SlideShare a Scribd company logo
Quantum Cryptography
Opportunities and Threats in Quantum Computing
Agenda
1. Introduction to Cryptologic Terminology
2. Introduction to Quantum Mechanics and Quantum Computing
3. Quantum Cryptanalysis
4. Quantum Cryptography
5. Conclusions
Cryptologic Terminology
4

Protecting Data
Basic Terminology
Cryptography / Encryption: Writing and reading encoded data
Cryptology (“Crypto”): Study of encryption and decryption
Key: Sensitive element to decrypt a message
Encryption Terminology
Ciphertext: Result of passing a secret through a cipher
Plaintext / Cleartext: Decrypted secret protected by a cipher
E(Data = “ABC”, Key = “123”) = 0x566030c4
E(Data = “ABC”, Key = “123”) = 0x566030c4
5

Symmetric Key Cryptography
Encryption that uses the same key to decrypt and encrypt data.
Examples: AES-256, 3DES, Blowfish
6

Asymmetric Encryption and Public Key Cryptography
Encryption that uses separate keys for encrypting and decrypting
data. In some asymmetric cryptosystems, one key is publicized
(Public Key Cryptography / PKI)
7

Cryptographic Hash Algorithms
One way encoding that maps data of varying size to a fixed size string
while minimizing collisions (when 2 hashes of different input are the
same)
Examples: SHA-256, BLAKE
8

Side Channel Attacks - Go Around the Math
Breaking encryption by attacking the implementation of a cipher or
stealing data before it can enter the cipher
9

Cryptanalysis - Break Through the Math
Breaking encryption by using mathematical analysis or advanced
computing for reducing the difficulty of guessing ciphertext or key
Quantum Mechanics and
Quantum Computing
1
1
Quantum Superposition and Entanglement
Superposition: The quantum state of a subatomic particle is a
function of the interaction of its components.
Entanglement: When two quantum particles meet or are created in
such a way that their state is inseparable (position of one is a
function of the position of another - coherance)
Example: When two waves collide, the
geometry of one wave is a function of the
other wave’s collision
1
2
Observer Effect and Quantum Uncertainty
Two key properties distinguish quantum mechanics from classical
mechanics
Quantum Uncertainty: We can’t directly observe the exact position
and velocity of a quantum particle. Quantum states are probabilistic
and cover a spread of possibilities (a PDF) with position determined
by statistical analysis of a result (expected value of the PDF).
Observer Effect: When we measure a quantum system we break its
coherence and have to start over.
1
3
Qubits: The Basic Unit of Quantum Computing
A qubit is a quantum version of the bit used in digital computing. It
contains two base states of 0 and 1, but due to superposition and
quantum mechanics an array of n-qubits can simultaneously
represent 2^n states
1
4
Quantum Logic Gates (QLGs)
Like logic gates that run digital circuits, quantum logic gates simulate boolean logic
that can be used to evaluate expressions by forcing interactions between qubits to
make them coherent.
Most QLGs rely on the measured interaction of lasers in an isolated, measurable
environment. Data sent through QLGs is lossless and moves at the speed of light.
1
5
Problems with QLGs: Measurement and Error
Unfortunately constructing QLGs is hard:
Isolation: Other factors may impact a quantum system and
decohere its QLGs
Uncertainty: Never know the explicit state of a qubit, only a range of
potential results
Observer Effect: Once a QLG is measured, it is docherent
1
6
Why Computing on QLGs is Hard
Quantum computing is like measuring
the brief rise in water levels in a small
puddle when two pebbles fall in
simulteanously...
...at night, by hand with a tape measure,
during a typhoon.
1
7
Quantum Computers and Quantum Computing (QC)
Assemblies of quantum logic gates that can evaluate the results of
qubit interactions
Solves some problems faster than classical
computers via quantum parallelism:
exploiting superposition and entanglement
to run calculations across an array of gates
simultaneously
Very hard and expensive to build/run due
to measurement and error issues.
1
8
Quantum Algorithms
Algorithms that take advantage of quantum computing to propose
novel, high-performance solutions to classically difficult problems
Quantum Cryptanalysis
2
0
Shor’s Algorithm
Significantly reduces the difficulty of factoring large prime numbers
2
1
Grover’s Algorithm
Reduces the difficulty in searching for the unique input of a “black
box” function that produces a given output (linear to sub-linear time)
2
2
QC Risks for Existing Cryptography
Type of Cryptography Risk from QC Response
Cryptographic Hashes
Low: Grover’s Algorithm
moderately speeds up pre-image
attacks to search for hashes
No serious risk due to anti-collision
size protections in cyptographic
hashes. Some cryptocurrencies will
need to change their mining
algorithms (e.g.: Proof of Work)
Symmetric Crypto
Moderate: Grover’s Algorithm
speeds up brute force attacks
Double bit length of all symmetric
key cryptography
Asymmetric Crypto (PKI)
Very High: Shor’s Algorithm makes
integer factorization computationally
easy, invalidating the security of
most asymmetric crypto and PKI
Develop new PKI algorithms that
are quantum-secure (i.e.:
post-quantum cryptography)
2
3
Changes to FIPS 140-2 due to Quantum Computing
NIST has begun a Post Quantum
Cryptography Standardization program to
introduce new cryptographic standards to
FIPS 140-2
Currently reviewing alternatives to RSA,
ECDSA, and Diffie-Hellman
Planned draft changes to FIPS 140-2
beginning in 2022
Quantum Cryptography
2
5
Quantum Key Exchange (QKE)
Comprise a symmetric key for use between two parties by entangling
arrays of matching qubits and performing operations on the coherent
systems. Eavesdropping the system breaks coherence.
QKE implemented in CN/AUS satellite system in 2018
2
6
Quantum Coin Flipping
Zero-trust system for “cryptographic escrow” where two parties can create
a self-certifying ledger of transactions that, once mutually verified, creates
a shared key or secret.
Lossless transmission
Detects eavesdropping
Certifiable by both parties
Very hard to implement
Conclusions
2
8
TL;DR
We need new asymmetric cryptography / PKI
Quantum computing algorithms threaten prime factorization-based cryptography like
RSA and Diffie-Hellman, as well as cryptographic hash algorithms based on PKI
We need to increase key length for symmetric key crypto
Grover’s Algorithm requires us to double the key length for symmetric key
cryptography like AES (as well as some cryptographic hash algorithms)
...but this is not the “cryptopocalypse”
Not all cryptography is rendered insecure by QC (example: hashing) and new
methods for safeguarding data are provided by advances in quantum computing

