: The Need for
Long-Term Thinking
What’s Next?
CEO Summit on Quantum Computing
1-Dec-2021
Executive Summit on Quantum Computing
for Aerospace
30-Mar-2022
Mr. Mike Brown, Chief Technology Officer, ISARA
Corporation
Preparing Health Care for the Quantum Age
Welcome to the Executive Summit on Quantum Computing and Artificial Intelligence. We invite the greatest forward-
thinking thought leaders defining the future of Quantum Computing, Cryptography and Artificial Intelligence. This international
conference is the platform for the exchange of thought-provoking ideas by global innovators shaping industries of the future.
43. White Paper on AI
A European approach
to excellence and trust
A European approach to trust
Foster citizens’ confidence in AI and provide legal
certainty for users by ensuring compliance with EU
rules, including fundamental and consumer rights.
A European approach to excellence
Mobilising resources to promote research and
innovation as well as the adoption of AI-based
solutions, including by SMEs.
Towards Trustworthy Artificial Intelligence in
the European Union
44. Fostering an ecosystem of excellence
Support
excellence and
testing centres
Digital
Innovation
Hubs with high
degree of AI
expertise
New
Public-Private
Partnership in
AI
Networks of
leading
universities
Coordinate
with Member
States
Adopt AI
Programme for
public sector
Scale-up
equity fund for
AI in InvestEU
Key actions to accelerate AI development, application and use
45. Completed In progress In progess
Analyse responses
to the public
consultation, incl.
Member States
input
Review the
Coordinated Plan
together with the
Member States
Drafting the
regulatory
proposal on AI
Publication of a revised
Coordinated Plan and a
proposal for a regulatory
framework
TIMELINE
Fist half of 2021
Following up on the White Paper on AI
46. A public consultation on the AI White Paper
gathered broad participation
1 215
Responses
received
February –
June 2020
406 citizens
352 business and industry
160 civil society
… 72 other
152 academia
73 public authorities
47. Need for new legislation
All respondents, excl. no answer
Breaching fundamental rights Discriminatory outcomes
90% 87%
Main concerns of respondents:
Focussed on high-risk?
• Only 3% think that current
legislation is fully sufficient.
• 33% find that the current legislation
may have some gaps.
• 42% say there is a need for a new
legislation
• 43% of respondents agree that
compulsory requirements should
be limited to high-risk AI
applications.
• 31% do not agree with the limitation
to high-risk
Public consultation: Ecosystem of trust
49. Creating an ecosystem of trust
“
We want a set of rules that puts
people at the centre. Algorithms
must not be a black box and there
must be clear rules if something
goes wrong.
President von der Leyen
State of the Union address, 16/9/2020
Risks for safety and fundamental rights need to be addressed.
50. A risk-based and proportionate approach to
regulation
Creating an innovation-friendly legal framework by focusing on
high-risk uses of AI.
A risk-based and proportionate
regulatory approach could entail:
• Identification of AI systems posing a
particularly high risk to the safety and
fundamental rights of citizens
• Mandatory requirements and
ex-ante conformity assessment
for high-risk AI systems
• Specific rules for remote biometric
identification
✔ Training data
✔ Data and record keeping
✔ Information to be provided
✔ Robustness and accuracy
✔ Human oversight
The requirements may be further
specified through standards.
Possible requirements for
high-risk AI systems
51. Ensuring safety and fundamental rights
compliance through conformity assessments
Public Consultation
on the AI White Paper
49%
…of respondents explicitly
advocated mandatory
third-party conformity
assessments or
self-assessments for high-risk
AI.
Ex ante conformity assessments are necessary to
verify compliance with the high-risk requirements.
They could entail procedures for testing and inspection,
including checks of testing and training data.
Should be part of existing
conformity assessment
mechanisms where
available.
Where not available, new
mechanisms need to be
established (drawing on
SSOs and standards)
53. Why a 2021 review?
The Coordinated Plan on AI 2021 review
► Some 70 individual forward-looking
actions
► Developed together with the Member
States
► Member States were encouraged to
develop national AI strategies
► Set up as a rolling plan to be updated
regularly
The Coordinated Plan 2018
► Covid-19 pandemic
► Policy alignment with new priorities (e.g.
Green Deal)
► The Recovery and Resilience Facility (+ Digital
Europe Programme and Horizon Europe) as a
game changer
► Policy alignment with the White Paper on AI
► Take into account technological developments
► Lessons learned from last two years of
implementation
The Coordinated Plan represents a joint commitment (Commission & Member States):
by working together, Europe can maximise its AI potential to compete globally.
54. The Coordinated Plan on AI 2021 review
To shape
development of
trustworthy AI to
benefit all citizens
and business
To mobilise
resources for AI in
Europe to succeed
and grow.
