An overview of how 'quantum' will affect cybersecurity - from cryptography to quantum computing algorithms, we will look at how quantum will affect what we do in information security.
This document provides an introduction to quantum programming languages. It begins with basic concepts in quantum mechanics like state superposition and entanglement. It then discusses popular quantum algorithms like Deutsch, Shor, and Grover algorithms. The document reviews several quantum programming languages including quantum pseudocode, Quipper which is embedded in Haskell, and the Python toolbox QuTiP. It also mentions Mathematica packages for quantum computation. Finally, it introduces the IBM Quantum Experience platform for designing and running quantum circuits in a quantum processor or simulator.
This document introduces quantum programming and the IBM quantum computer. It discusses why quantum computation is useful for solving complex problems that are intractable on classical computers. It then provides an overview of the IBM quantum computer, including qubit implementations and coherence times. Common quantum algorithms like Deutsch's algorithm, Shor's algorithm, and Grover's algorithm are summarized. The document explains how to program a quantum computer using quantum circuits and gates. It introduces tools for quantum programming like the IBM Quantum Experience, QISKit, and OpenQASM.
The document provides an overview of quantum computing concepts and the IBM Quantum Experience platform. It begins with a short history of quantum computing developments from the 1930s to present. It then explains basic quantum concepts like qubits, superposition, entanglement, and quantum gates. The document outlines requirements for building a quantum computer, including well-defined qubits, initialization, gates, coherence times, and measurement. It describes the IBM Quantum Experience as a platform that provides access to an actual quantum processor via the cloud, along with simulation and tutorial capabilities. Users can design circuits using a graphical Quantum Composer interface and run algorithms on real quantum hardware or simulation.
This presentation discusses the history and concepts of quantum computing. It introduces quantum computers, which perform calculations using quantum bits that can represent more than one value at a time. Operations on quantum computers use quantum gates rather than classical logic gates. One example covered is Shor's algorithm, which can factor large numbers efficiently. Some challenges with quantum computing are decoherence issues and the difficulty of measuring quantum states without destroying superposition. While still in early research stages, quantum computers may one day be able to solve problems exponentially faster than classical computers.
Descripcion about IBM quantum experience. In this presentation I introduce the IBM Tools for quantum programming. Also it serves as a general introduction to Quantum Computing
This document discusses quantum computation and the future of computing. It covers:
1) The basics of quantum mechanics and how quantum computation works by initializing a system in a superposition and evolving it using quantum gates before measurement.
2) The different models of quantum computation including circuit-based, adiabatic, and one-way quantum computing. It notes that these models are equivalent in computational power.
3) The potential for quantum computers to solve certain problems like integer factorization exponentially faster than classical computers, though challenges remain in the near term due to noise and errors. Larger quantum computers may be able to achieve "quantum supremacy" over classical systems.
The second quantum revolution: the world beyond binary 0 and 1Bruno Fedrici, PhD
Our active application of quantum
mechanics has previously been constrained by our
ability to engineer and control systems at the small
scales where quantum effects predominate. This has
now changed. Scientists have reached first base on a
set of enabling technologies that allow us to
routinely manipulate atoms of matter and photons of
light at individual level. This has unlocked our ability
to create a new generation of devices that deliver
unique capabilities directly tied to properties of quantum mechanics such as superposition and entanglement.
DEF CON 27 - ANDREAS BAUMHOF - are quantum computers really a threat to crypt...Felipe Prado
This document provides an overview of quantum computing and its implications for cryptography. It discusses how quantum computers could break popular asymmetric cryptographic algorithms like RSA by efficiently solving problems like integer factorization that are intractable on classical computers. The document explains Shor's algorithm, which uses quantum Fourier transforms to find the period of exponential functions and derive prime factors in polynomial time, posing a threat to RSA. It also discusses quantum computing concepts like superposition and entanglement that enable this speedup. Overall, the document serves as an introduction to how quantum computers may impact cryptography by breaking algorithms like RSA.
This document provides an introduction to quantum programming languages. It begins with basic concepts in quantum mechanics like state superposition and entanglement. It then discusses popular quantum algorithms like Deutsch, Shor, and Grover algorithms. The document reviews several quantum programming languages including quantum pseudocode, Quipper which is embedded in Haskell, and the Python toolbox QuTiP. It also mentions Mathematica packages for quantum computation. Finally, it introduces the IBM Quantum Experience platform for designing and running quantum circuits in a quantum processor or simulator.
This document introduces quantum programming and the IBM quantum computer. It discusses why quantum computation is useful for solving complex problems that are intractable on classical computers. It then provides an overview of the IBM quantum computer, including qubit implementations and coherence times. Common quantum algorithms like Deutsch's algorithm, Shor's algorithm, and Grover's algorithm are summarized. The document explains how to program a quantum computer using quantum circuits and gates. It introduces tools for quantum programming like the IBM Quantum Experience, QISKit, and OpenQASM.
The document provides an overview of quantum computing concepts and the IBM Quantum Experience platform. It begins with a short history of quantum computing developments from the 1930s to present. It then explains basic quantum concepts like qubits, superposition, entanglement, and quantum gates. The document outlines requirements for building a quantum computer, including well-defined qubits, initialization, gates, coherence times, and measurement. It describes the IBM Quantum Experience as a platform that provides access to an actual quantum processor via the cloud, along with simulation and tutorial capabilities. Users can design circuits using a graphical Quantum Composer interface and run algorithms on real quantum hardware or simulation.
This presentation discusses the history and concepts of quantum computing. It introduces quantum computers, which perform calculations using quantum bits that can represent more than one value at a time. Operations on quantum computers use quantum gates rather than classical logic gates. One example covered is Shor's algorithm, which can factor large numbers efficiently. Some challenges with quantum computing are decoherence issues and the difficulty of measuring quantum states without destroying superposition. While still in early research stages, quantum computers may one day be able to solve problems exponentially faster than classical computers.
