Information Security in the Age of Quantum Technologies

Size: px
Start display at page:

Download "Information Security in the Age of Quantum Technologies"

Transcription

1 Information Security in the Age of Quantum Technologies

2 Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes have already been developed. Cyber Security: The Quantum Threat Rapid technological progress has created a new business reality, the digital economy. Nowadays companies largely interact with each other and their partners and customers via digital channels that send and receive data. The issue of digital trust therefore arises. How can you ensure that sensitive data and information is secure and your company can be trusted digitally? Eighty-three percent of Russian CEOs believe that a cyber security breach would have negative consequences on confidence in their business. 1 At PwC, we believe that emerging technologies can both undermine consumer trust fostered over many years in companies, products and services as well as taking those levels of trust to new, previously unattainable levels. Quantum technologies are a perfect illustration of this dichotomy. Information security techniques currently employed by Russian companies rely upon data encryption and password-protected access. Thus, to obtain confidential information, a cyber-criminal needs either to intercept the password or solve a complex mathematical problem to guess the password (i.e. break the encryption), a time-consuming process even for modern classical computers. However new types of computers are currently being developed that leverage the computational power of quantum physics. These are quantum computers. One of their strengths is a much stronger capacity to perform parallel computations compared to classical computers. Algorithms 2 that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes have already been developed. Quantum computer development is progressing at a faster pace than expected. Alongside the successful initiatives of IBM and Google, research teams from Harvard and the University of Maryland have almost simultaneously implemented two new 51- and 53-qubit quantum computing systems. 3 Breaks of the RSA cryptosystem in recent years using conventional computation 4 Key length (bits) Log scale Extrapolation suggests that 2048-bit keys could be safe from conventional attack for some time, but quantum computers using Shor s Algorithm + sufficient memory could make the trend exponential. Risk from quantum computing 256 Key lengths broken by conventional computing architectures in recent years Years broken 1 PwC 20th Russian CEO Survey, Shor s and Grover s algorithms ETSI. Quantum Safe Cryptography and Security: an introduction, benefits, enablers and challenges. ISBN

3 Should Russian businesses be doing more to protect their data from the threat posed by Quantum Computing? PwC and the Russian Quantum Centre (RQC) believe they should for the following reasons: A rapid transition to new information security technologies, tools and methodologies is unrealistic because it requires significant infrastructural, cultural and procedural change, as well as funding. Transformation takes time and money. Cyber criminals are already capable of intercepting encrypted and strategically important confidential information and storing it. As quantum computing develops and becomes commercially viable they will be able to access and use quantum assets to break the encryption protecting this data. Quantum Computing the threat and the solution: there are two quantum enabled approaches to ensuring digital asset protection from the threats posed by quantum computers Information security guaranteed by the laws of physics Quantum key distribution Quantum key Encrypted data GOST* encryption Quantum channel Encrypted data Open communication channel Quantum key distribution GOST decryption Quantum key Quantum cryptography aims to protect the information transferred between individual users or data sources within one network. The primary objective is to prevent its interception and therefore avoid any subsequent decryption. Quantum cryptography uses a complex key sent from the sender to the recipient via photons, which are elementary particles of light. The integrity of the anti-interception security is complete since even the most sensitive intercepting device would inevitably change the photon s state. Therefore, whenever you try to eavesdrop on the information transmitted via a quantum channel, you will corrupt the message and be detected instantly. A safely transmitted key can then be used to encrypt information transferred along existing data channels. In the age of quantum computers, quantum cryptography will ensure long-term data protection. This technology does not require new infrastructure and can work via existing optical fibre lines, and it is compatible with the encryption devices currently in use. Such hardware solutions have been implemented and tested by RQC in Russia and are operational. However, there are a number of nuances that need to be taken into account when implementing this technology. For example, at the current development stage, there are certain limitations on key transmission distances ( km) and generation time. To work, a dedicated optic fibre without amplifiers and repeaters is necessary. This, coupled with a relatively high cost, has so far made it difficult to apply this technology to ensure the end-to-end protection of all corporate data. It is therefore reasonable to focus on the most critical data. A new generation of mathematical algorithms Post-quantum cryptography puts forth new encryption algorithms that are hard to crack both for classic and quantum computers. The field of post-quantum cryptography is currently focused on R&D activities to develop such algorithms, verify existing solutions and test concepts and pilots. However, there are so far no unified and battle-proven standards for post-quantum encryption in the market. It is probable that given the pace of development of quantum technologies, the selected algorithm would no longer ensure the required level of protection and it would have to be replaced. That is why it is crucial to select an optimum algorithm at the very beginning of the project. Another nuance of post-quantum encryption is the high-level specifications for computational resources. On the one hand, these algorithms can be rolled out in almost any code, while on the other hand, the greater the volume of data to be protected, the more computational capacity it will take. * GOST Russian National Standards

