Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

Size: px
Start display at page:

Download "Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016"

Transcription

1 Managing the quantum risk to cybersecurity Global Risk Institute Michele Mosca 11 April 2016

2 Cyber technologies are becoming increasingly pervasive.

3 Cybersecurity is a growing and fundamental part of safety and security of individuals, organizations and society.

4 Unpredictable new vulnerabilities going up a down escalator

5 Physics and Computation Information is physical so we must recast information and computation in a quantum paradigm. By Carsten Ullrich E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST

6 What will be affected? Products, services, business functions that rely on security products will either stop functioning or not provide the expected levels of security. Clouding computing Payment systems Internet IoT etc. Secure Web Browsing - TLS/SSL Auto-Updates Digital Signatures VPN - IPSec Secure -S/MIME PKI etc RSA, DSA, DH, ECDH, ECDSA, AES, 3-DES, SHA,

7 How much of a problem is quantum computing, really?

8 How soon do we need to worry? Depends on*: How long do you need your cryptographic keys to be secure? security shelf-life (x years) How much time will it take to re-tool the existing infrastructure with large-scale quantum-safe solution? (y years) migration time How long will it take for a large-scale quantum computer to be built (or for any other relevant advance)? (z years) collapse time Theorem : If x + y > z, then worry. *M. Mosca: e-proceedings of 1 st ETSI Quantum-Safe Cryptography Workshop, Also time y z x

9 Business bottom line Fact: If x+y>z, then you will not be able to provide the required x years of security. Fact: If y>z then cyber-systems will collapse in z years with no quick fix. Prediction: In the next 6-24 months, organizations will be differentiated by whether or not they have a well-articulated quantum risk management plan.

10 Building a large quantum computer

11 What is z? Mosca: [Oxford] 1996: 20 qubits in 20 years [NIST April 2015, ISACA September 2015]: 1/7 chance of breaking RSA-2048 by 2026, ½ chance by 2031 Microsoft Research [October 2015]: Recent improvements in control of quantum systems make it seem feasible to finally build a quantum computer within a decade. Use of a quantum computer enables much larger and more accurate simulations than with any known classical algorithm, and will allow many open questions in quantum materials to be resolved once a small quantum computer with around one hundred logical qubits becomes available.

12 NSA [August 2015]: NSA's Information Assurance Directorate will initiate a transition to quantum resistant algorithms in the not too distant future. NSA [January 2016]: CNSA Suite and Quantum Computing FAQ NIST [February 2016]: NISTIR 8105 DRAFT Report on Post- Quantum Cryptography outlines NIST s initial plan to move forward in this space. ETSI white paper:

13 Quantum-safe cryptographic tool-chest quantum-resistant conventional cryptography Deployable without quantum technologies Believed/hoped to be secure against quantum computer attacks of the future + quantum cryptography Requires some quantum technologies (less than a largescale quantum computer) Typically no computational assumptions and thus known to be secure against quantum attacks Both sets of cryptographic tools can work very well together in quantum-safe cryptographic ecosystem

14 How easy is it to evolve from one cryptographic algorithm to a quantumsecure one? Are the standards and practices ready?

15 What do we do today?

16 Managing the quantum risk At a high level, we need to assess x,y and z for the range of information assets and business functions. + > Urgent action required to minimize losses Security Shelf life Migration Time Collapse Time + < Acting now will avoid losses Proprietary Information of evolutionq Inc.

17 Assessing x Enumerate key information assets and business functions. Understand the nature of the systems being used (or that will be used), and the assets and functions they protect. Understand legal or regulatory influences. What is the security shelf-life of those information assets? What is the value of those assets or business functions?

18 Assessing z Catalog system components and assess vulnerabilities to quantum attacks. Understand threat actors who might attack your systems. Track progress of the emergence of a true quantum threat to these systems by the relevant threat actors.