Descripcion about IBM quantum experience. In this presentation I introduce the IBM Tools for quantum programming. Also it serves as a general introduction to Quantum Computing
This document discusses quantum computation and the future of computing. It covers:
1) The basics of quantum mechanics and how quantum computation works by initializing a system in a superposition and evolving it using quantum gates before measurement.
2) The different models of quantum computation including circuit-based, adiabatic, and one-way quantum computing. It notes that these models are equivalent in computational power.
3) The potential for quantum computers to solve certain problems like integer factorization exponentially faster than classical computers, though challenges remain in the near term due to noise and errors. Larger quantum computers may be able to achieve "quantum supremacy" over classical systems.
The second quantum revolution: the world beyond binary 0 and 1Bruno Fedrici, PhD
Our active application of quantum
mechanics has previously been constrained by our
ability to engineer and control systems at the small
scales where quantum effects predominate. This has
now changed. Scientists have reached first base on a
set of enabling technologies that allow us to
routinely manipulate atoms of matter and photons of
light at individual level. This has unlocked our ability
to create a new generation of devices that deliver
unique capabilities directly tied to properties of quantum mechanics such as superposition and entanglement.
DEF CON 27 - ANDREAS BAUMHOF - are quantum computers really a threat to crypt...Felipe Prado
This document provides an overview of quantum computing and its implications for cryptography. It discusses how quantum computers could break popular asymmetric cryptographic algorithms like RSA by efficiently solving problems like integer factorization that are intractable on classical computers. The document explains Shor's algorithm, which uses quantum Fourier transforms to find the period of exponential functions and derive prime factors in polynomial time, posing a threat to RSA. It also discusses quantum computing concepts like superposition and entanglement that enable this speedup. Overall, the document serves as an introduction to how quantum computers may impact cryptography by breaking algorithms like RSA.
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...Codemotion
Quantum computers can use all of the possible pathways generated by quantum decisions to solve problems that will forever remain intractable to classical compute power. As the mega players vie for quantum supremacy and Rigetti announces its $1M "quantum advantage" prize, we live in exciting times. IBM-Q and Microsoft Q# are two ways you can learn to program quantum computers so that you're ready when the quantum revolution comes. I'll demonstrate some quantum solutions to problems that will forever be out of reach of classical, including organic chemistry and large number factorisation.
Quantum computing for CS students: the unitary circuit modelBruno Fedrici, PhD
This document provides an introduction to quantum computing using the quantum circuit model. It explains that quantum computers exploit quantum physics laws to potentially solve problems faster than classical computers. The document outlines the quantum circuit model and how it represents quantum bits (qubits) as vectors and operations as matrices. It introduces concepts like qubit superposition and entanglement. The document uses the Deutsch algorithm example to illustrate how a quantum computer can solve a problem in one query versus two for a classical computer. It concludes with discussing further topics like quantum teleportation and goals for continued learning.
Quantum Computing and Blockchain: Facts and Myths Ahmed Banafa
The biggest danger to Blockchain networks from quantum computing is its ability to break traditional encryption . Google sent shock waves around the internet when it was claimed, had built a quantum computer able to solve formerly impossible mathematical calculations–with some fearing crypto industry could be at risk . Google states that its experiment is the first experimental challenge against the extended Church-Turing thesis — also known as computability thesis — which claims that traditional computers can effectively carry out any “reasonable” model of computation
Quantum Computing with Amazon Braket
In this talk, I describe some fundamental principles of quantum computing including qu-bits, superposition, and entanglement. I will demonstrate how to perform secure quantum computing tasks across many Quantum Processing Units (QPUs) using Amazon Braket, IAM, and S3.
AI and Machine Learning, Quantum Computing, Amazon Braket, QPU
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiProfessor Lili Saghafi
Quantum computing has the potential to transform cybersecurity.
Some encryption algorithms are thought to be unbreakable, except by brute-force attacks.
Although brute-force attacks may be hard for classical computers, they would be easy for quantum computers making them susceptible to such attacks.
All financial institutions, government agencies healthcare information are in danger.
How could this new thrust of computing strength give us new tiers of power to analyze IT systems at a more granular level for security vulnerabilities and protect us through more complex layers of quantum cryptography?
Quantum computing for CS students: open source softwareBruno Fedrici, PhD
1. The document discusses quantum computing software for CS students, including open source options like IBM QX and QISKit.
2. It describes different models of quantum computation like the quantum circuit model and adiabatic quantum computation. Main components include defining the problem, creating a quantum algorithm and circuit, compiling for the quantum processor, and simulating results.
3. IBM QX is highlighted as an example - it includes a circuit composer GUI to design circuits and run them on simulators or quantum processors, and QISKit is the Python version. Results from experiments are probabilistic due to the nature of quantum theory.
This document discusses quantum computing, including its history, current applications and challenges, and future potential. It begins with explaining quantum mechanics concepts like superposition, entanglement, and measurement. It then discusses various quantum computing models and algorithms. The document outlines engineering challenges like building reliable qubits and correcting errors. Finally, it encourages learning more about this emerging field and lists educational resources to get started with quantum computing.
Post Quantum Cryptography - Emerging FrontiersGokul Alex
Emerging frontiers in Post Quantum Cryptography such as Lattice based Cryptography, Code based Cryptography, Super Elliptical Curve Isogeny based Cryptography etc. and an introduction into Zero Knowledge Proof.