More Related Content

What's hot

Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
skadyan1
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
sahilnarvekar
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
Information Security Awareness Group
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Swasat Dutta
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
namanthakur
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
Ruwan Ranganath
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
pixiejen
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
 
Quantum
QuantumQuantum
Quantum
saba majeed
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
James McGivern
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
Samy Shehata
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Martins Okoi
 
Post Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersPost Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging Frontiers
Gokul Alex
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Samy Shehata
 
I mage encryption using rc5
I mage encryption using rc5I mage encryption using rc5
I mage encryption using rc5Suramrit Singh
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
JPINFOTECH JAYAPRAKASH
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
JPINFOTECH JAYAPRAKASH
 

What's hot (20)

Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Quantum
QuantumQuantum
Quantum
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Post Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersPost Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging Frontiers
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
I mage encryption using rc5
I mage encryption using rc5I mage encryption using rc5
I mage encryption using rc5
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
 

Similar to Introduction to Quantum Cryptography

Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
IRJET Journal
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
Minahilnuman1
 
Physics 498 SQD -- Lecture 21---Quantum Information 1 FINAL.pptx
Physics 498 SQD -- Lecture 21---Quantum Information 1 FINAL.pptxPhysics 498 SQD -- Lecture 21---Quantum Information 1 FINAL.pptx
Physics 498 SQD -- Lecture 21---Quantum Information 1 FINAL.pptx
Raja Shekar
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
gitrahekno
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
RohanTakke
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
Software Guru
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Krishna Patel
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
RonSteinfeld1
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
Ahmed Banafa
 
Quantum computation a review
Quantum computation a reviewQuantum computation a review
Quantum computation a review
Editor Jacotech
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
GDSC PJATK
 