19 Assessing and managing y Examine the existing risk mitigation policies, procedures, and processes, with a special focus on cryptography. Identify options for mitigating the quantum risk against your systems. Identify community and technical challenges to deploying quantum-safe cryptography. Natural approach is to integrate quantum readiness into current risk assessment/mitigation processes. As cryptographic tools and processes become scheduled for updates or replacement, consider quantum-safe technologies. Consider hybrid approaches to retain robustness of tools protecting against today s threats while introducing new tools designed to protect against the future quantum threat.

20 Assessing and managing y This is the part of the equation we have some control over. The landscape is new, uncertain and changing fast, so it s not easy. Obtaining specialized expertise and formulating a plan for your organization will help reduce losses and costs in the future.

21 Thank you! Comments, questions and feedback are very welcome. Michele Mosca University Research Chair, Faculty of Mathematics Co-Founder, Institute for Quantum Computing Director, CryptoWorks21 University of Waterloo Co-founder and CEO, evolutionq Inc. Upcoming workshop of interest: 4th ETSI/IQC Workshop on Quantum-Safe Cryptography September 2016 Toronto, Canada

The Quantum Threat to Cybersecurity (for CxOs)

The Quantum Threat to Cybersecurity (for CxOs) The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.

More information

The quantum threat to cryptography

The quantum threat to cryptography The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How

More information

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M. Mosca New paradigm brings new possibilities Designing

More information

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel #RSAC SESSION ID: CRYP-W10 PQ Crypto Panel MODERATOR: Bart Preneel Professor, imec-cosic KU Leuven PANELISTS: Dr. Dan Boneh Professor, Stanford University Michele Mosca Professor, UWaterloo and evolutionq

More information

The science behind these computers originates in

The science behind these computers originates in A Methodology for Quantum Risk Assessment Author: Dr. Michele Mosca & John Mulholland DISRUPTIVE TECHNOLOGY INTRODUCTION Until recently, quantum computing was often viewed as a capability that might emerge

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Quantum Computer

More information

Evolution of Cryptography April 25 th 2017

Evolution of Cryptography April 25 th 2017 Evolution of Cryptography April 25 th 2017 Internet of Things Today s Moderator: Jason Sabin Chief Security Officer, DigiCert, Inc. To ask a question: Type in your question in the Questions area of your

More information

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 What drives a company s digital strategy in 2020 and beyond? Quantum Computing it s the end of the world

More information

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Post-Quantum Cryptography & Privacy. Andreas Hülsing Post-Quantum Cryptography & Privacy Andreas Hülsing Privacy? Too abstract? How to achieve privacy? Under the hood... Asymmetric Crypto ECC RSA DSA Symmetric Crypto AES SHA2 SHA1... Combination of both

More information

Quantum Technologies: Threats & Solutions to Cybersecurity

Quantum Technologies: Threats & Solutions to Cybersecurity Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017 ID Quantique Company Profile

More information

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK SESSION 1 World Tour HIGHLIGHTS Session focused on activity world wide on quantum safe communications research and policy. Matthew Scholl (NIST) described

More information

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Post-Quantum Cryptography & Privacy. Andreas Hülsing Post-Quantum Cryptography & Privacy Andreas Hülsing Privacy? Too abstract? How to achieve privacy? Under the hood... Public-key crypto ECC RSA DSA Secret-key crypto AES SHA2 SHA1... Combination of both

More information

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? Surveillance Problem / Weak Crypto

More information

Information Security in the Age of Quantum Technologies

Information Security in the Age of Quantum Technologies www.pwc.ru Information Security in the Age of Quantum Technologies Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes

More information

Risk management and the quantum threat

Risk management and the quantum threat LEIDEN UNIVERSITY Risk management and the quantum threat Understanding the requirements to run Shor s algorithm to break RSA with a 2048 bit key and how to use this information to protect against the quantum

More information

Identifying and Analyzing Implicit Interactions in Critical Infrastructure Systems

Identifying and Analyzing Implicit Interactions in Critical Infrastructure Systems Identifying and in Critical Infrastructure Systems Jason Jaskolka Collaborator: John Villasenor (UCLA) Department of Systems and Computer Engineering Carleton University, Ottawa, ON, Canada jaskolka@sce.carleton.ca