DEF CON 23 - Phillip Aumasson - quantum computers vs computers securityFelipe Prado
This document discusses quantum computers and their implications for computer security. It begins with introductions to quantum mechanics concepts and how quantum computers work. It then explains that quantum computers could break many current encryption standards by efficiently solving problems like integer factorization that are hard for classical computers. Alternative "post-quantum" encryption methods are discussed. The document also covers quantum key distribution, proposals for quantum copy protection, and potential applications of quantum machines for tasks like machine learning. While quantum computers may revolutionize computing, many challenges remain around building them and developing quantum algorithms.
Quantum algorithms for pattern matching in genomic sequences - 2018-06-22Aritra Sarkar
The document discusses quantum algorithms for pattern matching in genomic sequences. It begins with an overview of the presentation topics, including classical approaches to genomic sequence analysis, sub-sequence index search, and using a quantum accelerator. It then provides background on quantum computing concepts like Grover's algorithm and discusses how it could be applied to sub-sequence search through a conditional oracle and OpenQL kernels. The document considers the potential for quantum algorithms to evolve genomic analysis, including through unitary decomposition and using ancilla qubits.
Strengths and limitations of quantum computingVinayak Sharma
Quantum computing as a research field has been around for about 30 years. It seems like a way to overcome the challenges that classical (boolean based) computers are facing due to “quantum tunneling” effect. Although, there are various theoretical and practical challenges that are needed to be dealt with if we want quantum computes to perform better that classical computers (i.e achieving “quantum supremacy”). This seminar will aim to shed light on basics of quantum computing and its strengths and weaknesses.
Video Links
Part 1: https://www.youtube.com/watch?v=-WLD_HnUvy0
Part 2: https://www.youtube.com/watch?v=xXzUmpk8ztU
This document discusses post-quantum cryptography and code-based cryptosystems as an alternative that is secure against quantum computers. It describes the McEliece cryptosystem, which uses error correcting codes, and introduces staircase generator codes and randomly split staircase generator codes to improve efficiency and security. The randomly split staircase generator codes cryptosystem allows for both encryption and digital signatures using efficient procedures while providing 80-bit security levels against quantum attacks, though it has large key sizes of around 10 megabytes.
Alice and Bob’s quest through the fascinating quantum mechanics world as a way to avoid archvilainess Eve eavesdropping. In 1994, Peter Shor showed that many of the cryptosystems used today can be broken using a quantum computer. This idea will be explained together with a short overview of qubit systems. Next, we will see how quantum computing gives rise to the possibility of quantum key distribution with unparalleled security. We will end with a brief discussion on post-quantum cryptography concepts.
This is a seminar on Quantum Computing given on 9th march 2017 at CIME, Bhubaneswar by me(2nd year MCA).
Video at - https://youtu.be/vguxg0RYg7M
ppt at - http://www.slideshare.net/deepankarsandhibigraha/quantum-computing-73031661
Genomics algorithms on digital NISQ accelerators - 2019-01-25Aritra Sarkar
This document discusses using quantum computing to accelerate genomics algorithms. It outlines a roadmap for theoretical and hardware-based quantum genomics solutions (QGS), from perfect qubits to noisy intermediate-scale quantum (NISQ) devices. Near-term algorithms like VQE, QAOA, and variational quantum search are proposed to solve problems like sequence alignment and de novo sequencing. Implementation details are discussed, such as mapping problems to graph algorithms, hybrid classical-quantum programming, and efficiently loading DNA data. The goal is to develop variational algorithms for genomics and implement them on the OpenQL platform to explore their potential on NISQ devices.
Quantum computers use principles of quantum mechanics rather than classical binary logic. They have qubits that can represent superpositions of 0 and 1, allowing massive parallelism. Key effects like superposition, entanglement, and tunneling give them advantages over classical computers for problems like factoring and searching. Early quantum computers have been built with up to a few hundred qubits, and algorithms like Shor's show promise for cryptography applications. However, challenges remain around error correction and controlling quantum states as quantum computers scale up. D-Wave has produced commercial quantum annealing systems with over 1000 qubits, but debate continues on whether these demonstrate quantum advantage. Overall, quantum computing could transform fields like AI, simulation, and optimization if challenges around building reliable large-scale quantum
This is a seminar on Quantum Computing given on 9th march 2017 at CIME, Bhubaneswar by me(2nd year MCA).
Video at - https://youtu.be/vguxg0RYg7M
PDF at - http://www.slideshare.net/deepankarsandhibigraha/quantum-computing-73031375
Mark Carney presents quantum exploits for quantum hackers! These are the slides for his talk given at DEF CON 30, on 12th Aug 2022
In this talk Mark presents a concise quantum overview, some quantum implants for use with quantum exploits, the real way to think about 'store-now decrypt-later', what 'quantum crime' will looks like, and finally comes to the launch of the world's first embedded quantum simulator - uQ (https://github.com/Quantum-Village/micro-quantum)
Mark has thought long and hard about the realities of the post-quantum future - and has some deep insights into how hackers can (and probably will) shape the future of this industry, and maybe the world.
Come and explore the new and exciting world of quantum computing, and find out what the future really holds @ Quantum Village!
This document provides an overview of quantum computing, including:
- The current state of quantum computing technology, which involves noisy intermediate-scale quantum computers with 10s to 100s of qubits and moderate error rates.
- The difference between quantum and classical information, noting that quantum information uses superposition and entanglement, exponentially increasing computational power.
- An example quantum algorithm, Bernstein-Vazirani, which can solve a problem in one query that classical computers require n queries to solve, demonstrating quantum computing's potential computational advantages.
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...Codemotion
Quantum computers can use all of the possible pathways generated by quantum decisions to solve problems that will forever remain intractable to classical compute power. As the mega players vie for quantum supremacy and Rigetti announces its $1M "quantum advantage" prize, we live in exciting times. IBM-Q and Microsoft Q# are two ways you can learn to program quantum computers so that you're ready when the quantum revolution comes. I'll demonstrate some quantum solutions to problems that will forever be out of reach of classical, including organic chemistry and large number factorisation.
