SlideShare a Scribd company logo
THE TRUST LAYER OF THE INTERNET
Quantum computing
and cryptography
HeadofCryptography
AtulLuykx
Warning: Inthis presentation, Crypto = Cryptography
Applications of
Quantum Computing
Scott Aaronson, “The Limits of
Quantum Computers,” Scientific
American, 2008
“… [quantum computers] would provide
dramatic speedups for a few specific
problems… For other problems, however—
such as playing chess, scheduling airline
flights and proving theorems—evidence now
strongly suggests that quantum computers
would suffer from many of the same
algorithmic limitations as today’s classical
computers.”
The Exception:
Cryptography
The Exception:
Cryptography
Introduction
• Head of Cryptography at Hedera
• Research Scientist at Visa Research
• Post-doc at KU Leuven and UC Davis
• PhD at KU Leuven
Case Study: Bitcoin transaction
Unlock Phone1.
2. Prepare Transaction
3. Send to blockchain
Case Study: Bitcoin transaction
Unlock Phone1.
2. Prepare Transaction
3. Send to blockchain
Secret-Key Cryptography
Aka symmetric-key crypto
• Example: AES (Advanced Encryption Standard)
• Impact of quantum computing: negligible,
assuming you switch to a larger key size
= 1011
Attempt Success?
0000
0001
0010
0011
0100
0101
…
N
N
N
N
N
N
…
Classical
Quantum
Grover’s algorithm
2k
2(k/2)
AES128
k-bit key
2128
264
AES256 2256
2128
Step 3: Sending to the blockchain
Unlock Phone1.
2. Prepare Transaction
3. Send to blockchain nonce
• Proof-of-work puzzle
constructed with hash functions
• Example: SHA-256
Cryptographic Hash functions
• Best known method of solving proof-of-work puzzle:
brute-force
• Grover’s algorithm
• Impact: negligible, increase hash function output,
increase difficulty
Preparing a Bitcoin Transaction
Unlock Phone1.
2. Prepare Transaction
3. Send to blockchain
From: you
To: friend
Amount: 1 BTC
…
Digital Signature
Purpose: ensures
transaction is authorized by
sender
Digital signature
• Type of public-key cryptography
• Example: RSA 3084, ECDSA
• Vulnerable to quantum computers --- ability
to recover keys using Shor’s algorithm
From: you
To: friend
Amount: 1 BTC
…
Valid/Invalid
Public Key
(ID)
Flame Malware
• Discovered in 2012
• Used for espionage
• Forged a Microsoft certificate to gain
access to systems
• Found a new cryptographic attack against
an algorithm which was widely known by
academics to be broken (MD5)
• Estimated that the malware was active for
as many as 5 years before its discovery
• Powerful attack: undetected, widely
applicable
Summary of
Impact• Secret key cryptography: increase the key length
• Hash functions: increase output size
• Digital signatures, public key cryptography --- need entirely different
algorithms
Next steps
• How much time do we have?
• What can we do about the attacks against public key crypto?
How much time do we have
• Current quantum computers < 100
qubits
• Qubits are noisy --- require error
correction to operate reliably
• Best attacks need 1000’s of logical
qubits
• With error correction, up to 100 000’s
• Estimates range from 200 qubits to
0.5 million qubits in 10 years
What solutions are there?
• Significant amount of
research on post-quantum
crypto
• Lattices
• Hash functions
• Code-based
• Multivariate
• NIST competition
Image source: Nick Matthewson’s talk at the Second PQC
Standardization Conference
Conclusions
• Wait and see
• Await standardization
• Vetting of security of algorithms
• But pay attention! Can’t just ignore crypto
• Need to remain crypto-agile: ability to switch algorithms quickly if necessary
Further reading
Scott Aaron, “The Limits of Quantum Computers”, Scientific American,
2008
http://www.cs.virginia.edu/~robins/The_Limits_of_Quantum_Computers.pdf
Ronald de Wolf, “The Potential Impact of Quantum Computers on Society”,
https://arxiv.org/pdf/1712.05380.pdf
NIST Post-Quantum Cryptography, https://csrc.nist.gov/Projects/Post-
Quantum-Cryptography
Cloudflare Blog on Post-Quantum crypto,
https://blog.cloudflare.com/towards-post-quantum-cryptography-in-tls/
How to factor 2048 bit RSA integers in 8 hours using 20 million noisy
qubits, https://arxiv.org/abs/1905.09749
Quantum attacks on Bitcoin, and how to protect against them,
https://arxiv.org/pdf/1710.10377.pdf

