Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoVishnu Pendyala
Quantum computing is said to break the Internet by making the underlying encryption ineffective. This session, hosted by ICON@Cisco tells you how Quantum cryptography, which has the potential to protect the Internet, works.
www.lifein01.com - for more info
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best-known example of quantum cryptography is a quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. The advantage lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. It is impossible to copy data encoded in a quantum state.
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. Currently used popular public-key encryption and signature schemes can be broken by quantum adversaries. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. For example, it is impossible to copy data encoded in a quantum state and the very act of reading data encoded in a quantum state changes the state. This is used to detect eavesdropping in quantum key distribution.
Alice and Bob’s quest through the fascinating quantum mechanics world as a way to avoid archvilainess Eve eavesdropping. In 1994, Peter Shor showed that many of the cryptosystems used today can be broken using a quantum computer. This idea will be explained together with a short overview of qubit systems. Next, we will see how quantum computing gives rise to the possibility of quantum key distribution with unparalleled security. We will end with a brief discussion on post-quantum cryptography concepts.
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoVishnu Pendyala
Quantum computing is said to break the Internet by making the underlying encryption ineffective. This session, hosted by ICON@Cisco tells you how Quantum cryptography, which has the potential to protect the Internet, works.
www.lifein01.com - for more info
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best-known example of quantum cryptography is a quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. The advantage lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. It is impossible to copy data encoded in a quantum state.
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. Currently used popular public-key encryption and signature schemes can be broken by quantum adversaries. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. For example, it is impossible to copy data encoded in a quantum state and the very act of reading data encoded in a quantum state changes the state. This is used to detect eavesdropping in quantum key distribution.
Alice and Bob’s quest through the fascinating quantum mechanics world as a way to avoid archvilainess Eve eavesdropping. In 1994, Peter Shor showed that many of the cryptosystems used today can be broken using a quantum computer. This idea will be explained together with a short overview of qubit systems. Next, we will see how quantum computing gives rise to the possibility of quantum key distribution with unparalleled security. We will end with a brief discussion on post-quantum cryptography concepts.
The role of quantum cryptography in today's world and how it was used in the 2003 fifa world cup and the advances quantum cryptography is making in providing security and showing that how it is next step in the security world.
PUT my all effort to make quantum cryptography easily understandable by the help of basics n videos.Its enough to give you better knowledge about quantum cryptography. Its really interesting topic ;).
Introduction of quantum cryptography
basic definition of quantum
History of quantum cryptography
need of quantum cryptography
key distribution
eves dropping
error
noise
error correction
advantages
disadvantages
conclusion
Slides from the presentation "Modern Cryptography" delivered at Deovxx UK 2013. See Parleys.com for the full video https://www.parleys.com/speaker/5148920c0364bc17fc5697a5
A brief presentation on Position-Based, Device-Independent and Post Quantum Cryptographies. Detailing Position-Based QC, defining Device-Independent QC and discussing Post Device-Independent.
Post Quantum Cryptography - Emerging FrontiersGokul Alex
Emerging frontiers in Post Quantum Cryptography such as Lattice based Cryptography, Code based Cryptography, Super Elliptical Curve Isogeny based Cryptography etc. and an introduction into Zero Knowledge Proof.
The role of quantum cryptography in today's world and how it was used in the 2003 fifa world cup and the advances quantum cryptography is making in providing security and showing that how it is next step in the security world.
PUT my all effort to make quantum cryptography easily understandable by the help of basics n videos.Its enough to give you better knowledge about quantum cryptography. Its really interesting topic ;).