Quantum computing for CS students: the unitary circuit modelBruno Fedrici, PhD
This document provides an introduction to quantum computing using the quantum circuit model. It explains that quantum computers exploit quantum physics laws to potentially solve problems faster than classical computers. The document outlines the quantum circuit model and how it represents quantum bits (qubits) as vectors and operations as matrices. It introduces concepts like qubit superposition and entanglement. The document uses the Deutsch algorithm example to illustrate how a quantum computer can solve a problem in one query versus two for a classical computer. It concludes with discussing further topics like quantum teleportation and goals for continued learning.
Quantum Computing and Blockchain: Facts and Myths Ahmed Banafa
The biggest danger to Blockchain networks from quantum computing is its ability to break traditional encryption . Google sent shock waves around the internet when it was claimed, had built a quantum computer able to solve formerly impossible mathematical calculations–with some fearing crypto industry could be at risk . Google states that its experiment is the first experimental challenge against the extended Church-Turing thesis — also known as computability thesis — which claims that traditional computers can effectively carry out any “reasonable” model of computation
Quantum Computing with Amazon Braket
In this talk, I describe some fundamental principles of quantum computing including qu-bits, superposition, and entanglement. I will demonstrate how to perform secure quantum computing tasks across many Quantum Processing Units (QPUs) using Amazon Braket, IAM, and S3.
AI and Machine Learning, Quantum Computing, Amazon Braket, QPU
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiProfessor Lili Saghafi
Quantum computing has the potential to transform cybersecurity.
Some encryption algorithms are thought to be unbreakable, except by brute-force attacks.
Although brute-force attacks may be hard for classical computers, they would be easy for quantum computers making them susceptible to such attacks.
All financial institutions, government agencies healthcare information are in danger.
How could this new thrust of computing strength give us new tiers of power to analyze IT systems at a more granular level for security vulnerabilities and protect us through more complex layers of quantum cryptography?
Quantum computing for CS students: open source softwareBruno Fedrici, PhD
1. The document discusses quantum computing software for CS students, including open source options like IBM QX and QISKit.
2. It describes different models of quantum computation like the quantum circuit model and adiabatic quantum computation. Main components include defining the problem, creating a quantum algorithm and circuit, compiling for the quantum processor, and simulating results.
3. IBM QX is highlighted as an example - it includes a circuit composer GUI to design circuits and run them on simulators or quantum processors, and QISKit is the Python version. Results from experiments are probabilistic due to the nature of quantum theory.
This document discusses quantum computing, including its history, current applications and challenges, and future potential. It begins with explaining quantum mechanics concepts like superposition, entanglement, and measurement. It then discusses various quantum computing models and algorithms. The document outlines engineering challenges like building reliable qubits and correcting errors. Finally, it encourages learning more about this emerging field and lists educational resources to get started with quantum computing.
Post Quantum Cryptography - Emerging FrontiersGokul Alex
Emerging frontiers in Post Quantum Cryptography such as Lattice based Cryptography, Code based Cryptography, Super Elliptical Curve Isogeny based Cryptography etc. and an introduction into Zero Knowledge Proof.
DEF CON 23 - Phillip Aumasson - quantum computers vs computers securityFelipe Prado
This document discusses quantum computers and their implications for computer security. It begins with introductions to quantum mechanics concepts and how quantum computers work. It then explains that quantum computers could break many current encryption standards by efficiently solving problems like integer factorization that are hard for classical computers. Alternative "post-quantum" encryption methods are discussed. The document also covers quantum key distribution, proposals for quantum copy protection, and potential applications of quantum machines for tasks like machine learning. While quantum computers may revolutionize computing, many challenges remain around building them and developing quantum algorithms.
Quantum algorithms for pattern matching in genomic sequences - 2018-06-22Aritra Sarkar
The document discusses quantum algorithms for pattern matching in genomic sequences. It begins with an overview of the presentation topics, including classical approaches to genomic sequence analysis, sub-sequence index search, and using a quantum accelerator. It then provides background on quantum computing concepts like Grover's algorithm and discusses how it could be applied to sub-sequence search through a conditional oracle and OpenQL kernels. The document considers the potential for quantum algorithms to evolve genomic analysis, including through unitary decomposition and using ancilla qubits.
Strengths and limitations of quantum computingVinayak Sharma
Quantum computing as a research field has been around for about 30 years. It seems like a way to overcome the challenges that classical (boolean based) computers are facing due to “quantum tunneling” effect. Although, there are various theoretical and practical challenges that are needed to be dealt with if we want quantum computes to perform better that classical computers (i.e achieving “quantum supremacy”). This seminar will aim to shed light on basics of quantum computing and its strengths and weaknesses.
Video Links
Part 1: https://www.youtube.com/watch?v=-WLD_HnUvy0
Part 2: https://www.youtube.com/watch?v=xXzUmpk8ztU
This document discusses post-quantum cryptography and code-based cryptosystems as an alternative that is secure against quantum computers. It describes the McEliece cryptosystem, which uses error correcting codes, and introduces staircase generator codes and randomly split staircase generator codes to improve efficiency and security. The randomly split staircase generator codes cryptosystem allows for both encryption and digital signatures using efficient procedures while providing 80-bit security levels against quantum attacks, though it has large key sizes of around 10 megabytes.
Alice and Bob’s quest through the fascinating quantum mechanics world as a way to avoid archvilainess Eve eavesdropping. In 1994, Peter Shor showed that many of the cryptosystems used today can be broken using a quantum computer. This idea will be explained together with a short overview of qubit systems. Next, we will see how quantum computing gives rise to the possibility of quantum key distribution with unparalleled security. We will end with a brief discussion on post-quantum cryptography concepts.