4 Which quantum data protection technology should I choose? Quantum and post-quantum cryptography methods have their pros and cons. To select an optimal solution for a specific organisation, PwC and RQC have developed an approach combining global information security best practices and knowledge, and the experience of Russia s top quantum data protection solutions developer. Our approach consists of five steps: 1. Diagnostics The advent of the quantum computer enabling the decryption of data protected by classic encryption algorithms will affect market participants differently. We assess the business impact by analysing the technologies and infrastructure your company uses as well as the assets you wish to protect. 3. Pilot project In order to implement the data protection tools selected and establish appropriate quantum and post-quantum encryption solutions within your infrastructure, we suggest to start with a pilot project. Based on the pilot results, the proposed solutions and action plan can be modified and tailored to better fit an organisations need 5. Action plan update Enhancing data protection systems with quantum technologies is a continuous process. It is important to be informed on the latest developments in the field and to update your action plan accordingly. We suggest that your action plan is revised every six months. 1. Diagnostics 2. Action plan 3. Pilot project 4. Rollout 5. Action plan update 2. Action plan Based on the results of the diagnostic phase, we offer actions to modernise cryptographic tools in terms of cost efficiency and performance. The action plan will include suggestions on which means of data protection you could select, the order of implementation and cost estimation. 4. Rollout This step includes rolling out a successful solution (as tested and refined during the pilot) across the entire organisation to protect critical information. The rollout will scale the implemented technology to its full capacity in order to protect your company s most critical assets.

5 Quantum technologies have a much stronger capacity for parallel computations compared to classic computers. Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes have already been developed. This increases the risk that quantum computers can be used to break encryptions allowing access to, and misuse of, sensitive data. Russia s first quantum communication line and the world s first quantum secured blockchain Office No. 1, 7, Koroviy val On 31 May 2016, Russia s first experimental and operational protected quantum communication line was commissioned and the first cryptographic data transfer was made along the 30-kilometre commercial line between two Gazprombank office buildings in Moscow. The Ministry of Education and Science of the Russian Federation is supporting the project. Investment in the project amounted to RUB 450 million. In 2017, the world s first experimental quantum blockchain technology was tested. Gazprombank is planning to use quantum communications in its daily operations. Office No. 2, 63, Novocheryomushkinskaya A quantum network project for interbank data transfers Bank 1 Bank 1 Intrabank networks Bank 1 Bank 3 Bank 2 Bank 2 Bank 3 Bank 3 Bank 3 In July 2017, it was decided to establish a quantum network to transfer interbank data. This project entails implementing quantum key distribution technology and a dedicated network protocol stack. This solution will enable communication through secure channels between various organisations. The plan is to set up quantum networks within specific organisations and between them. The time line for the project is three years. Interbank networks Joint development of quantum information security systems PwC and RQC signed a cooperation agreement at the 21st St Petersburg International Economic Forum. RQC's knowledge and leadership in quantum technology and PwC's best practices in cybersecurity will enable the joint development of unique solutions based on new quantum technologies to ensure unprecedented data protection and cybersecurity levels.

