SlideShare a Scribd company logo
Tears for Quantum Fears
On a Quantum of Security
Mark C. (@LargeCardinal)
(Now with added kittens!)
What is a quantum, anyway?
What is a quantum, anyway?
A 'quantum is just the 'smallest finite piece of something'...
'Quantum' effects are what are used in 'quantum
technologies' - these are usually (but not limited to):
• Superposition – a particle is in multiple possible states
simultaneously
• Entanglement – two particles can become in a sense
inseparable such that the measurement of one gives you
knowledge about the other.
Although Entanglement is important, we won't deal with it
much here because this is not a lecture!
What will quantum affect?
There are 4 domains of effect...
Quantum Computing – and
how it will affect classical
cryptography...
Post-Quantum Crypto - what
is it? Why do we (or NIST) care
about it?
Quantum Algorithms – Handy
helpers or solutions in search
of valid problems?
Quantum Key Distribution –
Using quantum effects
themselves to do key exchg
Quantum Computation - Class 0
(Mark – go here... https://www.geogebra.org/m/fjb5kvf5 )
If you want to play along at home: follow this QR Code:
Quantum Computation – Class 0
So a qubit is a computing unit that can be some combination of the |0⟩
and 1 ; mathematically this is expressed as:
For 𝛼, 𝛽 ∈ ℂ , with 𝛼2
+ 𝛽2
= 1 we can express our states as:
0 =
1
0
, 1 =
0
1
, and our state 𝜓 = 𝛼 0 + 𝛽|1⟩
The sphere representation you see is called the ‘Bloch Sphere’.
Just as classical computers are made up from logic gates – AND, OR,
NAND, NOR, XOR, etc. etc.
Quantum algorithms are made up from quantum gates – which are
matrices strung together into sequences called quantum circuits.
Source: “Quantum Mechanical Computers”, R. Feynman (1985)
Post-math kittens…
So what do these quantum circuits look like?
What does a quantum output look like?
Resources and Sources for QC
Qiskit – python library and full environment developed by IBM –
run `pip install qiskit` (requires python3)
Qiskit’s Documentation -
https://qiskit.org/textbook/preface.html
Quantiki – a website accessibly detailing many quantum
algorithms and their nuances - https://quantiki.org/
Quantum Algorithm Zoo – A very comprehensive resource for
information about quantum algorithms -
https://quantumalgorithmzoo.org/
Resources and Sources for QC
IBM Quantum Experience – IBM’s quantum computer in the
cloud interface. Has a web UI and an API that is built into the
qiskit libraries (just add your API token):
https://quantum-computing.ibm.com/
D-Wave LEAP – D-Wave’s online cloud offering:
https://www.dwavesys.com/take-leap
Azure Quantum – who knows? They haven’t answered any of
my emails in over 6 weeks…
So what breaks? And how?
Shor’s Algorithm
• Developed by Peter Shor in 1994
• Solves the problem:
’Given a number N, find it’s prime factors’
…and does so in sub-exponential time
• This is BAD – because we rely on factoring
being exponentially hard to secure a lot of
crypto: RSA and ECC in particular!
Grover’s Algorithm
• Published by Lov Grover in 1996
• Solves the problem:
“Search a database with N-many entries
for a specific value..”
• It does this in up to 𝑁 -many steps.
• This is BAD – because it means that the
search of a key-space goes from 2 𝑛
to 2 𝑛/2
• This takes AES128 to AES64 (aka DES) and
AES256 to AES128.
So when does the cr*p hit the koolaid??
Shor’s Algorithm
Shor’s Algo requires ~3 times as many
qubits as there are bits in the number
N to factor
So you need ~3,500 qubits for a
RSA1024 key…
~7-15 years
Grover’s Algorithm
Evers-Sweeney (2019 -
https://kryptera.ca/paper/2019-03/)
propose 6,681 qubits needed to break
AES256
MIT’s efficient Grover’s Algo attack on
AES needs 20Mil qubits
~8-18 years
These calculations use that we have ~26
qubits in a single QC currently, and that
this will double each year to log2 3500 𝑎𝑛𝑑 log2(6681)
So what is the fix?
Short-Term Fixes
• Use RSA 4096-bit as your minimum key
length…
• Shor’s algorithm requires ~3 times as
many qubits as bits in an RSA key to
crack it, so longer keys mean you need
bigger QC’s
• For ECC use P384 as much as possible
• Upgrade to AES256 as much as possible
• Use AES in GCM mode – which adds a
significant complexity to the overall
attack
Long-Term fixes
• The NIST competition for the next
USGOV standard cryptography will use
‘Post-Quantum Cryptography’
• The competition has entered its third
round – see QRCode/Link below
• This means that we are
moving towards PQC
becoming the common
type of crypto in use.
• See:https://csrc.nist.gov/News/2020/pqc-third-round-
candidate-announcement
Post Quantum Cryptography
Post-Quantum Cryptography
This simply means:
“Cryptography that does not rely on
factoring as the ‘hard problem’ to make
the cryptography secure”
Current Candidates in NIST R3:
• Lattice based crypto: Kyber, Saber,
NTRU
• Supersingular Isogeny based: SIKE
• Other: Classic McEliece
• Hash algos: CRYSTALS-DILITHIUM,
FALCON, Rainbow
LWE – A Worked Example
4 1 11 10
5 5 9 5
3 9 0 10
1 3 3 2
12 7 3 4
6 5 11 4
3 3 5 0
6
9
11
11
4
8
1
10
4
12
9
x =
NOT SECURE!
This is Easy to solve with basic Linear