More information

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS SESSION ID: SP02-R14 ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS Jon Geater Chief Technology Officer Thales esecurity @jongeater Hold onto your hats! This is a very fast-paced

More information

Lattice-Based Cryptography

Lattice-Based Cryptography Liljana Babinkostova Department of Mathematics Computing Colloquium Series Detecting Sensor-hijack Attacks in Wearable Medical Systems Krishna Venkatasubramanian Worcester Polytechnic Institute Quantum

More information

Random Number Generation Is Getting Harder It s Time to Pay Attention

Random Number Generation Is Getting Harder It s Time to Pay Attention SESSION ID: PDAC-F03 Random Number Generation Is Getting Harder It s Time to Pay Attention Richard Moulds General Manager Whitewood Richard Hughes Laboratory Fellow (Retired) Los Alamos National Laboratory

More information

Information Security

Information Security SE 4472 / ECE 9064 Information Security Week 12: Random Number Generators and Picking Appropriate Key Lengths Fall 2015 Prof. Aleksander Essex Random Number Generation Where do keys come from? So far we

More information

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW?

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW? POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW? Hanno Böck https://hboeck.de 1 INTRODUCTION Hanno Böck, freelance journalist and hacker. Writing for Golem.de and others. Fuzzing Project, funded

More information

The quantum threat to cryptography

The quantum threat to cryptography The quantum threat to cryptography Ashley Montanaro School of Mathematics, University of Bristol 20 October 2016 Quantum computers University of Bristol IBM UCSB / Google University of Oxford Experimental

More information

GeoComply Overview. 666 Burrard Street, Suite 1530, Vancouver BC V6C 2X8

GeoComply Overview. 666 Burrard Street, Suite 1530, Vancouver BC V6C 2X8 GeoComply Overview 666 Burrard Street, Suite 1530, Vancouver BC V6C 2X8 EXECUTIVE SUMMARY GeoComply is a global leader in geolocation technology. Since launching in 2011, GeoComply has quickly become the

More information

Entanglement and Quantum Key Distribution at ESA

Entanglement and Quantum Key Distribution at ESA Entanglement and Quantum Key Distribution at ESA Eric Wille, TEC-MMO E.Murphy, TEC-MME ESA UNCLASSIFIED - For Official Use Entanglement and QKD Motivation Fundamental Research - Limitations of Quantum

More information

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Cryptography in the Quantum Era Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Postulate #1: Qubit state belongs to Hilbert space of dimension 2 ψ

More information

Blockchain and Quantum Computing

Blockchain and Quantum Computing M T R 1 7 0 4 8 7 M I T R E T E C H N I C A L R E P O R T Blockchain and Quantum Computing Project No.: 25SPI050-12 The views, opinions and/or findings contained in this report are those of The MITRE Corporation

More information

2014 Russell County Hazard Mitigation Plan Update STAKEHOLDERS AND TECHNICAL ADVISORS MEETING 2/6/14

2014 Russell County Hazard Mitigation Plan Update STAKEHOLDERS AND TECHNICAL ADVISORS MEETING 2/6/14 2014 Russell County Hazard Mitigation Plan Update STAKEHOLDERS AND TECHNICAL ADVISORS MEETING 2/6/14 Welcome and Introductions We cannot direct the wind, but we can adjust our sails. 44 CFR 201.6; Local

More information

White paper Quantum computing in financial services

White paper Quantum computing in financial services White paper Quantum computing in financial services There is no shortage of theoretical applications of quantum computing, at a grand scale, that approaches science fiction. How will it really affect the

More information

Cyber Security in the Quantum Era

Cyber Security in the Quantum Era T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act

More information

Quantum Computing and the Possible Effects on Modern Security Practices

Quantum Computing and the Possible Effects on Modern Security Practices Quantum Computing and the Possible Effects on Modern Security Practices SE 4C03 Winter 2005 Kartik Sivaramakrishnan Researched by: Jeffery Lindner, 9904294 Due: April 04, 2005 Table of Contents Introduction...