Introduction of quantum cryptography
basic definition of quantum
History of quantum cryptography
need of quantum cryptography
key distribution
eves dropping
error
noise
error correction
advantages
disadvantages
conclusion
Slides from the presentation "Modern Cryptography" delivered at Deovxx UK 2013. See Parleys.com for the full video https://www.parleys.com/speaker/5148920c0364bc17fc5697a5
A brief presentation on Position-Based, Device-Independent and Post Quantum Cryptographies. Detailing Position-Based QC, defining Device-Independent QC and discussing Post Device-Independent.
Post Quantum Cryptography - Emerging FrontiersGokul Alex
Emerging frontiers in Post Quantum Cryptography such as Lattice based Cryptography, Code based Cryptography, Super Elliptical Curve Isogeny based Cryptography etc. and an introduction into Zero Knowledge Proof.
Criptografía cuántica - fundamentos, productos y empresasSoftware Guru
La criptografía cuántica es una de las joyas de la corona del cómputo cuántico. Además de conocerse a detalle el fundamento teórico de los protocolos de esta disciplina, se ha hecho investigación experimental por más de dos décadas y, como resultado, existen ya equipos de criptografía cuántica que se pueden comprar e instalar bajo la lógica de cualquier producto comercial.
En esta plática, titulada “Criptografía cuántica - fundamentos, productos y empresas”, el Dr Venegas Andraca dará una introducción concisa a los protocolos de criptografía cuántica BB84 y EK91, describirá las ventajas que estos protocolos tienen respecto de protocolos populares de criptografía convencional, expondrá las restricciones tecnológicas de BB84 y EK91, presentará los equipos de criptografía cuántica disponibles en el mercado y dará un análisis sucinto de las estimaciones de crecimiento comercial de esta disciplina.
This presentation is about quantum computing.which going to be new technological concept for computer operating system.In this subject the research is going on.
We discuss the emerging threat and implications of quantum computing technology on the security of cryptosystems currently deployed in applications, and why system designers should consider addressing this risk already in the near term. We then discuss an overview of the current approaches for building quantum safe cryptosystems and their security and performance aspects. We conclude with a glimpse at the state of the art and research challenges in the area of quantum-safe cryptography, including the design of more advanced quantum-safe cryptographic protocols, such as privacy-preserving cryptocurrencies.
Quantum Computing and Blockchain: Facts and Myths Ahmed Banafa
The biggest danger to Blockchain networks from quantum computing is its ability to break traditional encryption . Google sent shock waves around the internet when it was claimed, had built a quantum computer able to solve formerly impossible mathematical calculations–with some fearing crypto industry could be at risk . Google states that its experiment is the first experimental challenge against the extended Church-Turing thesis — also known as computability thesis — which claims that traditional computers can effectively carry out any “reasonable” model of computation
Pulse Compression Sequence (PCS) are widely used in radar to increase the range resolution. Binary sequence has the limitation that the compression ratio is small. Ternary code is suggested as an alternative. The design of ternary sequence with good Discriminating Factor (DF) and merit factor can be considered as a nonlinear multivariable optimization problem which is difficult to solve. In this paper, we proposed a new method for designing ternary sequence by using Modified Simulated Annealing Algorithm (MSAA). The general features such as global convergence and robustness of the statistical algorithm are revealed.
Why Should You Pay Attention To Quantum Computing?Milos Dunjic
Quantum computing, is an exciting and rather unusual field of informatics. Recently I had privilege to participate on The Quantum Panel, as part of the Payments Canada conference, where I shared some of my view with wider audience.
This is a seminar on Quantum Computing given on 9th march 2017 at CIME, Bhubaneswar by me(2nd year MCA).
Video at - https://youtu.be/vguxg0RYg7M
PDF at - http://www.slideshare.net/deepankarsandhibigraha/quantum-computing-73031375
An overview of how 'quantum' will affect cybersecurity - from cryptography to quantum computing algorithms, we will look at how quantum will affect what we do in information security.
Similar to Introduction to Quantum Cryptography (20)
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
4. 4