This is a seminar on Quantum Computing given on 9th march 2017 at CIME, Bhubaneswar by me(2nd year MCA).
Video at - https://youtu.be/vguxg0RYg7M
ppt at - http://www.slideshare.net/deepankarsandhibigraha/quantum-computing-73031661
Genomics algorithms on digital NISQ accelerators - 2019-01-25Aritra Sarkar
This document discusses using quantum computing to accelerate genomics algorithms. It outlines a roadmap for theoretical and hardware-based quantum genomics solutions (QGS), from perfect qubits to noisy intermediate-scale quantum (NISQ) devices. Near-term algorithms like VQE, QAOA, and variational quantum search are proposed to solve problems like sequence alignment and de novo sequencing. Implementation details are discussed, such as mapping problems to graph algorithms, hybrid classical-quantum programming, and efficiently loading DNA data. The goal is to develop variational algorithms for genomics and implement them on the OpenQL platform to explore their potential on NISQ devices.
Quantum computers use principles of quantum mechanics rather than classical binary logic. They have qubits that can represent superpositions of 0 and 1, allowing massive parallelism. Key effects like superposition, entanglement, and tunneling give them advantages over classical computers for problems like factoring and searching. Early quantum computers have been built with up to a few hundred qubits, and algorithms like Shor's show promise for cryptography applications. However, challenges remain around error correction and controlling quantum states as quantum computers scale up. D-Wave has produced commercial quantum annealing systems with over 1000 qubits, but debate continues on whether these demonstrate quantum advantage. Overall, quantum computing could transform fields like AI, simulation, and optimization if challenges around building reliable large-scale quantum
This is a seminar on Quantum Computing given on 9th march 2017 at CIME, Bhubaneswar by me(2nd year MCA).
Video at - https://youtu.be/vguxg0RYg7M
PDF at - http://www.slideshare.net/deepankarsandhibigraha/quantum-computing-73031375
Mark Carney presents quantum exploits for quantum hackers! These are the slides for his talk given at DEF CON 30, on 12th Aug 2022
In this talk Mark presents a concise quantum overview, some quantum implants for use with quantum exploits, the real way to think about 'store-now decrypt-later', what 'quantum crime' will looks like, and finally comes to the launch of the world's first embedded quantum simulator - uQ (https://github.com/Quantum-Village/micro-quantum)
Mark has thought long and hard about the realities of the post-quantum future - and has some deep insights into how hackers can (and probably will) shape the future of this industry, and maybe the world.
Come and explore the new and exciting world of quantum computing, and find out what the future really holds @ Quantum Village!
This document provides an overview of quantum computing, including:
- The current state of quantum computing technology, which involves noisy intermediate-scale quantum computers with 10s to 100s of qubits and moderate error rates.
- The difference between quantum and classical information, noting that quantum information uses superposition and entanglement, exponentially increasing computational power.
- An example quantum algorithm, Bernstein-Vazirani, which can solve a problem in one query that classical computers require n queries to solve, demonstrating quantum computing's potential computational advantages.
Quantum Implementation of RSA Crypto-algorithm using IBM-QISKITIRJET Journal
This document discusses implementing the RSA encryption algorithm on a quantum computer using the IBM QISKIT platform. It begins with an abstract that outlines the motivation to explore using quantum computing techniques to enhance the security of traditional cryptographic methods like RSA. It then provides background on quantum computing concepts like qubits, Bloch spheres, and quantum phenomena. It explains the traditional RSA encryption process and key generation. Finally, it introduces IBM QISKIT as a tool for writing and executing quantum programs and circuits, and discusses potential methods for implementing a quantum version of RSA using modular exponentiation and other techniques.
We discuss the emerging threat and implications of quantum computing technology on the security of cryptosystems currently deployed in applications, and why system designers should consider addressing this risk already in the near term. We then discuss an overview of the current approaches for building quantum safe cryptosystems and their security and performance aspects. We conclude with a glimpse at the state of the art and research challenges in the area of quantum-safe cryptography, including the design of more advanced quantum-safe cryptographic protocols, such as privacy-preserving cryptocurrencies.
Quantum Computers and Where to Hide from Themmapmeld
Quantum computers use quantum mechanics and qubits that can represent superpositions of 0s and 1s to potentially solve certain problems like prime factorization much faster than classical computers. While quantum computers exist in research labs today, they are still noisy and limited. This could allow them to break many current encryption methods. Researchers are working on "post-quantum crypto" algorithms like lattice-based cryptography that could be resistant even to quantum computers. Major tech companies are also starting to experiment with integrating post-quantum crypto into products and standards ahead of fully functional quantum computers.
Building the Internet of Things with Eclipse IoT - IoTBE meetupBenjamin Cabé
This document discusses building Internet of Things (IoT) solutions using Eclipse IoT projects. It begins by introducing MQTT and CoAP, two common IoT protocols. It then describes how Eclipse IoT projects can be used to build sensor networks, home automation, and device management solutions. Specific projects mentioned include Mosquitto, Paho, Kura, Wakaama, and Leshan. The presentation emphasizes that MQTT is very versatile for building complete IoT solutions and that Eclipse IoT provides both basic building blocks and more complete offerings.
This talk is an introduction to quantum cryptography and cryptanalysis: the physics and mathematics behind how quantum computers provide unique opportunities and threats to traditional cryptographic systems. We will review the basics behind quantum mechanics and quantum computers, why quantum computers pose a unique threat to cryptographic systems and what secure infrastructure systems must do to protect secrets in a post-quantum world.