More information

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION Based on the discussion during the respective workshop at the ZEISS Symposium Optics in the Quantum World on 18 April 2018 in Oberkochen, Germany

More information

Foundations of Network and Computer Security

Foundations of Network and Computer Security Foundations of Network and Computer Security John Black Lecture #5 Sep 7 th 2004 CSCI 6268/TLEN 5831, Fall 2004 Announcements Please sign up for class mailing list by end of today Quiz #1 will be on Thursday,

More information

Climate Risk Visualization for Adaptation Planning and Emergency Response

Climate Risk Visualization for Adaptation Planning and Emergency Response Climate Risk Visualization for Adaptation Planning and Emergency Response NCR Flood Fact Finding Workshop Ricardo Saavedra ricardo@vizonomy.com Social Media, Mobile, and Big Data St. Peter s Basilica,

More information

Cryptographic Hash Functions

Cryptographic Hash Functions Cryptographic Hash Functions Çetin Kaya Koç koc@ece.orst.edu Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331 Technical Report December 9, 2002 Version 1.5 1 1 Introduction

More information

America must act to protect its power grid

America must act to protect its power grid Page 1 of 5 Opinion Utilities America must act to protect its power grid JAMES WOOLSEY When Hurricane Maria struck the US territory of Puerto Rico, the entire island lost power AFP James Woolsey OCTOBER

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

Selecting Elliptic Curves for Cryptography Real World Issues

Selecting Elliptic Curves for Cryptography Real World Issues Selecting Elliptic Curves for Cryptography Real World Issues Michael Naehrig Cryptography Research Group Microsoft Research UW Number Theory Seminar Seattle, 28 April 2015 Elliptic Curve Cryptography 1985:

More information

POLICY ISSUE (INFORMATION)

POLICY ISSUE (INFORMATION) POLICY ISSUE (INFORMATION) August 12, 2011 SECY-11-0112 FOR: FROM: SUBJECT: The Commissioners Michael R. Johnson, Director /RA/ Office of New Reactors STAFF ASSESSMENT OF SELECTED SMALL MODULAR REACTOR

More information

FIS' Partnership with Zelle for P2P Payments

FIS' Partnership with Zelle for P2P Payments FIS' Partnership with Zelle for P2P Payments Chris Burfield, SVP, Digital Market Strategy Norman Marraccini, VP, Director of Digital Payment Product Strategy & Marketing Peter Tapling, Chief Revenue Officer,

More information

Orford Completes Phase 1 Exploration Program and Generates High-Quality Drill Targets on its Carolina Gold Properties

Orford Completes Phase 1 Exploration Program and Generates High-Quality Drill Targets on its Carolina Gold Properties NEWS RELEASE Orford Completes Phase 1 Exploration Program and Generates High-Quality Drill Targets on its Carolina Gold Properties Toronto, Ontario, March 1, 2018 Orford Mining Corporation ( Orford ) (TSX-V:

More information

On error distributions in ring-based LWE

On error distributions in ring-based LWE On error distributions in ring-based LWE Wouter Castryck 1,2, Ilia Iliashenko 1, Frederik Vercauteren 1,3 1 COSIC, KU Leuven 2 Ghent University 3 Open Security Research ANTS-XII, Kaiserslautern, August

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland

More information

1500 AMD Opteron processor (2.2 GHz with 2 GB RAM)

1500 AMD Opteron processor (2.2 GHz with 2 GB RAM) NICT 2019 2019 2 7 1 RSA RSA 2 3 (1) exp $ 64/9 + *(1) (ln 0) 1/2 (ln ln 0) 3/2 (2) 2009 12 768 (232 ) 1500 AMD Opteron processor (2.2 GHz with 2 GB RAM) 4 (3) 18 2 (1) (2) (3) 5 CRYPTREC 1. 2. 3. 1024,

More information

FLORENCE AFTERMATH PAYNE INSTITUTE COMMENTARY SERIES: VIEWPOINT. Can the Power Outages Be Seen from Space?

