Privacy in the era of quantum computers

Speck&Tech
Speck&TechSpeck&Tech
The privacy in the era of
quantum computers
Dr. Nicolò Leone
nicolo.leone@unitn.it
21/03/23
NanoScience
Laboratory
Quantum
computers are
great!!!
Solve different kinds of
classically unsolvable problems.
Any
downside?
The title of the presentation has
spoiled it…
Based on Public key cryptography system
Sharing of information
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography Public
Private
Connected by the
algorithm
Es: the public key =
product of the two
prime numbers
Alice Bob
Alice
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography
Encrypted with Alice Public key
Alice Bob
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography Alice decrypts the message using his private key.
Factorisation of large prime numbers.
Solved in exponential time
Alice Bob
Quantum
computing
Solve factorisation
problems
Quantum
Computers
Can solve other
crypto. problems?
Algorithm
Only a few
Future
Not enough qubit
Time
Polynomial
Security
Cannot simply take a
longer key
https://newsroom.ibm.com/media-quantum-innovation?keywords=quantum&l=100
Time is
passing.
The company are approaching the
number of necessary qubits.
https://newsroom.ibm.com/media-quantum-innovation?keywords=quantum&l=100
Post-quantum cryptography
Find problems that are still difficult to be
solved by quantum computers
Quantum cryptography
Using quantum physics to beat quantum
physics.
PRO
Post-quantum
cryptography
CONS
Security
Assumptions
Demanding
Dedicated hardware
Deployment
Software
Cost
Cheap
PRO
Quantum cryptography
Quantum key distribution
CONS
Deployment
Hardware
Cost
Expensive
Security
Quantum mechanics
Demanding
Dedicated hardware
https://www.qticompany.com/products/
BB84
First protocol proposed by
Bennett and Bressard in
1984
Quantum key
distribution
The key is not transmitted
Alice Bob
Quantum channel
Channel in which we inject
the quantum light
Quantum key
distribution
Alice Bob
Polarization
Direction of oscillation of
the electronic field
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Input randomness
It is necessary to randomly
select the base and the
digit to send
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Input randomness
Bob needs to select its
measurement basis also
randomly.
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Quantum collapse
Bob projects the
wavefunction of the
photon.
Quantum key
distribution
ℙ(V) = 1
Quantum collapse
Bob projects the
wavefunction of the
photon.
Quantum key
distribution
ℙ(V) = 1
ℙ(V) = 0.5
ℙ(H) = 0.5
Now let’s enter in
the protocol
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 0 X 1 X X 1 X 1 1 X
Alice Bob
Now let’s enter in
the protocol
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 0 X 1 X X 1 X 1 1 X
Alice Bob
Basis
announcement
They keep the runs in
which the basis are the
same.
Quantum key
distribution
Alice and Bob announce the basis
used.
Alice Bob
The key creation
Bob and Alice have
obtained the same key
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B1 B1 B2 B2
Alice Digit 0 1 1 1 1
Bob Base B1 B1 B1 B2 B2
Bob Result 0 1 1 1 1
Alice Bob
The appearance of
Eve
Now an Eavesdropper
appears and try to steal
the key.
Quantum key
distribution
Alice Bob
Eve
The appearance of
Eve
Now an Eavesdropper
appears and try to steal
the key.
Quantum key
distribution
Alice Bob
Eve
Eve performs an
intercept and
resend attack
Eve chooses the right
base.
Quantum key
distribution
Eve performs an
intercept and
resend attack
Eve chooses the wrong
base. Eve introduces
errors in the sequence.
Quantum key
distribution
Eve action
Errors are introduced in
the sequence.
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 1 X 1 X X 1 X 0 0 X
Alice Bob
Error estimation
Alice and Bob share a
piece of their key.
Quantum key
distribution
Error estimation, by comparing a
piece of the key.
Alice Bob
Error estimation
All the errors are treated
as due to Eve.
Quantum key
distribution
Errors < Threshold_value
Alice Bob
One-time pad
A method that is 100%
secure.
Quantum key
distribution Encrypted message
B = 01000010
01000010 +
01100001 =
00100011
Key = 01100001
#
00100011 +
01100001 =
01000010
Key = 01100001
# = 00100011
B
Alice Bob
One-time pad
Never reuse the same key!
Quantum key
distribution
V
V
From: http://www.cryptosmith.com/archives/70
=
=
=
V
V
From: http://www.cryptosmith.com/archives/70
=
=
Secure forever!
It is theoretically the most secure approach that can be
implemented.
The attacks are unfeasible
It is better to try to compromise Alice or Bob
Cost reduction
A As the research proceeds the cost of the QKD will
decrease
Quantum-key
distribution
Actually testing a new prototype of bidirectional QKD system
Now
Find out more SPEQK Team info@speqk.com
|ψ⟩ =
1
2
(|Thank⟩ + |you⟩)
1 of 37