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
msajmani2704
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
Milos Dunjic
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
Fenny Thakrar
 
quantumcomputingbysandy-170310190433.pdf
quantumcomputingbysandy-170310190433.pdfquantumcomputingbysandy-170310190433.pdf
quantumcomputingbysandy-170310190433.pdf
AjayRaj912848
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Deepankar Sandhibigraha
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
IRJET Journal
 
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers securityDEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
Felipe Prado
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
Object Automation
 
Tears for quantum fears
Tears for quantum fearsTears for quantum fears
Tears for quantum fears
Mark Carney
 

Similar to Introduction to Quantum Cryptography (20)

Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
 
Physics 498 SQD -- Lecture 21---Quantum Information 1 FINAL.pptx
Physics 498 SQD -- Lecture 21---Quantum Information 1 FINAL.pptxPhysics 498 SQD -- Lecture 21---Quantum Information 1 FINAL.pptx
Physics 498 SQD -- Lecture 21---Quantum Information 1 FINAL.pptx
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Quantum computation a review
Quantum computation a reviewQuantum computation a review
Quantum computation a review
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
2K20_CO_258 QUANTUM COMPUTING ASSIGNMENT.pptx
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
 
quantumcomputingbysandy-170310190433.pdf
quantumcomputingbysandy-170310190433.pdfquantumcomputingbysandy-170310190433.pdf
quantumcomputingbysandy-170310190433.pdf
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
 
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers securityDEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
 
Quantum & AI in Finance
Quantum & AI in FinanceQuantum & AI in Finance
Quantum & AI in Finance
 
Tears for quantum fears
Tears for quantum fearsTears for quantum fears
Tears for quantum fears
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Introduction to Quantum Cryptography