FLORENCE AFTERMATH PAYNE INSTITUTE COMMENTARY SERIES: VIEWPOINT. Can the Power Outages Be Seen from Space? PAYNE INSTITUTE COMMENTARY SERIES: VIEWPOINT FLORENCE AFTERMATH Can the Power Outages Be Seen from Space? By Chris Elvidge, Kimberly Baugh, and Morgan Bazilian September, 2018 TRACKING ENERGY DISRUPTIONS

More information

Public Key Cryptography

Public Key Cryptography Public Key Cryptography Introduction Public Key Cryptography Unlike symmetric key, there is no need for Alice and Bob to share a common secret Alice can convey her public key to Bob in a public communication:

More information

Practical, Quantum-Secure Key Exchange from LWE

Practical, Quantum-Secure Key Exchange from LWE Practical, Quantum-Secure Key Exchange from LWE Douglas Stebila 4 th ETSI/IQC Workshop on Quantum-Safe Cryptography September 21, 2016 Acknowledgements Collaborators Joppe Bos Craig Costello and Michael

More information

Everything is Quantum The EU Quantum Flagship

Everything is Quantum The EU Quantum Flagship Everything is Quantum The EU Quantum Flagship Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? What

More information

PKCS #1 v2.0 Amendment 1: Multi-Prime RSA

PKCS #1 v2.0 Amendment 1: Multi-Prime RSA PKCS #1 v2.0 Amendment 1: Multi-Prime RSA RSA Laboratories DRAFT 1 May 20, 2000 Editor s note: This is the first draft of amendment 1 to PKCS #1 v2.0, which is available for a 30-day public review period.

More information

City of Manitou Springs

City of Manitou Springs March 2018 City of Manitou Springs Implementing Land Use tools to reduce and mitigate natural hazard risk Context & History Past Present Historic homes Older infrastructure Hillside development Creekside

More information

An Introduction to Elliptic Curve Cryptography

An Introduction to Elliptic Curve Cryptography Harald Baier An Introduction to Elliptic Curve Cryptography / Summer term 2013 1/22 An Introduction to Elliptic Curve Cryptography Harald Baier Hochschule Darmstadt, CASED, da/sec Summer term 2013 Harald

More information

GEO Geohazards Community of Practice

GEO Geohazards Community of Practice GEO Geohazards Community of Practice 1) Co-Chair of GHCP With input from: Stuart Marsh, GHCP Co-Chair Francesco Gaetani, GEO Secretariat and many GHCP contributors 1) Nevada Bureau of Mines and Geology

More information

Side Channel Analysis and Protection for McEliece Implementations

Side Channel Analysis and Protection for McEliece Implementations Side Channel Analysis and Protection for McEliece Implementations Thomas Eisenbarth Joint work with Cong Chen, Ingo von Maurich and Rainer Steinwandt 9/27/2016 NATO Workshop- Tel Aviv University Overview

More information

An Introduction to Day Two. Linking Conservation and Transportation Planning Lakewood, Colorado August 15-16, 16, 2006

An Introduction to Day Two. Linking Conservation and Transportation Planning Lakewood, Colorado August 15-16, 16, 2006 An Introduction to Day Two Linking Conservation and Transportation Planning Lakewood, Colorado August 15-16, 16, 2006 1 Agenda Day One Transportation Planning Heritage Program State Wildlife Action Plan

More information

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security Flight plan What s a quantum computer? How broken are your public keys? AES vs. quantum search Hidden quantum powers Defeating quantum computing

More information

ACCA Interactive Timetable

ACCA Interactive Timetable ACCA Interactive Timetable 2018 Professional Version 7.1 Information last updated 15th May 2018 Please note: Information and dates in this timetable are subject to change. A better way of learning that

More information

CustomWeather Statistical Forecasting (MOS)

CustomWeather Statistical Forecasting (MOS) CustomWeather Statistical Forecasting (MOS) Improve ROI with Breakthrough High-Resolution Forecasting Technology Geoff Flint Founder & CEO CustomWeather, Inc. INTRODUCTION Economists believe that 70% of

More information

Internal Audit Report

Internal Audit Report Internal Audit Report Right of Way Mapping TxDOT Internal Audit Division Objective To determine the efficiency and effectiveness of district mapping procedures. Opinion Based on the audit scope areas reviewed,

More information

ACCA Interactive Timetable

ACCA Interactive Timetable ACCA Interactive Timetable 2018 Professional Version 5.1 Information last updated 2nd May 2018 Please note: Information and dates in this timetable are subject to change. A better way of learning that

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

Your Computer is Leaking. Ian J. Malloy.