OBJECTIVES
To create enabling
conditions for the
development and
uptake of AI
To advance the
EU’s global
position and
reputation in AI
84. 2
Urgent enterprise
need triggering
massive
cyber-security
investment
Quantum Computers Are Coming Fast.
The Threat to Enterprise Security Is Huge.
2
In 5-10 years, quantum computers will
break all existing cryptography
at the core of every secure information exchange
and transaction conducted today
Anyone that wants to make sure that their data is
protected for longer than 10 years
should move to alternate forms of encryption now.
− ZDNet 2018
85. 3
The Path to Quantum
▪
Time
Complexity
1. Operations on single physical qubits
2. Algorithms on multiple physical qubits
3. QND measurements for error correction and control
4. Logical memory with longer lifetime than physical qubits
5. Operations on single logical qubits
6. Algorithms on multiple logical qubits
7. Fault-tolerant quantum computation
86. 4
Type Algorithm
Key Strength
Classic (bits)
Key Strength
Quantum
(bits)
Quantum
Attack
Asymmetric
RSA 2048 112
0
Shor’s
Algorithm
RSA 3072 128
ECC 256 128
ECC 521 256
Symmetric
AES 128 128 64 Grover’s
Algorithm
AES 256 256 128
Quantum Breaks the Math Cybersecurity Relies on
▪ Quantum computers will be able to solve the
hard math problems used in current public
key cryptography, which we rely on to secure
everything that connects and transacts today
▪ This is an unprecedented threat the security
industry has never faced before, and it’s what
drives the ISARA team everyday to create
mitigation solutions
87. 5
Quantum Effect on Trust Infrastructure
Quantum Threat Facts:
• 7 to 15 years: quantum scientists agree that
Shor’s algorithm running on a large-scale
quantum computer will break public key
cryptography
• Impacts: Perfect undetectable identity forgeries.
Every key agreement rendered transparent
• Introduces widespread vulnerabilities throughout
the Internet
• NIST is evaluating quantum-safe algorithm
candidates and will publish standards between
2022 and 2024
88. 6
Quantum and Health Care
▪ The Good
– Drug discovery
– Materials science
– Big Data Analytics of Genetic Information
▪ The Bad
– Software updates for medical devices
– Long term confidentiality of patient records
– Access to hospital systems
– Remote access to Electronic Records
93. 11
HIGH RISK: Authenticated Software Updates
What’s at risk?
Durable connected devices
(IoT) with long in-field lives
Forged software updates by
quantum-enabled adversaries
What’s The Attack
Protection: Physically embed stateful hash-based roots of trust today
94. 12
Today
Y2Q Range
Modern cryptography broken,
connected vehicles are
vulnerable.
Full OTA
Vehicle
Updates
*Mosca, Michele., IQC. 2015. “Cybersecurity in an era with quantum computers: will we be ready?”. https://eprint.iacr.org/2015/1075.pdf
*NIST. April 2016. “Report on Post-Quantum Cryptography”. http://dx.doi.org/10.6028/NIST.IR.8105
When Does Quantum Impact Vehicles?
202
1
202
2
202
3
202
4
202
5
202
6
202
7
202
8
202
9
203
0
203
1
203
2
203
3
203
4
2026
(Mosca, IQC, 2015)*
2030
(NIST, 2016)*
Limited OTA
Updates
(Infotainment)
Life of an Average Vehicle = 11.5 years
203
5
Development &
Production
95. 13
THE MIGRATION CHALLENGE
KEY ESTABLISHMENT vs AUTHENTICATION
Key establishment can be easily upgraded because the
client and server negotiate which algorithm to use.
1) Use quantum-safe key transport or key agreement
algorithms
2) Use hybrid keys, a mix of both classic and
quantum-safe algorithms
The complexity and interconnectivity of public
key infrastructure demands action today in order
to be ready for the quantum age, and difficult to
do while maintaining backward compatibility.
96. 14
There’s more than
4.5 million active users
in the DoD identity
management system.
Creating a quantum-safe duplicate
infrastructure is time-consuming
and cost prohibitive.
HIGH RISK: PKIs not Crypto-Agile
98. 16
Quantum Key Distribution
(QKD)
QKD uses individual photons for the
exchange of cryptographic key data
between two users
Each photon = a single bit of data
QKD has the potential to be foolproof.
If an eavesdropper intercepts the
photon to determine its polarization,
the entire process is corrupted
China has invested heavily ($25B)
in quantum with focus on QKD
with Micius satellite
99. 17
The “NEW” Math
Standards Ready
Analysis Complete
Formal Call for
Submissions
Initial Submissions: 82
Accepted Submissions: 69
1st
NIST PQC
Standardization
Conference
NIST Round 2
Announcement
Signature: 9
Key Encapsulation: 17
2nd
NIST PQC
Standardization
Conference
Today
NSA Suite-B
Announcement
NIST Round 3 Announcement
Signature: 3 finalist, 3 alternates
Key Encapsulation: 4 finalists, 5
alternates
Statefu
l
Hashe
s
Lattice
s
Isogen
y
Code
s
Multivariat
e
“As the replacements for currently standardized public key algorithms are not yet ready, a focus on maintaining crypto agility is imperative.”