Recommended

The security of quantum cryptography by
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
4.1K views62 slides
Zero Knowledge Proofs: What they are and how they work by
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workAll Things Open
102 views35 slides
CS283-PublicKey.ppt by
CS283-PublicKey.pptCS283-PublicKey.ppt
CS283-PublicKey.pptMIBrand
5 views22 slides
CS283-PublicKey.ppt by
CS283-PublicKey.pptCS283-PublicKey.ppt
CS283-PublicKey.pptShounakDas16
1 view22 slides
Public-Key Protocols by
Public-Key ProtocolsPublic-Key Protocols
Public-Key ProtocolsDavid Evans
1.2K views87 slides
Secure Communication (Distributed computing) by
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Sri Prasanna
827 views60 slides

More Related Content

Similar to Privacy in the era of quantum computers

Quantam cryptogrphy ppt (1) by
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
25.3K views22 slides
Chapter 8 - Security in Computer Networks by
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer NetworksAndy Juan Sarango Veliz
99 views6 slides
1_Protocols.pptx by
1_Protocols.pptx1_Protocols.pptx
1_Protocols.pptxAhmedAlRasheed18
13 views175 slides
13 by
1313
13Toan Nguyen
307 views17 slides
13 asymmetric key cryptography by
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
11.5K views17 slides
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S... by
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...44CON
443 views76 slides

Similar to Privacy in the era of quantum computers(12)

Quantam cryptogrphy ppt (1) by deepu427
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu42725.3K views
13 asymmetric key cryptography by drewz lin
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin11.5K views
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S... by 44CON
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus S...
44CON443 views
Multi-Party Computation for the Masses by David Evans
Multi-Party Computation for the MassesMulti-Party Computation for the Masses
Multi-Party Computation for the Masses
David Evans5.3K views
aacyberessential3cryptography-131067585699078884.pptx by ImXaib
aacyberessential3cryptography-131067585699078884.pptxaacyberessential3cryptography-131067585699078884.pptx
aacyberessential3cryptography-131067585699078884.pptx
ImXaib3 views
Zksnarks in english by Ronak Kogta
Zksnarks in englishZksnarks in english
Zksnarks in english
Ronak Kogta905 views
Binary System by Bray Avila by avilab
Binary System by Bray AvilaBinary System by Bray Avila
Binary System by Bray Avila
avilab911 views

More from Speck&Tech

Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ... by
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Speck&Tech
74 views12 slides
Monitorare una flotta di autobus: architettura di un progetto di acquisizione... by
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Speck&Tech
72 views18 slides
Why LLMs should be handled with care by
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with careSpeck&Tech
89 views21 slides
Machine learning with quantum computers by
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computersSpeck&Tech
217 views20 slides
Give your Web App superpowers by using GPUs by
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUsSpeck&Tech
209 views60 slides
From leaf to orbit: exploring forests with technology by
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technologySpeck&Tech
101 views35 slides

More from Speck&Tech(20)

Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ... by Speck&Tech
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Home4MeAi: un progetto sociale che utilizza dispositivi IoT per sfruttare le ...
Speck&Tech74 views
Monitorare una flotta di autobus: architettura di un progetto di acquisizione... by Speck&Tech
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Monitorare una flotta di autobus: architettura di un progetto di acquisizione...
Speck&Tech72 views
Why LLMs should be handled with care by Speck&Tech
Why LLMs should be handled with careWhy LLMs should be handled with care
Why LLMs should be handled with care
Speck&Tech89 views
Machine learning with quantum computers by Speck&Tech
Machine learning with quantum computersMachine learning with quantum computers
Machine learning with quantum computers
Speck&Tech217 views
Give your Web App superpowers by using GPUs by Speck&Tech
Give your Web App superpowers by using GPUsGive your Web App superpowers by using GPUs
Give your Web App superpowers by using GPUs
Speck&Tech209 views
From leaf to orbit: exploring forests with technology by Speck&Tech
From leaf to orbit: exploring forests with technologyFrom leaf to orbit: exploring forests with technology
From leaf to orbit: exploring forests with technology
Speck&Tech101 views
Innovating Wood by Speck&Tech
Innovating WoodInnovating Wood
Innovating Wood
Speck&Tech141 views
Behind the scenes of our everyday Internet: the role of an IXP like MIX by Speck&Tech
Behind the scenes of our everyday Internet: the role of an IXP like MIXBehind the scenes of our everyday Internet: the role of an IXP like MIX
Behind the scenes of our everyday Internet: the role of an IXP like MIX
Speck&Tech101 views
Architecting a 35 PB distributed parallel file system for science by Speck&Tech
Architecting a 35 PB distributed parallel file system for scienceArchitecting a 35 PB distributed parallel file system for science
Architecting a 35 PB distributed parallel file system for science
Speck&Tech129 views
Truck planning: how to certify the right route by Speck&Tech
Truck planning: how to certify the right routeTruck planning: how to certify the right route
Truck planning: how to certify the right route
Speck&Tech229 views
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ... by Speck&Tech
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...
Break it up! 5G, cruise control, autonomous vehicle cooperation, and bending ...
Speck&Tech230 views
AI and Space: finally, no more arguing with the GPS by Speck&Tech
AI and Space: finally, no more arguing with the GPSAI and Space: finally, no more arguing with the GPS
AI and Space: finally, no more arguing with the GPS
Speck&Tech171 views
Space is open for business by Speck&Tech
Space is open for businessSpace is open for business
Space is open for business
Speck&Tech177 views
Building large science space projects by Speck&Tech
Building large science space projectsBuilding large science space projects
Building large science space projects
Speck&Tech161 views
Breaking the Laws of Robotics: Attacking Industrial Robots by Speck&Tech
Breaking the Laws of Robotics: Attacking Industrial RobotsBreaking the Laws of Robotics: Attacking Industrial Robots
Breaking the Laws of Robotics: Attacking Industrial Robots
Speck&Tech179 views
Log Stealers - Shopping time for Threat Actors! by Speck&Tech
Log Stealers - Shopping time for Threat Actors!Log Stealers - Shopping time for Threat Actors!
Log Stealers - Shopping time for Threat Actors!
Speck&Tech379 views
Design beyond deliverables by Speck&Tech
Design beyond deliverablesDesign beyond deliverables
Design beyond deliverables
Speck&Tech195 views
Your website is ugly - how to fix it (and why you should care) by Speck&Tech
Your website is ugly - how to fix it (and why you should care)Your website is ugly - how to fix it (and why you should care)
Your website is ugly - how to fix it (and why you should care)
Speck&Tech218 views
Why you should get a worse computer by Speck&Tech
Why you should get a worse computerWhy you should get a worse computer
Why you should get a worse computer
Speck&Tech228 views
Intelligenza artificiale: uno yin o uno yang per i diritti umani? by Speck&Tech
Intelligenza artificiale: uno yin o uno yang per i diritti umani?Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Intelligenza artificiale: uno yin o uno yang per i diritti umani?
Speck&Tech175 views

Recently uploaded

KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
221 views19 slides
NTGapps NTG LowCode Platform by
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
423 views30 slides
Cencora Executive Symposium by
Cencora Executive SymposiumCencora Executive Symposium
Cencora Executive Symposiummarketingcommunicati21
159 views14 slides
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
130 views9 slides
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
158 views59 slides
The Role of Patterns in the Era of Large Language Models by
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language ModelsYunyao Li
85 views65 slides

Recently uploaded(20)

KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue221 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu423 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue130 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash158 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li85 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue180 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue139 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue206 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue106 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue161 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10123 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue173 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue252 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue203 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue186 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 views

Privacy in the era of quantum computers