Your Computer is Leaking. Ian J. Malloy. Your Computer is Leaking Ian J. Malloy Dennis Hollenbeck, 149 W Managed Services dennis.hollenbeck@149w-managed-services.com Abstract This presentation focuses on differences between quantum computing

More information

CIMA Professional

CIMA Professional CIMA Professional 201819 Manchester Interactive Timetable Version 3.1 Information last updated 12/10/18 Please note: Information and dates in this timetable are subject to change. A better way of learning

More information

CIMA Professional

CIMA Professional CIMA Professional 201819 Birmingham Interactive Timetable Version 3.1 Information last updated 12/10/18 Please note: Information and dates in this timetable are subject to change. A better way of learning

More information

Table Of Contents. ! 1. Introduction to Quantum Computing. ! 2. Physical Implementation of Quantum Computers

Table Of Contents. ! 1. Introduction to Quantum Computing. ! 2. Physical Implementation of Quantum Computers 1 Table Of Contents! 1. Introduction to Quantum Computing! 2. Physical Implementation of Quantum Computers! 3. Problem solving using Quantum Computers! 4. Quantum Cryptography! 5. Post Quantum Cryptography!

More information

28 March Sent by to: Consultative Document: Fundamental review of the trading book 1 further response

28 March Sent by  to: Consultative Document: Fundamental review of the trading book 1 further response 28 March 203 Norah Barger Alan Adkins Co Chairs, Trading Book Group Basel Committee on Banking Supervision Bank for International Settlements Centralbahnplatz 2, CH 4002 Basel, SWITZERLAND Sent by email

More information

For Excellence in Organic Chemistry

For Excellence in Organic Chemistry Organix Inc. Your Contract Research and Custom Synthesis Company www.organixinc.com For Excellence in Organic Chemistry Organix Inc. A Contract Research and Custom Synthesis Company At the discovery end

More information

ACCA Interactive Timetable

ACCA Interactive Timetable ACCA Interactive Timetable 2018 Professional Version 3.1 Information last updated 1st May 2018 Please note: Information and dates in this timetable are subject to change. A better way of learning that

More information

A Summary of the Galaxy 15 Incident and its Impact on Space Sustainability

A Summary of the Galaxy 15 Incident and its Impact on Space Sustainability A Summary of the Galaxy 15 Incident and its Impact on Space Sustainability Brian Weeden Technical Advisor Secure World Foundation www.swfound.org 1 UN COPUOS Scientific and Technical Subcommittee, Feb

More information

Foundations of Network and Computer Security

Foundations of Network and Computer Security Foundations of Network and Computer Security John Black Lecture #6 Sep 8 th 2005 CSCI 6268/TLEN 5831, Fall 2005 Announcements Quiz #1 later today Still some have not signed up for class mailing list Perhaps

More information

Water Data Sharing an Update

Water Data Sharing an Update Water Data Sharing an Update By David R. Maidment Leader, CUAHSI Hydrologic Information System Project and Director, Center for Research in Water Resources, University of Texas at Austin Prepared for Subcommittee

More information

An Original Numerical Factorization Algorithm

An Original Numerical Factorization Algorithm IBIMA Publishing Journal of Information Assurance & Cyber security http://www.ibimapublishing.com/journals/jiacs/jiacs.html Vol. 2016 (2016), Article ID, 8 pages DOI: 10.5171/2016. Research Article An

More information

On the Key-collisions in the Signature Schemes

On the Key-collisions in the Signature Schemes On the Key-collisions in the Signature Schemes Tomáš Rosa ICZ a.s., Prague, CZ Dept. of Computer Science, FEE, CTU in Prague, CZ tomas.rosa@i.cz Motivation to study k-collisions Def. Non-repudiation [9,10].