“Report on Post-Quantum Cryptography”, NIST, April 2016
2019 2020
2018
2017
2016
2015 2021 2022 2023 2024
Stateles
s
Hashes
Signing solutions & hybrid PQC certificates already commercially available
100. 18
ETA 2024, NIST Standardized Quantum-Safe
Algorithms Finalized as “Suite ?”
101. 19
Pervasive Cryptography Enables
Entire Enterprise Infrastructure Stack
USER Users Customers Partners
CRYPTOGRAPHY
ADMIN Employees Suppliers Contractors
CRYPTOGRAPHY
ARCH Cloud Hybrid On-Prem
CRYPTOGRAPHY
PLATFORM Build
Open
Source
Vendor
CRYPTOGRAPHY
IDENTITY Internal Federated External
One Quantum Attack Can
Take Down the Entire Enterprise
We depend on cryptography
at all transition points to ensure
authentication and security
50-year old algorithms nearing end-of-life
FOUNDATION OF DIGITAL TRUST
19
102. 20
The Problem:
Cryptographic Exposure Is
a Massive Blind Spot Companies Need to
USER Users Customers Partners
CRYPTOGRAPHY
ADMIN Employees Suppliers Contractors
CRYPTOGRAPHY
ARCH Cloud Hybrid On-Prem
CRYPTOGRAPHY
PLATFORM Build
Open
Source
Vendor
CRYPTOGRAPHY
IDENTITY Internal Federated External
Inflexible deployments
Not discoverable
Not manageable
Security and risk management leaders responsible
for application and data security must prepare for
the migration to postquantum algorithms by
embracing the tenants of crypto-agility, knowing what
the organization’s cryptographic dependencies are
and how to replace them over time.
− Mark Horvath, “Plan Now for Quantum Computing,
Postquantum Cryptography and Security”, August 2017, Gartner
REMEDIATE to protect their infrastructure
and maintain performance
2
UNDERSTAND their cryptographic risk
1
20
103. 21
Cryptographic Agility Becomes a Priority
Discovery, cataloging and triaging is
difficult, manual and error prone
2
Enterprises have a cryptographic
blind spot
1
Largest cryptographic migration ever
must happen quickly
3
In our customers’ words:
▪ Demonstrating to the C-Suite the scale of the cryptographic
migration challenge is critical but has been virtually impossible
▪ Cryptographic compliance standards exist everywhere, and yet
repeatable compliance tracking is very expensive
▪ Past audits were insufficient to serve as a basis for significant
allocation of resources to accomplish migration
▪ Cryptographic migrations are typically done manually, are very
error prone and take significantly longer than planned
▪ No automated tools exist to flag new cryptographic vulnerabilities
when new application(s)/service(s) are deployed
104. 22
Contact us for more information
www.isara.com
quantumsafe@isara.com
Join us on social
@ISARACorp @ISARACorp @ISARA Corporation
105. Long-Term Thinking for Quantum Computing
Paul Lopata, PhD
Principal Director for Quantum Science
Office of the Under Secretary of Defense Research & Engineering
April 2021
Overall Briefing Classification: UNCLASSIFIED
CLEARED
For Open Publication
Department of Defense
OFFICE OF PREPUBLICATION AND SECURITY REVIEW
Mar 22, 2021
SLIDES ONLY
NO SCRIPT PROVIDED
106. The U.S. Military Has a Long History with
New Computing Machines
2
UNCLASSIFIED
108. A DoD Basic Research Success Story
4
UNCLASSIFIED
1990 2000 2010 2020
BLACK: Quantum Computing
ORANGE: Quantum Networking
BLUE: Quantum Sensing
GREEN: Atomic Clocks
109. USD(R&E) Quantum Computing Roadmap
Fault‐Tolerant Phase
Discovery Phase Error‐Limited Phase
Invention: theory
of quantum computing
First qubit
First
multi‐qubit
algorithms Quantum
supremacy
first declared
Quantum advantage
using quantum
co‐processors
Algorithmic
error‐correction
Quantum
advantage for
hard DoD problems
1980 2020
Fault‐tolerant
machines
5
UNCLASSIFIED
110. Three Steps to Long-Term Thinking in QC
1. Align to your
organization’s values
6
UNCLASSIFIED
111. Three Steps to Long-Term Thinking in QC
2. Build your internal
expertise
7
UNCLASSIFIED
112. Three Steps to Long-Term Thinking in QC
3. Partner with like‐
minded organizations
8
UNCLASSIFIED