Quantum Computing and its security implicationsInnoTech
Quantum computers work with qubits that can exist in superposition and be entangled. They have enormous computational power compared to digital computers and could solve problems like prime factorization rapidly. This poses risks to current encryption methods and allows for perfectly secure quantum communication. Several types of quantum computers are being developed, from quantum annealers to analog and universal models, with the latter offering exponential speedups but being the hardest to build. Significant progress is being made, with quantum computers in the tens of qubits now and the need to transition encryption to post-quantum algorithms within the next decade.
All levels of security from simple software to Java Cards and cloud encryption service. Unchain the crypto ecosystem.
Visit https://bouncycrypto.com for more details!
We have presented the first version of the library at Black Hat. We put an incredible effort into development to present a “fully functioning prototype” with a profiler.
The library was verified on four types of JavaCards (and JCardSim simulator). It provided all low-level operations to build protocols with Elliptic Curve cryptography (256, 384, 512, and 521 bits):
Bignat - addition, multiplication, modular operations, inversion, etc.
EC point - low-level operations with EC points
EC curve - generation of EC
This document provides an overview of quantum computing trends and directions. It introduces Francisco Gálvez as the presenter and covers the following topics: IBM's quantum computers including the IBM Quantum Experience platform, basic concepts in quantum computing, quantum architecture focusing on superconducting qubits, quantum algorithms like Shor's and Grover's algorithms, applications of quantum computing, and the IBM Quantum Experience platform which allows users to design and run quantum circuits on real quantum processors.
This document discusses securing the Internet of Things (IoT). It notes that IoT devices differ from traditional devices in ways that impact security, such as limited ability to update firmware. It recommends not relying on security through obscurity and discusses practical crypto implementations for small devices. The document also covers securing communication protocols like MQTT, CoAP and DTLS, as well as approaches like OAuth2 for authentication without passwords on devices. It describes a demonstration of using OAuth2 with MQTT to limit a device's access to an API by giving it a revocable token rather than a static password.
|QAB> : Quantum Computing, AI and BlockchainKan Yuenyong
The document discusses quantum computing, artificial intelligence, and blockchain. It describes how quantum computers could crack encryption like RSA much faster than classical computers. However, building a quantum computer with enough qubits to run algorithms like Shor's algorithm is not currently possible. The document also discusses how quantum computing could be a solution to problems caused by quantum effects at small scales. Photonic quantum computers that operate at room temperature and can scale to millions of qubits are also mentioned.
Why Should You Pay Attention To Quantum Computing?Milos Dunjic
Quantum computing, is an exciting and rather unusual field of informatics. Recently I had privilege to participate on The Quantum Panel, as part of the Payments Canada conference, where I shared some of my view with wider audience.
Webinar: Quantum Revolution Is Here (2022)Immo Salo
The document discusses the emerging field of quantum computing. It introduces Immo Salo, an author and entrepreneur in the quantum computing space. It outlines Salo's background and publications. The document then discusses key concepts in quantum computing like qubits, quantum gates, and applications. Examples are provided for how quantum computing could be used for simulation, optimization, and factorization. The growing quantum ecosystem and quantum computing as a service are also mentioned.
Technical Seminar on Securing the IoT in the Quantum WorldSiri Murthy
This document summarizes research on securing Internet of Things (IoT) communication in a quantum world. Currently, IoT relies on cryptographic algorithms like AES and RSA, but these may be broken by quantum computers. The document reviews symmetric key and asymmetric key cryptography. It proposes using hash-based and code-based cryptosystems, like SPHINCS and McEliece, which are quantum-resistant. Doubling the key size of AES to 256 bits could also secure it against quantum attacks. The development of practical quantum computers may take 5-10 more years, so it is important to adopt quantum-resistant algorithms now to protect data in the future.
The document discusses the evolution of microservices architectures over time as techniques for handling issues like failures and timeouts were developed. It describes how early approaches involved adding timeouts and circuit breakers to code. Later, approaches involved sharing state between services and client-side service discovery. Today, sidecars and service meshes have moved reliability patterns lower in the stack, standardizing protocols and allowing services to abstract away operational concerns. However, meshes also introduce new tradeoffs around portability and development cycles.
Face recognition has countless applications in a lot of different fields from security to marketing. But it usually requires expensive hardware or proprietary software applications. In this session we’re going to describe an open software platform based on Raspberry Pi and OpenCV that covers a subset of this functionality: faces counter. It would be useful when control access to closed spaces such as rooms with a limited capacity is needed. Solution combines cameras, Raspberry Pis, OpenCV, MQTT, embedded Java, and Java SE to cover business needs, privacy constraints, scale out needs, … and much more.
Running head: QUANTUM COMPUTING
QUANTUM COMPUTING 9
Research Paper: Quantum Computing
(Student’s Name)
(Professor’s Name)
(Course Title)
(Date of Submission)
Abstract
Quantum computers are a new era of invention, and its innovation is still to come. The revolution of the quantum computers produced a lot of challenges for ethical decision-making and predictions at different levels of life; therefore, it raised new concerns such as invasion of privacy and national security. In fact, it can be used easily to access and steal private information and data, while on the other hand, quantum computers can help to eliminate these unethical intrusions and secure the information.
Quantum computers will be the most powerful computer in the world that would open the door to encrypt the information in much less time. On the contrary, the supercomputers sometimes take so many hours to encrypt, whereas quantum computers can be used for the same purpose in a shorter time period making it harder to decrypt the data and information.
Many years from now, quantum computers will become mainstays throughout the world of computing. It will serve the individual and the community, but there is a significant concern that quantum computers could be used to invade people’s privacy (Hirvensalo, 2012).