More information

2018 Project Prioritization and Budgeting Process

2018 Project Prioritization and Budgeting Process 2018 Prioritization and Budgeting Process Brian Hurysz Manager, Market Products Budget and Priorities Working Group August 18, 2017, Krey Corporate Center Agenda 2018 Prioritization Process Prioritization

More information

Space Weather & Critical Infrastructures

Space Weather & Critical Infrastructures Space Weather & Critical Infrastructures Italy Organisers EC JRC, MSB, UK Met Office Date and Venue 29-30 November 2016, JRC Ispra, Background Our modern technological infrastructures on the ground and

More information

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees ACCA Interactive Timetable & Fees 2018/19 Professional Version 1.1 Information last updated tember 2018 Please note: Information and dates in this timetable are subject to change. A better way of learning

More information

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy Symmetric Cryptography Review Alice Bob Public Key x e K (x) y d K (y) x K K Instructor: Dr. Wei (Lisa) Li Department of Computer Science, GSU Two properties of symmetric (secret-key) crypto-systems: The

More information

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees ACCA Interactive Timetable & Fees 2018/19 Professional Version 1.1 Information last updated tember 2018 Please note: Information and dates in this timetable are subject to change. A better way of learning

More information

Enabling Web GIS. Dal Hunter Jeff Shaner

Enabling Web GIS. Dal Hunter Jeff Shaner Enabling Web GIS Dal Hunter Jeff Shaner Enabling Web GIS In Your Infrastructure Agenda Quick Overview Web GIS Deployment Server GIS Deployment Security and Identity Management Web GIS Operations Web GIS

More information

C L O U D S E C U R I T Y A L L I A N C E : W H E R E W E A R E & W H E R E W E A R E G O I N G

C L O U D S E C U R I T Y A L L I A N C E : W H E R E W E A R E & W H E R E W E A R E G O I N G C L O U D S E C U R I T Y A L L I A N C E : W H E R E W E A R E & W H E R E W E A R E G O I N G S C E N A R I C L O U D N E L P R O S S I M O F U T U R O Daniele Catteddu CTO, Cloud Security Alliance 9

More information

SpyMeSat Mobile App. Imaging Satellite Awareness & Access

SpyMeSat Mobile App. Imaging Satellite Awareness & Access SpyMeSat Mobile App Imaging Satellite Awareness & Access Imaging & Geospatical Technology Forum ASPRS Annual Conference March 12-16, 2017 Baltimore, MD Ella C. Herz 1 Orbit Logic specializes in software

More information

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees ACCA Interactive Timetable & Fees 2018/19 Professional Version 1.1 Information last updated tember 2018 Please note: Information and dates in this timetable are subject to change. A better way of learning

More information

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees ACCA Interactive Timetable & Fees 2018 Professional Version 4.1 Information last updated 11th September 2018 Please note: Information and dates in this timetable are subject to change. A better way of

More information

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees ACCA Interactive Timetable & Fees 2018/19 Professional Version 2.1 Information last updated uary 2019 Please note: Information and dates in this timetable are subject to change. A better way of learning

More information

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees ACCA Interactive Timetable & Fees 2018/19 Professional London Version 1.1 Information last updated 3 October 2018 Please note: Information and dates in this timetable are subject to change. A better way

More information

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees ACCA Interactive Timetable & Fees 2018/19 Professional Milton Keynes Version 1.1 Information last updated tember 2018 Please note: Information and dates in this timetable are subject to change. A better

More information

Extreme Temperature Protocol in Middlesex-London

Extreme Temperature Protocol in Middlesex-London Clean Air Partnership Webinar March 17, 2009 Extreme Temperature Protocol in Middlesex-London Presented by Iqbal Kalsi, MBA, CPHI(C), CCEP iqbal.kalsi@mlhu.on.ca 1 History Informal monitoring, tracking