Algebra (vectors and matrices!) by
means of Gaussian Elimination
(mod 13)
Random Array Secret Output
Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf
LWE – The Setup
4 1 11 10
5 5 9 5
3 9 0 10
1 3 3 2
12 7 3 4
6 5 11 4
3 3 5 0
6
9
11
11
4
7
2
11
5
12
8
x =
We add a ‘small error’ term, which is
essentially random noise, to be able to skew
slightly the output – hence the name:
Learning with Errors (LWE)
0
-1
1
1
1
1
0
-1
+ (mod 13)
Random Array Secret Small Noise Output
Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf
LWE – The Problem
4 1 11 10
5 5 9 5
3 9 0 10
1 3 3 2
12 7 3 4
6 5 11 4
3 3 5 0
x =
Given the random array
and the output, find
the secret!
+ (mod 13)
Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf
Random Array Secret Small Noise Output
4
7
2
11
5
12
8
But how is this hard?
Well, we know the following is NP-hard…
Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf
There is no
known
quantum
algorithmic
speedup for
this
problem!
So when will PQC be commonplace?
Current Candidates in NIST R3:
• Lattice based crypto: Kyber, Saber, NTRU
• Supersingular Isogeny based: SIKE
• Other: Classic McEliece
• Hash algos: CRYSTALS-DILITHIUM, FALCON, Rainbow
We are now in ‘round 3’ of the competition…
We can expect some more code and more attacks to be
launched against these ciphers before they are chosen.
But remember – we don’t know what it’ll be called!
Within 2 years we should have the results…
Expect multiple ciphers with many notes,
recommendations, requirements, and key lengths!
Math Cat with their little mew…
Quantum Key Distribution
In 1984, Charles Bennett and Gilles Brassard worked out a way of using the quantum
properties of photons to make a provably secure key exchange mechanism
This protocol, known as BB84, paved the way for further protocols such as Ekert in ‘91,
called E91, and a plethora of others.
But how does QKD Work?
Source: http://www.jetir.org/papers/JETIR1906L90.pdf
So why isn’t this everywhere?
There is something that is not often talked about with QKD…
With Classical cryptography the security is in the mathematics that underpins the
cryptography. We rely on this to secure the systems that we use that cryptography
on. But this mathematics is distinct from the system we communicate over…
With quantum cryptography, we still use mathematics to secure the system –
But the mathematics is inherently linked to the system we communicate over!!
“You can’t packet switch photons without measuring them…”
-- C. 2020
Source:
https://www.forbes.com/sites/daveywinder/2020/08/04/meet-the-scrappy-space-startup-taking-quantum-security-into-space-honeywell-loft-orbital-qkd-encryption/
So why isn’t this everywhere?
With quantum cryptography, we still use mathematics to secure the system –
But the mathematics is inherently linked to the system we communicate over!!
“You can’t packet switch photons without measuring them…”
-- C. 2020
QKD Companies…
ID Quantique are the market leaders –
https://www.idquantique.com/
MagiQ have also been around for a while –
https://www.magiqtech.com/
Toshiba are the other main player in delivering QKD solutions
https://www.toshiba.co.jp/qkd/en/
Want to scare a QKD vendor? Ask them how their tech works
with cloud-based infrastructure…
QKD Hackers…
“Hacking Single-photon Avalanche Detection in QKD via Pulse Illumination” Zhihao
Wu et al. (2020)
https://arxiv.org/abs/2002.09146
“Hacking QKD via Injection Locking” Xiao-Ling et al. (2020)
https://arxiv.org/abs/1902.10423
“Hacking Alice’s Box in CV-QKD” J. Pereira, S. Pirandola (2018)
https://arxiv.org/abs/1807.04287
“Hacking commercial quantum cryptography systems by tailored bright
illumination” Lars Lydersen et al. (2011)
https://arxiv.org/abs/1008.4593
But what about other Quantum Algorithms?
There is more to quantum computing
than ‘factoring big numbers for TLAs’
• Quantum Finance – is an area
concerned with finding models akin
to Black-Scholes that work on QCs
• Quantum Chemistry Simulations –
recently making the news, using QCs
to simulate quantum systems seems
very natural
• Quantum Random Number
Generation…
So how do we do that?
Quantum Random Number Generation…
We are very happy to release a proof of
concept showing how to integrate cloud
quantum computing solutions (IBM-Q
here) into regular python scripting to
achieve something.
We will follow the flow chart on the right,
and will build our system with the following
limitations:
• No optimisations!
• Non-standard CSPRNG implementation
So what quantum circuit do we use?
The QRNG Circuit
We place all of the qubits into
superposition, and then measure
them all to get quantumly
random bits!
The ibmq_16_melbourne
quantum computer has 15 qubits
available – but you can only run
for 8192 shots.
This means we can get up to
122,880 random bits per job!
Proof of Concept Release!!
Quantum Random Number Generation…
Remember, this system has the following
limitations:
• No optimisations!
• Non-standard CSPRNG implementation
As such this code is
DEFINITELY NOT FOR PROD!!
Link:
https://gist.github.com/unprovable/43756
1c660f7d85f283e510a16ef5834
Fin.