Literature Review
The study area that is aimed on the implementation of quantum theory principles to develop computer technology is called Quantum computing. The field of quantum mechanics arose from German physicist Max Planck’s attempts to describe the spectrum emitted by hot bodies and specifically he wondered the reason behind the shift in color from red to yellow to blue as the temperature of a flame increased.
https://www.stratfor.com/analysis/approaching-quantum-leap-computing
There has been tremendous development in quantum computing since then and more research is been done to realize its full potential. Generally, quantum computing depends on quantum laws of physics. Rather than store information as 0s or 1s as conventional computers do, a quantum computer uses qubits which can be a 1 or a 0 or both at the same time. The quantum superposition along with the quantum effects of entanglement and quantum tunneling enable computers to consider and manipulate all combinations of bits simultaneously. This effect will make quantum computation powerful and fast (Williams, 2014).
http://www.dwavesys.com/quantum-computing
Researchers in quantum computing have enjoyed a greater level of success. The first small 2-qubit quantum computer was developed in 1997 and in 2001 a 5-qubit quantum computer was used to successfully factor the number 15 [85].Since then, experimental progress on a number of different technologies has been steady but slow, although the practical problems facing physical realizations of quantum computers can be addressed. It is believed that a quant.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
3. What is a quantum, anyway?
A 'quantum is just the 'smallest finite piece of something'...
'Quantum' effects are what are used in 'quantum
technologies' - these are usually (but not limited to):
• Superposition – a particle is in multiple possible states
simultaneously
• Entanglement – two particles can become in a sense
inseparable such that the measurement of one gives you
knowledge about the other.
Although Entanglement is important, we won't deal with it
much here because this is not a lecture!
4. What will quantum affect?
There are 4 domains of effect...
Quantum Computing – and
how it will affect classical
cryptography...
Post-Quantum Crypto - what
is it? Why do we (or NIST) care
about it?
Quantum Algorithms – Handy
helpers or solutions in search
of valid problems?
Quantum Key Distribution –
Using quantum effects
themselves to do key exchg
5. Quantum Computation - Class 0
(Mark – go here... https://www.geogebra.org/m/fjb5kvf5 )
If you want to play along at home: follow this QR Code:
6. Quantum Computation – Class 0
So a qubit is a computing unit that can be some combination of the |0⟩
and 1 ; mathematically this is expressed as:
For 𝛼, 𝛽 ∈ ℂ , with 𝛼2
+ 𝛽2
= 1 we can express our states as:
0 =
1
0
, 1 =
0
1
, and our state 𝜓 = 𝛼 0 + 𝛽|1⟩
The sphere representation you see is called the ‘Bloch Sphere’.
Just as classical computers are made up from logic gates – AND, OR,
NAND, NOR, XOR, etc. etc.
Quantum algorithms are made up from quantum gates – which are
matrices strung together into sequences called quantum circuits.
Source: “Quantum Mechanical Computers”, R. Feynman (1985)
11. Resources and Sources for QC
Qiskit – python library and full environment developed by IBM –
run `pip install qiskit` (requires python3)
Qiskit’s Documentation -
https://qiskit.org/textbook/preface.html
Quantiki – a website accessibly detailing many quantum
algorithms and their nuances - https://quantiki.org/
Quantum Algorithm Zoo – A very comprehensive resource for
information about quantum algorithms -
https://quantumalgorithmzoo.org/
12. Resources and Sources for QC
IBM Quantum Experience – IBM’s quantum computer in the
cloud interface. Has a web UI and an API that is built into the
qiskit libraries (just add your API token):
https://quantum-computing.ibm.com/
D-Wave LEAP – D-Wave’s online cloud offering:
https://www.dwavesys.com/take-leap
Azure Quantum – who knows? They haven’t answered any of
my emails in over 6 weeks…
13. So what breaks? And how?
Shor’s Algorithm
• Developed by Peter Shor in 1994
• Solves the problem:
’Given a number N, find it’s prime factors’
…and does so in sub-exponential time
• This is BAD – because we rely on factoring
being exponentially hard to secure a lot of
crypto: RSA and ECC in particular!
Grover’s Algorithm
• Published by Lov Grover in 1996
• Solves the problem:
“Search a database with N-many entries
for a specific value..”
• It does this in up to 𝑁 -many steps.
• This is BAD – because it means that the
search of a key-space goes from 2 𝑛
to 2 𝑛/2
• This takes AES128 to AES64 (aka DES) and
AES256 to AES128.
14. So when does the cr*p hit the koolaid??
Shor’s Algorithm
Shor’s Algo requires ~3 times as many
qubits as there are bits in the number
N to factor
So you need ~3,500 qubits for a
RSA1024 key…
~7-15 years
Grover’s Algorithm
Evers-Sweeney (2019 -
https://kryptera.ca/paper/2019-03/)
propose 6,681 qubits needed to break
AES256
MIT’s efficient Grover’s Algo attack on
AES needs 20Mil qubits
~8-18 years
These calculations use that we have ~26
qubits in a single QC currently, and that
this will double each year to log2 3500 𝑎𝑛𝑑 log2(6681)
15. So what is the fix?
Short-Term Fixes
• Use RSA 4096-bit as your minimum key
length…
• Shor’s algorithm requires ~3 times as
many qubits as bits in an RSA key to
crack it, so longer keys mean you need
bigger QC’s
• For ECC use P384 as much as possible
• Upgrade to AES256 as much as possible
• Use AES in GCM mode – which adds a
significant complexity to the overall
attack
Long-Term fixes
• The NIST competition for the next
USGOV standard cryptography will use
‘Post-Quantum Cryptography’
• The competition has entered its third
round – see QRCode/Link below
• This means that we are
moving towards PQC
becoming the common
type of crypto in use.