More Related Content

What's hot

Sidechains introduction
Sidechains introductionSidechains introduction
Sidechains introduction
Lin Lin (Wendy)
 
ILP Lightning Talk at the MIT Blockchain Workshop
ILP Lightning Talk at the MIT Blockchain WorkshopILP Lightning Talk at the MIT Blockchain Workshop
ILP Lightning Talk at the MIT Blockchain Workshop
Interledger
 
Cryptographic Agility in Corda
Cryptographic Agility in CordaCryptographic Agility in Corda
Cryptographic Agility in Corda
Guy Hochstetler
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and Algorithms
Gokul Alex
 
Ethereum Intro
Ethereum IntroEthereum Intro
Ethereum Intro
Dejan Radic
 
Intro to smart contract on blockchain en
Intro to smart contract on blockchain enIntro to smart contract on blockchain en
Intro to smart contract on blockchain en
Nicholas Lin
 
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
Romeo Kienzler
 
Altcoins
AltcoinsAltcoins
Altcoins
sameezahur
 
create your own cryptocurrency
create your own cryptocurrencycreate your own cryptocurrency
create your own cryptocurrency
Bellaj Badr
 
TXGX 2019_Sam_Challenges for Blockchain Mass Adoption
TXGX 2019_Sam_Challenges for Blockchain Mass AdoptionTXGX 2019_Sam_Challenges for Blockchain Mass Adoption
TXGX 2019_Sam_Challenges for Blockchain Mass Adoption
Klaytn
 
Hyperledger Lightning Talk
Hyperledger Lightning TalkHyperledger Lightning Talk
Hyperledger Lightning Talk
Andrew Kennedy
 
Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618
Arnaud Le Hors
 
Demystify blockchain development with hyperledger fabric
Demystify blockchain development with hyperledger fabricDemystify blockchain development with hyperledger fabric
Demystify blockchain development with hyperledger fabric
Benjamin Fuentes
 
Ethereum VM and DSLs for Smart Contracts (updated on May 12th 2015)
Ethereum VM and DSLs for Smart Contracts (updated on May 12th 2015)Ethereum VM and DSLs for Smart Contracts (updated on May 12th 2015)
Ethereum VM and DSLs for Smart Contracts (updated on May 12th 2015)
Zvi Avraham
 
Front-End Development for dApps on Tezos
Front-End Development for dApps on TezosFront-End Development for dApps on Tezos
Front-End Development for dApps on Tezos
Neven6
 
Pi network
Pi networkPi network
POA based Side-Chain Architecture
POA based Side-Chain ArchitecturePOA based Side-Chain Architecture
POA based Side-Chain Architecture
Luniverse Dunamu
 
Ethereum wallet Intro 以太坊錢包介紹
Ethereum wallet Intro 以太坊錢包介紹Ethereum wallet Intro 以太坊錢包介紹
Ethereum wallet Intro 以太坊錢包介紹
Nicholas Lin
 
Technical Overview of Tezos
Technical Overview of TezosTechnical Overview of Tezos
Technical Overview of Tezos
TinaBregovi
 
Encode: Intro to Tezos
Encode: Intro to TezosEncode: Intro to Tezos
Encode: Intro to Tezos
TinaBregovi
 

What's hot (20)

Sidechains introduction
Sidechains introductionSidechains introduction
Sidechains introduction
 
ILP Lightning Talk at the MIT Blockchain Workshop
ILP Lightning Talk at the MIT Blockchain WorkshopILP Lightning Talk at the MIT Blockchain Workshop
ILP Lightning Talk at the MIT Blockchain Workshop
 
Cryptographic Agility in Corda
Cryptographic Agility in CordaCryptographic Agility in Corda
Cryptographic Agility in Corda
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and Algorithms
 
Ethereum Intro
Ethereum IntroEthereum Intro
Ethereum Intro
 
Intro to smart contract on blockchain en
Intro to smart contract on blockchain enIntro to smart contract on blockchain en
Intro to smart contract on blockchain en
 
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
Architecture of the Hyperledger Blockchain Fabric - Christian Cachin - IBM Re...
 