Protecting Data
Basic Terminology
Cryptography / Encryption: Writing and reading encoded data
Cryptology (“Crypto”): Study of encryption and decryption
Key: Sensitive element to decrypt a message
Encryption Terminology
Ciphertext: Result of passing a secret through a cipher
Plaintext / Cleartext: Decrypted secret protected by a cipher
E(Data = “ABC”, Key = “123”) = 0x566030c4
E(Data = “ABC”, Key = “123”) = 0x566030c4
6. 6

Asymmetric Encryption and Public Key Cryptography
Encryption that uses separate keys for encrypting and decrypting
data. In some asymmetric cryptosystems, one key is publicized
(Public Key Cryptography / PKI)
7. 7

Cryptographic Hash Algorithms
One way encoding that maps data of varying size to a fixed size string
while minimizing collisions (when 2 hashes of different input are the
same)
Examples: SHA-256, BLAKE
8. 8

Side Channel Attacks - Go Around the Math
Breaking encryption by attacking the implementation of a cipher or
stealing data before it can enter the cipher
9. 9

Cryptanalysis - Break Through the Math
Breaking encryption by using mathematical analysis or advanced
computing for reducing the difficulty of guessing ciphertext or key
11. 1
1
Quantum Superposition and Entanglement
Superposition: The quantum state of a subatomic particle is a
function of the interaction of its components.
Entanglement: When two quantum particles meet or are created in
such a way that their state is inseparable (position of one is a
function of the position of another - coherance)
Example: When two waves collide, the
geometry of one wave is a function of the
other wave’s collision
12. 1
2
Observer Effect and Quantum Uncertainty
Two key properties distinguish quantum mechanics from classical
mechanics
Quantum Uncertainty: We can’t directly observe the exact position
and velocity of a quantum particle. Quantum states are probabilistic
and cover a spread of possibilities (a PDF) with position determined
by statistical analysis of a result (expected value of the PDF).
Observer Effect: When we measure a quantum system we break its
coherence and have to start over.
13. 1
3
Qubits: The Basic Unit of Quantum Computing
A qubit is a quantum version of the bit used in digital computing. It
contains two base states of 0 and 1, but due to superposition and
quantum mechanics an array of n-qubits can simultaneously
represent 2^n states
14. 1
4
Quantum Logic Gates (QLGs)
Like logic gates that run digital circuits, quantum logic gates simulate boolean logic
that can be used to evaluate expressions by forcing interactions between qubits to
make them coherent.
Most QLGs rely on the measured interaction of lasers in an isolated, measurable
environment. Data sent through QLGs is lossless and moves at the speed of light.
15. 1
5
Problems with QLGs: Measurement and Error
Unfortunately constructing QLGs is hard:
Isolation: Other factors may impact a quantum system and
decohere its QLGs
Uncertainty: Never know the explicit state of a qubit, only a range of
potential results
Observer Effect: Once a QLG is measured, it is docherent
16. 1
6
Why Computing on QLGs is Hard
Quantum computing is like measuring
the brief rise in water levels in a small
puddle when two pebbles fall in
simulteanously...
...at night, by hand with a tape measure,
during a typhoon.
17. 1
7
Quantum Computers and Quantum Computing (QC)
Assemblies of quantum logic gates that can evaluate the results of
qubit interactions
Solves some problems faster than classical
computers via quantum parallelism:
exploiting superposition and entanglement
to run calculations across an array of gates
simultaneously
Very hard and expensive to build/run due
to measurement and error issues.
18. 1
8
Quantum Algorithms
Algorithms that take advantage of quantum computing to propose
novel, high-performance solutions to classically difficult problems
21. 2
1
Grover’s Algorithm
Reduces the difficulty in searching for the unique input of a “black
box” function that produces a given output (linear to sub-linear time)
22. 2
2
QC Risks for Existing Cryptography
Type of Cryptography Risk from QC Response
Cryptographic Hashes
Low: Grover’s Algorithm
moderately speeds up pre-image
attacks to search for hashes
No serious risk due to anti-collision
size protections in cyptographic
hashes. Some cryptocurrencies will
need to change their mining
algorithms (e.g.: Proof of Work)
Symmetric Crypto
Moderate: Grover’s Algorithm
speeds up brute force attacks
Double bit length of all symmetric
key cryptography
Asymmetric Crypto (PKI)
Very High: Shor’s Algorithm makes
integer factorization computationally
easy, invalidating the security of
most asymmetric crypto and PKI
Develop new PKI algorithms that
are quantum-secure (i.e.:
post-quantum cryptography)
23. 2
3
Changes to FIPS 140-2 due to Quantum Computing
NIST has begun a Post Quantum
Cryptography Standardization program to
introduce new cryptographic standards to
FIPS 140-2
Currently reviewing alternatives to RSA,
ECDSA, and Diffie-Hellman
Planned draft changes to FIPS 140-2
beginning in 2022
25. 2
5
Quantum Key Exchange (QKE)
Comprise a symmetric key for use between two parties by entangling
arrays of matching qubits and performing operations on the coherent
systems. Eavesdropping the system breaks coherence.
QKE implemented in CN/AUS satellite system in 2018
26. 2
6
Quantum Coin Flipping
Zero-trust system for “cryptographic escrow” where two parties can create
a self-certifying ledger of transactions that, once mutually verified, creates
a shared key or secret.
Lossless transmission
Detects eavesdropping
Certifiable by both parties
Very hard to implement
28. 2
8
TL;DR
We need new asymmetric cryptography / PKI
Quantum computing algorithms threaten prime factorization-based cryptography like
RSA and Diffie-Hellman, as well as cryptographic hash algorithms based on PKI
We need to increase key length for symmetric key crypto
Grover’s Algorithm requires us to double the key length for symmetric key
cryptography like AES (as well as some cryptographic hash algorithms)
...but this is not the “cryptopocalypse”
Not all cryptography is rendered insecure by QC (example: hashing) and new
methods for safeguarding data are provided by advances in quantum computing