• See:https://csrc.nist.gov/News/2020/pqc-third-round-
candidate-announcement
16. Post Quantum Cryptography
Post-Quantum Cryptography
This simply means:
“Cryptography that does not rely on
factoring as the ‘hard problem’ to make
the cryptography secure”
Current Candidates in NIST R3:
• Lattice based crypto: Kyber, Saber,
NTRU
• Supersingular Isogeny based: SIKE
• Other: Classic McEliece
• Hash algos: CRYSTALS-DILITHIUM,
FALCON, Rainbow
17. LWE – A Worked Example
4 1 11 10
5 5 9 5
3 9 0 10
1 3 3 2
12 7 3 4
6 5 11 4
3 3 5 0
6
9
11
11
4
8
1
10
4
12
9
x =
NOT SECURE!
This is Easy to solve with basic Linear
Algebra (vectors and matrices!) by
means of Gaussian Elimination
(mod 13)
Random Array Secret Output
Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf
18. LWE – The Setup
4 1 11 10
5 5 9 5
3 9 0 10
1 3 3 2
12 7 3 4
6 5 11 4
3 3 5 0
6
9
11
11
4
7
2
11
5
12
8
x =
We add a ‘small error’ term, which is
essentially random noise, to be able to skew
slightly the output – hence the name:
Learning with Errors (LWE)
0
-1
1
1
1
1
0
-1
+ (mod 13)
Random Array Secret Small Noise Output
Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf
19. LWE – The Problem
4 1 11 10
5 5 9 5
3 9 0 10
1 3 3 2
12 7 3 4
6 5 11 4
3 3 5 0
x =
Given the random array
and the output, find
the secret!
+ (mod 13)
Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf
Random Array Secret Small Noise Output
4
7
2
11
5
12
8
20. But how is this hard?
Well, we know the following is NP-hard…
Source: https://summerschool-croatia.cs.ru.nl/2018/slides/Introduction%20to%20post-quantum%20cryptography%20and%20learning%20with%20errors.pdf
There is no
known
quantum
algorithmic
speedup for
this
problem!
21. So when will PQC be commonplace?
Current Candidates in NIST R3:
• Lattice based crypto: Kyber, Saber, NTRU
• Supersingular Isogeny based: SIKE
• Other: Classic McEliece
• Hash algos: CRYSTALS-DILITHIUM, FALCON, Rainbow
We are now in ‘round 3’ of the competition…
We can expect some more code and more attacks to be
launched against these ciphers before they are chosen.
But remember – we don’t know what it’ll be called!
Within 2 years we should have the results…
Expect multiple ciphers with many notes,
recommendations, requirements, and key lengths!
23. Quantum Key Distribution
In 1984, Charles Bennett and Gilles Brassard worked out a way of using the quantum
properties of photons to make a provably secure key exchange mechanism
This protocol, known as BB84, paved the way for further protocols such as Ekert in ‘91,
called E91, and a plethora of others.
24. But how does QKD Work?
Source: http://www.jetir.org/papers/JETIR1906L90.pdf
25. So why isn’t this everywhere?
There is something that is not often talked about with QKD…
With Classical cryptography the security is in the mathematics that underpins the
cryptography. We rely on this to secure the systems that we use that cryptography
on. But this mathematics is distinct from the system we communicate over…
With quantum cryptography, we still use mathematics to secure the system –
But the mathematics is inherently linked to the system we communicate over!!
“You can’t packet switch photons without measuring them…”
-- C. 2020
Source:
https://www.forbes.com/sites/daveywinder/2020/08/04/meet-the-scrappy-space-startup-taking-quantum-security-into-space-honeywell-loft-orbital-qkd-encryption/
26. So why isn’t this everywhere?
With quantum cryptography, we still use mathematics to secure the system –
But the mathematics is inherently linked to the system we communicate over!!
“You can’t packet switch photons without measuring them…”
-- C. 2020
27. QKD Companies…
ID Quantique are the market leaders –
https://www.idquantique.com/
MagiQ have also been around for a while –
https://www.magiqtech.com/
Toshiba are the other main player in delivering QKD solutions
https://www.toshiba.co.jp/qkd/en/
Want to scare a QKD vendor? Ask them how their tech works
with cloud-based infrastructure…
28. QKD Hackers…
“Hacking Single-photon Avalanche Detection in QKD via Pulse Illumination” Zhihao
Wu et al. (2020)
https://arxiv.org/abs/2002.09146
“Hacking QKD via Injection Locking” Xiao-Ling et al. (2020)
https://arxiv.org/abs/1902.10423
“Hacking Alice’s Box in CV-QKD” J. Pereira, S. Pirandola (2018)
https://arxiv.org/abs/1807.04287
“Hacking commercial quantum cryptography systems by tailored bright
illumination” Lars Lydersen et al. (2011)
https://arxiv.org/abs/1008.4593
29. But what about other Quantum Algorithms?
There is more to quantum computing
than ‘factoring big numbers for TLAs’
• Quantum Finance – is an area
concerned with finding models akin
to Black-Scholes that work on QCs
• Quantum Chemistry Simulations –
recently making the news, using QCs
to simulate quantum systems seems
very natural
• Quantum Random Number
Generation…
30. So how do we do that?
Quantum Random Number Generation…
We are very happy to release a proof of
concept showing how to integrate cloud
quantum computing solutions (IBM-Q
here) into regular python scripting to
achieve something.
We will follow the flow chart on the right,
and will build our system with the following
limitations:
• No optimisations!
• Non-standard CSPRNG implementation
31. So what quantum circuit do we use?
The QRNG Circuit
We place all of the qubits into
superposition, and then measure
them all to get quantumly
random bits!
The ibmq_16_melbourne
quantum computer has 15 qubits
available – but you can only run
for 8192 shots.
This means we can get up to
122,880 random bits per job!
32. Proof of Concept Release!!
Quantum Random Number Generation…
Remember, this system has the following
limitations:
• No optimisations!
• Non-standard CSPRNG implementation
As such this code is
DEFINITELY NOT FOR PROD!!
Link:
https://gist.github.com/unprovable/43756
1c660f7d85f283e510a16ef5834