Altcoins
AltcoinsAltcoins
Altcoins
 
create your own cryptocurrency
create your own cryptocurrencycreate your own cryptocurrency
create your own cryptocurrency
 
TXGX 2019_Sam_Challenges for Blockchain Mass Adoption
TXGX 2019_Sam_Challenges for Blockchain Mass AdoptionTXGX 2019_Sam_Challenges for Blockchain Mass Adoption
TXGX 2019_Sam_Challenges for Blockchain Mass Adoption
 
Hyperledger Lightning Talk
Hyperledger Lightning TalkHyperledger Lightning Talk
Hyperledger Lightning Talk
 
Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618Hyperledger Fabric Application Development 20190618
Hyperledger Fabric Application Development 20190618
 
Demystify blockchain development with hyperledger fabric
Demystify blockchain development with hyperledger fabricDemystify blockchain development with hyperledger fabric
Demystify blockchain development with hyperledger fabric
 
Ethereum VM and DSLs for Smart Contracts (updated on May 12th 2015)
Ethereum VM and DSLs for Smart Contracts (updated on May 12th 2015)Ethereum VM and DSLs for Smart Contracts (updated on May 12th 2015)
Ethereum VM and DSLs for Smart Contracts (updated on May 12th 2015)
 
Front-End Development for dApps on Tezos
Front-End Development for dApps on TezosFront-End Development for dApps on Tezos
Front-End Development for dApps on Tezos
 
Pi network
Pi networkPi network
Pi network
 
POA based Side-Chain Architecture
POA based Side-Chain ArchitecturePOA based Side-Chain Architecture
POA based Side-Chain Architecture
 
Ethereum wallet Intro 以太坊錢包介紹
Ethereum wallet Intro 以太坊錢包介紹Ethereum wallet Intro 以太坊錢包介紹
Ethereum wallet Intro 以太坊錢包介紹
 
Technical Overview of Tezos
Technical Overview of TezosTechnical Overview of Tezos
Technical Overview of Tezos
 
Encode: Intro to Tezos
Encode: Intro to TezosEncode: Intro to Tezos
Encode: Intro to Tezos
 

Similar to Quantum Computing & Cryptography: A Brief Introduction

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
CSNP
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptx
santa142869
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v eng
David Vangulick
 
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat Security Conference
 
Quantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from ThemQuantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from Them
mapmeld
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
Jae-Yun Kim
 
Is quantum computing an existential threat to blockchain technology
Is quantum computing an existential threat to blockchain technology Is quantum computing an existential threat to blockchain technology
Is quantum computing an existential threat to blockchain technology
Blockchain Council
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
Ahmed Banafa
 
Quantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic ModulesQuantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic Modules
OnBoard Security, Inc. - a Qualcomm Company
 
Blockchain Security in the Quantum Age 2024/03/18
Blockchain Security in the Quantum Age 2024/03/18Blockchain Security in the Quantum Age 2024/03/18
Blockchain Security in the Quantum Age 2024/03/18
Gottfried Szing
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
RonSteinfeld1
 
Why we need censorship-resistant AI
Why we need censorship-resistant AIWhy we need censorship-resistant AI
Why we need censorship-resistant AI
Pandora Boxchain
 
Quantum Secured Blockchain
Quantum Secured BlockchainQuantum Secured Blockchain
Quantum Secured Blockchain
ravi sahal
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
Akshay Shelake
 
Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder  Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder
Ali Al-Sherbaz
 
CryptoQuantumLeap.pdf
CryptoQuantumLeap.pdfCryptoQuantumLeap.pdf
CryptoQuantumLeap.pdf
mocharizal191
 
Ofer rivlin BGU - department seminar
Ofer rivlin   BGU - department seminarOfer rivlin   BGU - department seminar
Ofer rivlin BGU - department seminar
Ofer Rivlin, CISSP
 
Resource slides for blockchain related question
Resource slides for blockchain related questionResource slides for blockchain related question
Resource slides for blockchain related question
Lin Lin (Wendy)
 
How to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsHow to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal Methods
Ofer Rivlin, CISSP
 

Similar to Quantum Computing & Cryptography: A Brief Introduction (20)

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptx
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v eng
 