  • 1. Quantum Cryptography Opportunities and Threats in Quantum Computing
  • 2. Agenda 1. Introduction to Cryptologic Terminology 2. Introduction to Quantum Mechanics and Quantum Computing 3. Quantum Cryptanalysis 4. Quantum Cryptography 5. Conclusions
  • 4. 4  Protecting Data Basic Terminology Cryptography / Encryption: Writing and reading encoded data Cryptology (“Crypto”): Study of encryption and decryption Key: Sensitive element to decrypt a message Encryption Terminology Ciphertext: Result of passing a secret through a cipher Plaintext / Cleartext: Decrypted secret protected by a cipher E(Data = “ABC”, Key = “123”) = 0x566030c4 E(Data = “ABC”, Key = “123”) = 0x566030c4
  • 5. 5  Symmetric Key Cryptography Encryption that uses the same key to decrypt and encrypt data. Examples: AES-256, 3DES, Blowfish
  • 6. 6  Asymmetric Encryption and Public Key Cryptography Encryption that uses separate keys for encrypting and decrypting data. In some asymmetric cryptosystems, one key is publicized (Public Key Cryptography / PKI)
  • 7. 7  Cryptographic Hash Algorithms One way encoding that maps data of varying size to a fixed size string while minimizing collisions (when 2 hashes of different input are the same) Examples: SHA-256, BLAKE
  • 8. 8  Side Channel Attacks - Go Around the Math Breaking encryption by attacking the implementation of a cipher or stealing data before it can enter the cipher
  • 9. 9  Cryptanalysis - Break Through the Math Breaking encryption by using mathematical analysis or advanced computing for reducing the difficulty of guessing ciphertext or key
  • 11. 1 1 Quantum Superposition and Entanglement Superposition: The quantum state of a subatomic particle is a function of the interaction of its components. Entanglement: When two quantum particles meet or are created in such a way that their state is inseparable (position of one is a function of the position of another - coherance) Example: When two waves collide, the geometry of one wave is a function of the other wave’s collision
  • 12. 1 2 Observer Effect and Quantum Uncertainty Two key properties distinguish quantum mechanics from classical mechanics Quantum Uncertainty: We can’t directly observe the exact position and velocity of a quantum particle. Quantum states are probabilistic and cover a spread of possibilities (a PDF) with position determined by statistical analysis of a result (expected value of the PDF). Observer Effect: When we measure a quantum system we break its coherence and have to start over.
  • 13. 1 3 Qubits: The Basic Unit of Quantum Computing A qubit is a quantum version of the bit used in digital computing. It contains two base states of 0 and 1, but due to superposition and quantum mechanics an array of n-qubits can simultaneously represent 2^n states
  • 14. 1 4 Quantum Logic Gates (QLGs) Like logic gates that run digital circuits, quantum logic gates simulate boolean logic that can be used to evaluate expressions by forcing interactions between qubits to make them coherent. Most QLGs rely on the measured interaction of lasers in an isolated, measurable environment. Data sent through QLGs is lossless and moves at the speed of light.
  • 15. 1 5 Problems with QLGs: Measurement and Error Unfortunately constructing QLGs is hard: Isolation: Other factors may impact a quantum system and decohere its QLGs Uncertainty: Never know the explicit state of a qubit, only a range of potential results Observer Effect: Once a QLG is measured, it is docherent
  • 16. 1 6 Why Computing on QLGs is Hard Quantum computing is like measuring the brief rise in water levels in a small puddle when two pebbles fall in simulteanously... ...at night, by hand with a tape measure, during a typhoon.
  • 17. 1 7 Quantum Computers and Quantum Computing (QC) Assemblies of quantum logic gates that can evaluate the results of qubit interactions Solves some problems faster than classical computers via quantum parallelism: exploiting superposition and entanglement to run calculations across an array of gates simultaneously Very hard and expensive to build/run due to measurement and error issues.
  • 18. 1 8 Quantum Algorithms Algorithms that take advantage of quantum computing to propose novel, high-performance solutions to classically difficult problems
  • 20. 2 0 Shor’s Algorithm Significantly reduces the difficulty of factoring large prime numbers
  • 21. 2 1 Grover’s Algorithm Reduces the difficulty in searching for the unique input of a “black box” function that produces a given output (linear to sub-linear time)
  • 22. 2 2 QC Risks for Existing Cryptography Type of Cryptography Risk from QC Response Cryptographic Hashes Low: Grover’s Algorithm moderately speeds up pre-image attacks to search for hashes No serious risk due to anti-collision size protections in cyptographic hashes. Some cryptocurrencies will need to change their mining algorithms (e.g.: Proof of Work) Symmetric Crypto Moderate: Grover’s Algorithm speeds up brute force attacks Double bit length of all symmetric key cryptography Asymmetric Crypto (PKI) Very High: Shor’s Algorithm makes integer factorization computationally easy, invalidating the security of most asymmetric crypto and PKI Develop new PKI algorithms that are quantum-secure (i.e.: post-quantum cryptography)
  • 23. 2 3 Changes to FIPS 140-2 due to Quantum Computing NIST has begun a Post Quantum Cryptography Standardization program to introduce new cryptographic standards to FIPS 140-2 Currently reviewing alternatives to RSA, ECDSA, and Diffie-Hellman Planned draft changes to FIPS 140-2 beginning in 2022
  • 25. 2 5 Quantum Key Exchange (QKE) Comprise a symmetric key for use between two parties by entangling arrays of matching qubits and performing operations on the coherent systems. Eavesdropping the system breaks coherence. QKE implemented in CN/AUS satellite system in 2018
  • 26. 2 6 Quantum Coin Flipping Zero-trust system for “cryptographic escrow” where two parties can create a self-certifying ledger of transactions that, once mutually verified, creates a shared key or secret. Lossless transmission Detects eavesdropping Certifiable by both parties Very hard to implement
  • 28. 2 8 TL;DR We need new asymmetric cryptography / PKI Quantum computing algorithms threaten prime factorization-based cryptography like RSA and Diffie-Hellman, as well as cryptographic hash algorithms based on PKI We need to increase key length for symmetric key crypto Grover’s Algorithm requires us to double the key length for symmetric key cryptography like AES (as well as some cryptographic hash algorithms) ...but this is not the “cryptopocalypse” Not all cryptography is rendered insecure by QC (example: hashing) and new methods for safeguarding data are provided by advances in quantum computing