More Related Content

What's hot

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
Codemotion
 
Quantum computing for CS students: the unitary circuit model
Quantum computing for CS students: the unitary circuit modelQuantum computing for CS students: the unitary circuit model
Quantum computing for CS students: the unitary circuit model
Bruno Fedrici, PhD
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
Ahmed Banafa
 
Quantum Computing with Amazon Braket
Quantum Computing with Amazon BraketQuantum Computing with Amazon Braket
Quantum Computing with Amazon Braket
Chris Fregly
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Professor Lili Saghafi
 
Quantum computing for CS students: open source software
Quantum computing for CS students: open source softwareQuantum computing for CS students: open source software
Quantum computing for CS students: open source software
Bruno Fedrici, PhD
 
Quantum Roles in Quantum Computing
Quantum Roles in Quantum ComputingQuantum Roles in Quantum Computing
Quantum Roles in Quantum Computing
Francisco J. Gálvez Ramírez
 
Quantum computing - 2021-01-09
Quantum computing - 2021-01-09Quantum computing - 2021-01-09
Quantum computing - 2021-01-09
Aritra Sarkar
 
Post Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersPost Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging Frontiers
Gokul Alex
 
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers securityDEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
Felipe Prado
 
Quantum algorithms for pattern matching in genomic sequences - 2018-06-22
Quantum algorithms for pattern matching in genomic sequences - 2018-06-22Quantum algorithms for pattern matching in genomic sequences - 2018-06-22
Quantum algorithms for pattern matching in genomic sequences - 2018-06-22
Aritra Sarkar
 
Strengths and limitations of quantum computing
Strengths and limitations of quantum computingStrengths and limitations of quantum computing
Strengths and limitations of quantum computing
Vinayak Sharma
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
Samy Shehata
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
AliceBob EveMallory
 
Quantum Computation For AI
Quantum Computation For AIQuantum Computation For AI
Quantum Computation For AI
Prasenjit Mukherjee
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Deepankar Sandhibigraha
 
Genomics algorithms on digital NISQ accelerators - 2019-01-25
Genomics algorithms on digital NISQ accelerators - 2019-01-25Genomics algorithms on digital NISQ accelerators - 2019-01-25
Genomics algorithms on digital NISQ accelerators - 2019-01-25
Aritra Sarkar
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Rishabh Jindal
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Deepankar Sandhibigraha
 