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
 
Quantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from ThemQuantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from Them
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
Is quantum computing an existential threat to blockchain technology
Is quantum computing an existential threat to blockchain technology Is quantum computing an existential threat to blockchain technology
Is quantum computing an existential threat to blockchain technology
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Quantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic ModulesQuantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic Modules
 
Blockchain Security in the Quantum Age 2024/03/18
Blockchain Security in the Quantum Age 2024/03/18Blockchain Security in the Quantum Age 2024/03/18
Blockchain Security in the Quantum Age 2024/03/18
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
 
Why we need censorship-resistant AI
Why we need censorship-resistant AIWhy we need censorship-resistant AI
Why we need censorship-resistant AI
 
Quantum Secured Blockchain
Quantum Secured BlockchainQuantum Secured Blockchain
Quantum Secured Blockchain
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
 
Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder  Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder
 
CryptoQuantumLeap.pdf
CryptoQuantumLeap.pdfCryptoQuantumLeap.pdf
CryptoQuantumLeap.pdf
 
Ofer rivlin BGU - department seminar
Ofer rivlin   BGU - department seminarOfer rivlin   BGU - department seminar
Ofer rivlin BGU - department seminar
 
Resource slides for blockchain related question
Resource slides for blockchain related questionResource slides for blockchain related question
Resource slides for blockchain related question
 
How to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsHow to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal Methods
 

More from Hedera Hashgraph

Using the Hedera Consensus Service with Hyperledger Fabric
Using the Hedera Consensus Service with Hyperledger FabricUsing the Hedera Consensus Service with Hyperledger Fabric
Using the Hedera Consensus Service with Hyperledger Fabric
Hedera Hashgraph
 
Hedera Hashgraph - Back to the Basics
Hedera Hashgraph -  Back to the BasicsHedera Hashgraph -  Back to the Basics
Hedera Hashgraph - Back to the Basics
Hedera Hashgraph
 
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
Hedera Hashgraph
 
Hedera CMO Christian Hasker shares insights at the London hashgraph meetup
Hedera CMO Christian Hasker shares insights at the London hashgraph meetupHedera CMO Christian Hasker shares insights at the London hashgraph meetup
Hedera CMO Christian Hasker shares insights at the London hashgraph meetup
Hedera Hashgraph
 
Introducing the Hedera Consensus service
Introducing the Hedera Consensus serviceIntroducing the Hedera Consensus service
Introducing the Hedera Consensus service
Hedera Hashgraph
 
Hedera's Path to Decentralization
Hedera's Path to DecentralizationHedera's Path to Decentralization
Hedera's Path to Decentralization
Hedera Hashgraph
 
Webinar - Build a decentralized app with the Hedera Cryptocurrency API
Webinar - Build a decentralized app with the Hedera Cryptocurrency APIWebinar - Build a decentralized app with the Hedera Cryptocurrency API
Webinar - Build a decentralized app with the Hedera Cryptocurrency API
Hedera Hashgraph
 
Keynote: The Hedera Hashgraph Advantage | Hedera18
Keynote: The Hedera Hashgraph Advantage | Hedera18Keynote: The Hedera Hashgraph Advantage | Hedera18
Keynote: The Hedera Hashgraph Advantage | Hedera18
Hedera Hashgraph
 
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
Hedera Hashgraph
 
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Hedera Hashgraph
 
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
Hedera Hashgraph
 
Carbon: Accessible, Stable Money | Hedera18
Carbon: Accessible, Stable Money | Hedera18Carbon: Accessible, Stable Money | Hedera18
Carbon: Accessible, Stable Money | Hedera18
Hedera Hashgraph
 
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
Hedera Hashgraph
 
Hedera for Music Streaming Micropayments | Hedera18
Hedera for Music Streaming Micropayments | Hedera18Hedera for Music Streaming Micropayments | Hedera18
Hedera for Music Streaming Micropayments | Hedera18
Hedera Hashgraph
 
Hedera API: Cryptocurrency 101 | Hedera18
Hedera API: Cryptocurrency 101 | Hedera18Hedera API: Cryptocurrency 101 | Hedera18
Hedera API: Cryptocurrency 101 | Hedera18
Hedera Hashgraph
 
Smart Contracts: From Zero to Dapp Hero | Hedera18
Smart Contracts: From Zero to Dapp Hero | Hedera18Smart Contracts: From Zero to Dapp Hero | Hedera18
Smart Contracts: From Zero to Dapp Hero | Hedera18
Hedera Hashgraph
 