More information

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees ACCA Interactive Timetable & Fees 2018/19 Professional Version 3.1 Information last updated 1st May 2018 Please note: Information and dates in this timetable are subject to change. A better way of learning

More information

ACCA Interactive Timetable

ACCA Interactive Timetable ACCA Interactive Timetable 2018 Professional Version 9.1 Information last updated 18 July 2018 Please note: Information and dates in this timetable are subject to change. A better way of learning that

More information

Elliptic Curves and Cryptography

Elliptic Curves and Cryptography Elliptic Curves and Cryptography Aleksandar Jurišić Alfred J. Menezes March 23, 2005 Elliptic curves have been intensively studied in number theory and algebraic geometry for over 100 years and there is

More information

Outage Coordination and Business Practices

Outage Coordination and Business Practices Outage Coordination and Business Practices 1 2007 Objectives What drove the need for developing a planning/coordination process. Why outage planning/coordination is crucial and important. Determining what

More information

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago A brief survey of post-quantum cryptography D. J. Bernstein University of Illinois at Chicago Once the enormous energy boost that quantum computers are expected to provide hits the street, most encryption

More information

Week 12: Hash Functions and MAC

Week 12: Hash Functions and MAC Week 12: Hash Functions and MAC 1. Introduction Hash Functions vs. MAC 2 Hash Functions Any Message M Hash Function Generate a fixed length Fingerprint for an arbitrary length message. No Key involved.

More information

ACCA Interactive Timetable

ACCA Interactive Timetable ACCA Interactive Timetable 2018 Professional Version 3.1 Information last updated 1st May 2018 Book Please online note: atinformation and dates in this timetable are subject Or to change. call -enrol A

More information

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees ACCA Interactive Timetable & Fees 2018/19 Professional Version 2.1 Information last updated 01 November 2018 Please note: Information and dates in this timetable are subject to change. A better way of

More information

Quantum threat...and quantum solutions

Quantum threat...and quantum solutions Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique

More information

SPHINCS: practical stateless hash-based signatures

SPHINCS: practical stateless hash-based signatures SPHINCS: practical stateless hash-based signatures D. J. Bernstein, D. Hopwood, A. Hülsing, T. Lange, R. Niederhagen, L. Papachristodoulou, P. Schwabe, and Z. Wilcox O'Hearn Digital Signatures are Important!

More information

16th Year. In-Class Grade 6 Astronomy & Flight Workshops

16th Year. In-Class Grade 6 Astronomy & Flight Workshops 16th Year In-Class Grade 6 Astronomy & Flight Workshops www.cosmicconnections.ca (416) 728-0062 2017 2018 You and your students will embrace the glories of the night sky right in your classroom. Grade

More information

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees ACCA Interactive Timetable & Fees 2018/19 Professional Version 1.1 Information last updated tember 2018 Please note: Information and dates in this timetable are subject to change. A better way of learning

More information

Attacking the ECDLP with Quantum Computing

Attacking the ECDLP with Quantum Computing Attacking the ECDLP with Quantum Computing Sam Green and Can Kizilkale sam.green@cs.ucsb.edu, cankizilkale@cs.ucsb.edu December 7, 015 CS 90g Fall Term 015 Attacking the ECDLP with Quantum Computing 1

More information

Dr. Steven Koch Director, NOAA National Severe Storms Laboratory Chair, WRN Workshop Executive Committee. Photo Credit: Associated Press

Dr. Steven Koch Director, NOAA National Severe Storms Laboratory Chair, WRN Workshop Executive Committee. Photo Credit: Associated Press Dr. Steven Koch Director, NOAA National Severe Storms Laboratory Chair, WRN Workshop Executive Committee 1 Photo Credit: Associated Press 1" 2" Much%Increased%Vulnerability%to% High6Impact%Weather% %even%before%2011!%

More information

CIMA Dates and Prices Online Classroom Live September August 2016

CIMA Dates and Prices Online Classroom Live September August 2016 CIMA Dates and Prices Online Classroom Live September 2015 - August 2016 This document provides detail of the programmes that are being offered for the Objective Tests and Integrated Case Study Exams from

More information