What's hot (20)

Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
 
Quantum computing for CS students: the unitary circuit model
Quantum computing for CS students: the unitary circuit modelQuantum computing for CS students: the unitary circuit model
Quantum computing for CS students: the unitary circuit model
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Quantum Computing with Amazon Braket
Quantum Computing with Amazon BraketQuantum Computing with Amazon Braket
Quantum Computing with Amazon Braket
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
 
Quantum computing for CS students: open source software
Quantum computing for CS students: open source softwareQuantum computing for CS students: open source software
Quantum computing for CS students: open source software
 
Quantum Roles in Quantum Computing
Quantum Roles in Quantum ComputingQuantum Roles in Quantum Computing
Quantum Roles in Quantum Computing
 
Quantum computing - 2021-01-09
Quantum computing - 2021-01-09Quantum computing - 2021-01-09
Quantum computing - 2021-01-09
 
Post Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersPost Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging Frontiers
 
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers securityDEF CON 23 - Phillip Aumasson - quantum computers vs computers security
DEF CON 23 - Phillip Aumasson - quantum computers vs computers security
 
Quantum algorithms for pattern matching in genomic sequences - 2018-06-22
Quantum algorithms for pattern matching in genomic sequences - 2018-06-22Quantum algorithms for pattern matching in genomic sequences - 2018-06-22
Quantum algorithms for pattern matching in genomic sequences - 2018-06-22
 
Strengths and limitations of quantum computing
Strengths and limitations of quantum computingStrengths and limitations of quantum computing
Strengths and limitations of quantum computing
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
 
Quantum Computation For AI
Quantum Computation For AIQuantum Computation For AI
Quantum Computation For AI
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Genomics algorithms on digital NISQ accelerators - 2019-01-25
Genomics algorithms on digital NISQ accelerators - 2019-01-25Genomics algorithms on digital NISQ accelerators - 2019-01-25
Genomics algorithms on digital NISQ accelerators - 2019-01-25
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 

Similar to Tears for quantum fears

Quantum Hardware Hacking
Quantum Hardware HackingQuantum Hardware Hacking
Quantum Hardware Hacking
Mark Carney
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
inside-BigData.com
 
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
IRJET Journal
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
RonSteinfeld1
 
Quantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from ThemQuantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from Them
mapmeld
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Benjamin Cabé
 
Post quantum cryptography in vault (hashi talks 2020)
Post quantum cryptography in vault (hashi talks 2020)Post quantum cryptography in vault (hashi talks 2020)
Post quantum cryptography in vault (hashi talks 2020)
Mitchell Pronschinske
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 
One library for all Java encryption
One library for all Java encryptionOne library for all Java encryption
One library for all Java encryption
Dan Cvrcek
 
Des2017 quantum computing_final
Des2017 quantum computing_finalDes2017 quantum computing_final
Des2017 quantum computing_final
Francisco J. Gálvez Ramírez
 
Implication of rh and qc on information security sharad nalawade(author)
Implication of rh and qc on information security sharad nalawade(author)Implication of rh and qc on information security sharad nalawade(author)
Implication of rh and qc on information security sharad nalawade(author)
Priyanka Aash
 
Securing IoT Applications
Securing IoT Applications Securing IoT Applications
Securing IoT Applications
WSO2
 
|QAB> : Quantum Computing, AI and Blockchain
|QAB> : Quantum Computing, AI and Blockchain|QAB> : Quantum Computing, AI and Blockchain
|QAB> : Quantum Computing, AI and Blockchain
Kan Yuenyong
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
Milos Dunjic
 
Webinar: Quantum Revolution Is Here (2022)
Webinar: Quantum Revolution Is Here (2022)Webinar: Quantum Revolution Is Here (2022)
Webinar: Quantum Revolution Is Here (2022)
Immo Salo
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
Siri Murthy
 
The Next Generation of Microservices
The Next Generation of MicroservicesThe Next Generation of Microservices
The Next Generation of Microservices
Phil Calçado
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
Andrew Manoske
 
JavaOne 2016 - Faces Counter
JavaOne 2016 -  Faces CounterJavaOne 2016 -  Faces Counter
JavaOne 2016 - Faces Counter
Coritel
 
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING                .docxRunning head QUANTUM COMPUTINGQUANTUM COMPUTING                .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
charisellington63520
 