Demystifying Distributed Ledgers | Hedera18
Demystifying Distributed Ledgers | Hedera18Demystifying Distributed Ledgers | Hedera18
Demystifying Distributed Ledgers | Hedera18
Hedera Hashgraph
 
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
Hedera Hashgraph
 
The Power of the Memo Field | Hedera18
The Power of the Memo Field | Hedera18The Power of the Memo Field | Hedera18
The Power of the Memo Field | Hedera18
Hedera Hashgraph
 
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
Hedera Hashgraph
 

More from Hedera Hashgraph (20)

Using the Hedera Consensus Service with Hyperledger Fabric
Using the Hedera Consensus Service with Hyperledger FabricUsing the Hedera Consensus Service with Hyperledger Fabric
Using the Hedera Consensus Service with Hyperledger Fabric
 
Hedera Hashgraph - Back to the Basics
Hedera Hashgraph -  Back to the BasicsHedera Hashgraph -  Back to the Basics
Hedera Hashgraph - Back to the Basics
 
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
Hedera Hashgraph San Francisco Meetup - A Complete Guide on Onboarding to the...
 
Hedera CMO Christian Hasker shares insights at the London hashgraph meetup
Hedera CMO Christian Hasker shares insights at the London hashgraph meetupHedera CMO Christian Hasker shares insights at the London hashgraph meetup
Hedera CMO Christian Hasker shares insights at the London hashgraph meetup
 
Introducing the Hedera Consensus service
Introducing the Hedera Consensus serviceIntroducing the Hedera Consensus service
Introducing the Hedera Consensus service
 
Hedera's Path to Decentralization
Hedera's Path to DecentralizationHedera's Path to Decentralization
Hedera's Path to Decentralization
 
Webinar - Build a decentralized app with the Hedera Cryptocurrency API
Webinar - Build a decentralized app with the Hedera Cryptocurrency APIWebinar - Build a decentralized app with the Hedera Cryptocurrency API
Webinar - Build a decentralized app with the Hedera Cryptocurrency API
 
Keynote: The Hedera Hashgraph Advantage | Hedera18
Keynote: The Hedera Hashgraph Advantage | Hedera18Keynote: The Hedera Hashgraph Advantage | Hedera18
Keynote: The Hedera Hashgraph Advantage | Hedera18
 
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
Almond: The Reward Platform Changing the World One Scan at a Time | Hedera18
 
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
 
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
Managing Energy Microgrids using Decentralized Structured Databases | Hedera18
 
Carbon: Accessible, Stable Money | Hedera18
Carbon: Accessible, Stable Money | Hedera18Carbon: Accessible, Stable Money | Hedera18
Carbon: Accessible, Stable Money | Hedera18
 
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
Keynote: The future of Micropayments with Hedera Hashgraph | Hedera18
 
Hedera for Music Streaming Micropayments | Hedera18
Hedera for Music Streaming Micropayments | Hedera18Hedera for Music Streaming Micropayments | Hedera18
Hedera for Music Streaming Micropayments | Hedera18
 
Hedera API: Cryptocurrency 101 | Hedera18
Hedera API: Cryptocurrency 101 | Hedera18Hedera API: Cryptocurrency 101 | Hedera18
Hedera API: Cryptocurrency 101 | Hedera18
 
Smart Contracts: From Zero to Dapp Hero | Hedera18
Smart Contracts: From Zero to Dapp Hero | Hedera18Smart Contracts: From Zero to Dapp Hero | Hedera18
Smart Contracts: From Zero to Dapp Hero | Hedera18
 
Demystifying Distributed Ledgers | Hedera18
Demystifying Distributed Ledgers | Hedera18Demystifying Distributed Ledgers | Hedera18
Demystifying Distributed Ledgers | Hedera18
 
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
Deep Dive: Formal Methods with Dr. Leemon Baird | Hedera18
 
The Power of the Memo Field | Hedera18
The Power of the Memo Field | Hedera18The Power of the Memo Field | Hedera18
The Power of the Memo Field | Hedera18
 
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
Keynote: Hedera Cryptoeconomics with Dr. Leemon Baird | Hedera18
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Quantum Computing & Cryptography: A Brief Introduction

  • 1. THE TRUST LAYER OF THE INTERNET
  • 3.
  • 5. Scott Aaronson, “The Limits of Quantum Computers,” Scientific American, 2008 “… [quantum computers] would provide dramatic speedups for a few specific problems… For other problems, however— such as playing chess, scheduling airline flights and proving theorems—evidence now strongly suggests that quantum computers would suffer from many of the same algorithmic limitations as today’s classical computers.”
  • 7.
  • 8. Introduction • Head of Cryptography at Hedera • Research Scientist at Visa Research • Post-doc at KU Leuven and UC Davis • PhD at KU Leuven
  • 9. Case Study: Bitcoin transaction Unlock Phone1. 2. Prepare Transaction 3. Send to blockchain
  • 10. Case Study: Bitcoin transaction Unlock Phone1. 2. Prepare Transaction 3. Send to blockchain
  • 11. Secret-Key Cryptography Aka symmetric-key crypto • Example: AES (Advanced Encryption Standard) • Impact of quantum computing: negligible, assuming you switch to a larger key size = 1011 Attempt Success? 0000 0001 0010 0011 0100 0101 … N N N N N N … Classical Quantum Grover’s algorithm 2k 2(k/2) AES128 k-bit key 2128 264 AES256 2256 2128
  • 12. Step 3: Sending to the blockchain Unlock Phone1. 2. Prepare Transaction 3. Send to blockchain nonce • Proof-of-work puzzle constructed with hash functions • Example: SHA-256
  • 13. Cryptographic Hash functions • Best known method of solving proof-of-work puzzle: brute-force • Grover’s algorithm • Impact: negligible, increase hash function output, increase difficulty
  • 14. Preparing a Bitcoin Transaction Unlock Phone1. 2. Prepare Transaction 3. Send to blockchain From: you To: friend Amount: 1 BTC … Digital Signature Purpose: ensures transaction is authorized by sender
  • 15. Digital signature • Type of public-key cryptography • Example: RSA 3084, ECDSA • Vulnerable to quantum computers --- ability to recover keys using Shor’s algorithm From: you To: friend Amount: 1 BTC … Valid/Invalid Public Key (ID)
  • 16. Flame Malware • Discovered in 2012 • Used for espionage • Forged a Microsoft certificate to gain access to systems • Found a new cryptographic attack against an algorithm which was widely known by academics to be broken (MD5) • Estimated that the malware was active for as many as 5 years before its discovery • Powerful attack: undetected, widely applicable
  • 17. Summary of Impact• Secret key cryptography: increase the key length • Hash functions: increase output size • Digital signatures, public key cryptography --- need entirely different algorithms
  • 18. Next steps • How much time do we have? • What can we do about the attacks against public key crypto?
  • 19. How much time do we have • Current quantum computers < 100 qubits • Qubits are noisy --- require error correction to operate reliably • Best attacks need 1000’s of logical qubits • With error correction, up to 100 000’s • Estimates range from 200 qubits to 0.5 million qubits in 10 years
  • 20. What solutions are there? • Significant amount of research on post-quantum crypto • Lattices • Hash functions • Code-based • Multivariate • NIST competition Image source: Nick Matthewson’s talk at the Second PQC Standardization Conference
  • 21. Conclusions • Wait and see • Await standardization • Vetting of security of algorithms • But pay attention! Can’t just ignore crypto • Need to remain crypto-agile: ability to switch algorithms quickly if necessary
  • 22. Further reading Scott Aaron, “The Limits of Quantum Computers”, Scientific American, 2008 http://www.cs.virginia.edu/~robins/The_Limits_of_Quantum_Computers.pdf Ronald de Wolf, “The Potential Impact of Quantum Computers on Society”, https://arxiv.org/pdf/1712.05380.pdf NIST Post-Quantum Cryptography, https://csrc.nist.gov/Projects/Post- Quantum-Cryptography Cloudflare Blog on Post-Quantum crypto, https://blog.cloudflare.com/towards-post-quantum-cryptography-in-tls/ How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits, https://arxiv.org/abs/1905.09749 Quantum attacks on Bitcoin, and how to protect against them, https://arxiv.org/pdf/1710.10377.pdf

Editor's Notes

  1. Hey good afternoon everybody! I’m excited to talk to you all today about Hedera Hashgraph — we’re an enterprise-grade public network for decentralized applications.
  2. Pause and transition out of H18 and set up to Hedera.