Similar to Tears for quantum fears (20)

Quantum Hardware Hacking
Quantum Hardware HackingQuantum Hardware Hacking
Quantum Hardware Hacking
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
 
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITQuantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKIT
 
Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
 
Quantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from ThemQuantum Computers and Where to Hide from Them
Quantum Computers and Where to Hide from Them
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetup
 
Post quantum cryptography in vault (hashi talks 2020)
Post quantum cryptography in vault (hashi talks 2020)Post quantum cryptography in vault (hashi talks 2020)
Post quantum cryptography in vault (hashi talks 2020)
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
One library for all Java encryption
One library for all Java encryptionOne library for all Java encryption
One library for all Java encryption
 
Des2017 quantum computing_final
Des2017 quantum computing_finalDes2017 quantum computing_final
Des2017 quantum computing_final
 
Implication of rh and qc on information security sharad nalawade(author)
Implication of rh and qc on information security sharad nalawade(author)Implication of rh and qc on information security sharad nalawade(author)
Implication of rh and qc on information security sharad nalawade(author)
 
Securing IoT Applications
Securing IoT Applications Securing IoT Applications
Securing IoT Applications
 
|QAB> : Quantum Computing, AI and Blockchain
|QAB> : Quantum Computing, AI and Blockchain|QAB> : Quantum Computing, AI and Blockchain
|QAB> : Quantum Computing, AI and Blockchain
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
 
Webinar: Quantum Revolution Is Here (2022)
Webinar: Quantum Revolution Is Here (2022)Webinar: Quantum Revolution Is Here (2022)
Webinar: Quantum Revolution Is Here (2022)
 
Technical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum WorldTechnical Seminar on Securing the IoT in the Quantum World
Technical Seminar on Securing the IoT in the Quantum World
 
The Next Generation of Microservices
The Next Generation of MicroservicesThe Next Generation of Microservices
The Next Generation of Microservices
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
 
JavaOne 2016 - Faces Counter
JavaOne 2016 -  Faces CounterJavaOne 2016 -  Faces Counter
JavaOne 2016 - Faces Counter
 
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING                .docxRunning head QUANTUM COMPUTINGQUANTUM COMPUTING                .docx
Running head QUANTUM COMPUTINGQUANTUM COMPUTING .docx
 

Recently uploaded

Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 

Recently uploaded (20)

Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 

Tears for quantum fears

  • 1. Tears for Quantum Fears On a Quantum of Security Mark C. (@LargeCardinal) (Now with added kittens!)
  • 2. What is a quantum, anyway?
  • 3. What is a quantum, anyway? A 'quantum is just the 'smallest finite piece of something'... 'Quantum' effects are what are used in 'quantum technologies' - these are usually (but not limited to): • Superposition – a particle is in multiple possible states simultaneously • Entanglement – two particles can become in a sense inseparable such that the measurement of one gives you knowledge about the other. Although Entanglement is important, we won't deal with it much here because this is not a lecture!
  • 4. What will quantum affect? There are 4 domains of effect... Quantum Computing – and how it will affect classical cryptography... Post-Quantum Crypto - what is it? Why do we (or NIST) care about it? Quantum Algorithms – Handy helpers or solutions in search of valid problems? Quantum Key Distribution – Using quantum effects themselves to do key exchg
  • 5. Quantum Computation - Class 0 (Mark – go here... https://www.geogebra.org/m/fjb5kvf5 ) If you want to play along at home: follow this QR Code:
  • 6. Quantum Computation – Class 0 So a qubit is a computing unit that can be some combination of the |0⟩ and 1 ; mathematically this is expressed as: For 𝛼, 𝛽 ∈ ℂ , with 𝛼2 + 𝛽2 = 1 we can express our states as: 0 = 1 0 , 1 = 0 1 , and our state 𝜓 = 𝛼 0 + 𝛽|1⟩ The sphere representation you see is called the ‘Bloch Sphere’. Just as classical computers are made up from logic gates – AND, OR, NAND, NOR, XOR, etc. etc. Quantum algorithms are made up from quantum gates – which are matrices strung together into sequences called quantum circuits. Source: “Quantum Mechanical Computers”, R. Feynman (1985)
  • 8. So what do these quantum circuits look like?
  • 9. What does a quantum output look like?
  • 10.
  • 11. Resources and Sources for QC Qiskit – python library and full environment developed by IBM – run `pip install qiskit` (requires python3) Qiskit’s Documentation - https://qiskit.org/textbook/preface.html Quantiki – a website accessibly detailing many quantum algorithms and their nuances - https://quantiki.org/ Quantum Algorithm Zoo – A very comprehensive resource for information about quantum algorithms - https://quantumalgorithmzoo.org/
  • 12. Resources and Sources for QC IBM Quantum Experience – IBM’s quantum computer in the cloud interface. Has a web UI and an API that is built into the qiskit libraries (just add your API token): https://quantum-computing.ibm.com/ D-Wave LEAP – D-Wave’s online cloud offering: https://www.dwavesys.com/take-leap Azure Quantum – who knows? They haven’t answered any of my emails in over 6 weeks…
  • 13. So what breaks? And how? Shor’s Algorithm • Developed by Peter Shor in 1994 • Solves the problem: ’Given a number N, find it’s prime factors’ …and does so in sub-exponential time • This is BAD – because we rely on factoring being exponentially hard to secure a lot of crypto: RSA and ECC in particular! Grover’s Algorithm • Published by Lov Grover in 1996 • Solves the problem: “Search a database with N-many entries for a specific value..” • It does this in up to 𝑁 -many steps. • This is BAD – because it means that the search of a key-space goes from 2 𝑛 to 2 𝑛/2 • This takes AES128 to AES64 (aka DES) and AES256 to AES128.
  • 14. So when does the cr*p hit the koolaid?? Shor’s Algorithm Shor’s Algo requires ~3 times as many qubits as there are bits in the number N to factor So you need ~3,500 qubits for a RSA1024 key… ~7-15 years Grover’s Algorithm Evers-Sweeney (2019 - https://kryptera.ca/paper/2019-03/) propose 6,681 qubits needed to break AES256 MIT’s efficient Grover’s Algo attack on AES needs 20Mil qubits ~8-18 years These calculations use that we have ~26 qubits in a single QC currently, and that this will double each year to log2 3500 𝑎𝑛𝑑 log2(6681)
  • 15. So what is the fix? Short-Term Fixes • Use RSA 4096-bit as your minimum key length… • Shor’s algorithm requires ~3 times as many qubits as bits in an RSA key to crack it, so longer keys mean you need bigger QC’s • For ECC use P384 as much as possible • Upgrade to AES256 as much as possible • Use AES in GCM mode – which adds a significant complexity to the overall attack Long-Term fixes • The NIST competition for the next USGOV standard cryptography will use ‘Post-Quantum Cryptography’ • The competition has entered its third round – see QRCode/Link below • This means that we are moving towards PQC becoming the common type of crypto in use. • See:https://csrc.nist.gov/News/2020/pqc-third-round- candidate-announcement
  • 16. Post Quantum Cryptography Post-Quantum Cryptography This simply means: “Cryptography that does not rely on factoring as the ‘hard problem’ to make the cryptography secure” Current Candidates in NIST R3: • Lattice based crypto: Kyber, Saber, NTRU • Supersingular Isogeny based: SIKE • Other: Classic McEliece • Hash algos: CRYSTALS-DILITHIUM, FALCON, Rainbow
  • 17. LWE – A Worked Example 4 1 11 10 5 5 9 5 3 9 0 10 1 3 3 2 12 7 3 4 6 5 11 4 3 3 5 0 6 9 11 11 4 8 1 10 4 12 9 x = NOT SECURE! This is Easy to solve with basic Linear Algebra (vectors and matrices!) by means of Gaussian Elimination (mod 13) Random Array Secret Output Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf
  • 18. LWE – The Setup 4 1 11 10 5 5 9 5 3 9 0 10 1 3 3 2 12 7 3 4 6 5 11 4 3 3 5 0 6 9 11 11 4 7 2 11 5 12 8 x = We add a ‘small error’ term, which is essentially random noise, to be able to skew slightly the output – hence the name: Learning with Errors (LWE) 0 -1 1 1 1 1 0 -1 + (mod 13) Random Array Secret Small Noise Output Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf
  • 19. LWE – The Problem 4 1 11 10 5 5 9 5 3 9 0 10 1 3 3 2 12 7 3 4 6 5 11 4 3 3 5 0 x = Given the random array and the output, find the secret! + (mod 13) Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf Random Array Secret Small Noise Output 4 7 2 11 5 12 8
  • 20. But how is this hard? Well, we know the following is NP-hard… Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf There is no known quantum algorithmic speedup for this problem!
  • 21. So when will PQC be commonplace? Current Candidates in NIST R3: • Lattice based crypto: Kyber, Saber, NTRU • Supersingular Isogeny based: SIKE • Other: Classic McEliece • Hash algos: CRYSTALS-DILITHIUM, FALCON, Rainbow We are now in ‘round 3’ of the competition… We can expect some more code and more attacks to be launched against these ciphers before they are chosen. But remember – we don’t know what it’ll be called! Within 2 years we should have the results… Expect multiple ciphers with many notes, recommendations, requirements, and key lengths!
  • 22. Math Cat with their little mew…
  • 23. Quantum Key Distribution In 1984, Charles Bennett and Gilles Brassard worked out a way of using the quantum properties of photons to make a provably secure key exchange mechanism This protocol, known as BB84, paved the way for further protocols such as Ekert in ‘91, called E91, and a plethora of others.
  • 24. But how does QKD Work? Source: http://www.jetir.org/papers/JETIR1906L90.pdf
  • 25. So why isn’t this everywhere? There is something that is not often talked about with QKD… With Classical cryptography the security is in the mathematics that underpins the cryptography. We rely on this to secure the systems that we use that cryptography on. But this mathematics is distinct from the system we communicate over… With quantum cryptography, we still use mathematics to secure the system – But the mathematics is inherently linked to the system we communicate over!! “You can’t packet switch photons without measuring them…” -- C. 2020 Source: https://www.forbes.com/sites/daveywinder/2020/08/04/meet-the-scrappy-space-startup-taking-quantum-security-into-space-honeywell-loft-orbital-qkd-encryption/
  • 26. So why isn’t this everywhere? With quantum cryptography, we still use mathematics to secure the system – But the mathematics is inherently linked to the system we communicate over!! “You can’t packet switch photons without measuring them…” -- C. 2020
  • 27. QKD Companies… ID Quantique are the market leaders – https://www.idquantique.com/ MagiQ have also been around for a while – https://www.magiqtech.com/ Toshiba are the other main player in delivering QKD solutions https://www.toshiba.co.jp/qkd/en/ Want to scare a QKD vendor? Ask them how their tech works with cloud-based infrastructure…
  • 28. QKD Hackers… “Hacking Single-photon Avalanche Detection in QKD via Pulse Illumination” Zhihao Wu et al. (2020) https://arxiv.org/abs/2002.09146 “Hacking QKD via Injection Locking” Xiao-Ling et al. (2020) https://arxiv.org/abs/1902.10423 “Hacking Alice’s Box in CV-QKD” J. Pereira, S. Pirandola (2018) https://arxiv.org/abs/1807.04287 “Hacking commercial quantum cryptography systems by tailored bright illumination” Lars Lydersen et al. (2011) https://arxiv.org/abs/1008.4593
  • 29. But what about other Quantum Algorithms? There is more to quantum computing than ‘factoring big numbers for TLAs’ • Quantum Finance – is an area concerned with finding models akin to Black-Scholes that work on QCs • Quantum Chemistry Simulations – recently making the news, using QCs to simulate quantum systems seems very natural • Quantum Random Number Generation…
  • 30. So how do we do that? Quantum Random Number Generation… We are very happy to release a proof of concept showing how to integrate cloud quantum computing solutions (IBM-Q here) into regular python scripting to achieve something. We will follow the flow chart on the right, and will build our system with the following limitations: • No optimisations! • Non-standard CSPRNG implementation
  • 31. So what quantum circuit do we use? The QRNG Circuit We place all of the qubits into superposition, and then measure them all to get quantumly random bits! The ibmq_16_melbourne quantum computer has 15 qubits available – but you can only run for 8192 shots. This means we can get up to 122,880 random bits per job!
  • 32. Proof of Concept Release!! Quantum Random Number Generation… Remember, this system has the following limitations: • No optimisations! • Non-standard CSPRNG implementation As such this code is DEFINITELY NOT FOR PROD!! Link: https://gist.github.com/unprovable/43756 1c660f7d85f283e510a16ef5834
  • 33. Fin.

Editor's Notes

  1. Boson in the streets photon in the sheets