6 Our contacts We will gladly answer any questions about using quantum technology for information security purposes. PwC RQC Igor Lotakov Managing Partner PwC Russia + 7 (495) igor.lotakov@ru.pwc.com Ruslan Yunusov CEO Russian Quantum Center (RQC) +7 (495) ry@rqc.ru Tim Clough Technology Leader PwC Russia + 7 (495) tim.clough@ru.pwc.com Yuri Kurochkin Project Leader Russian Quantum Center (RQC) +7 (926) yk@rqc.ru Victor Morozov Director Risk assurance PwC Russia + 7 (903) victor.morozov@ru.pwc.com Aleksey Fedorov Group Leader Russian Quantum Center (RQC) +7 (916) akf@rqc.ru At PwC, our purpose is to build trust in society and solve important problems. We re a network of firms in 157 countries with more than 223,000 people who are committed to delivering quality in assurance, advisory and tax services. Find out more and tell us what matters to you by visiting us at PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see for further details PwC. All rights reserved.

The science behind these computers originates in

The science behind these computers originates in A Methodology for Quantum Risk Assessment Author: Dr. Michele Mosca & John Mulholland DISRUPTIVE TECHNOLOGY INTRODUCTION Until recently, quantum computing was often viewed as a capability that might emerge

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

Cyber Security in the Quantum Era

Cyber Security in the Quantum Era T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act

More information

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 What drives a company s digital strategy in 2020 and beyond? Quantum Computing it s the end of the world

More information

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION Based on the discussion during the respective workshop at the ZEISS Symposium Optics in the Quantum World on 18 April 2018 in Oberkochen, Germany

More information

Quantum threat...and quantum solutions

Quantum threat...and quantum solutions Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique

More information

FIS' Partnership with Zelle for P2P Payments

FIS' Partnership with Zelle for P2P Payments FIS' Partnership with Zelle for P2P Payments Chris Burfield, SVP, Digital Market Strategy Norman Marraccini, VP, Director of Digital Payment Product Strategy & Marketing Peter Tapling, Chief Revenue Officer,

More information

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it

More information

The Quantum Threat to Cybersecurity (for CxOs)

The Quantum Threat to Cybersecurity (for CxOs) The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

The quantum threat to cryptography

The quantum threat to cryptography The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How

More information

Quantum Technologies: Threats & Solutions to Cybersecurity

Quantum Technologies: Threats & Solutions to Cybersecurity Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017 ID Quantique Company Profile

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Lecture 1: Introduction to Public key cryptography

Lecture 1: Introduction to Public key cryptography Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

L E A D I N G T H E C O M P U T I N G R E V O L U T I O N

L E A D I N G T H E C O M P U T I N G R E V O L U T I O N L E A D I N G T H E COMPUTING REVOLUTION 22 SAFE HARBOR Statements in this presentation that are not descriptions of historical facts are forwardlooking statements relating to future events, and as such

More information

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016 Managing the quantum risk to cybersecurity Global Risk Institute Michele Mosca 11 April 2016 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental part of safety

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? Surveillance Problem / Weak Crypto

More information

Briefing. H.E. Mr. Gyan Chandra Acharya

Briefing. H.E. Mr. Gyan Chandra Acharya Briefing by H.E. Mr. Gyan Chandra Acharya Under-Secretary-General and High Representative for the Least Developed Countries, Landlocked Developing Countries and Small Island Developing States Briefing

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Broadband Internet Access Disclosure

Broadband Internet Access Disclosure Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Quantum technology popular science description

Quantum technology popular science description Quantum technology popular science description 1 Quantum physics, from theory to ongoing revolution In the early 1900s observations were made that were not consistent with traditional, classical physics.

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information by Michael

More information

PROGRAM OF THE RUSSIAN FEDERATION CHAIRMANSHIP OF THE ARCTIC COUNCIL IN

PROGRAM OF THE RUSSIAN FEDERATION CHAIRMANSHIP OF THE ARCTIC COUNCIL IN PROGRAM OF THE RUSSIAN FEDERATION CHAIRMANSHIP OF THE ARCTIC COUNCIL IN 2004-2006 The Arctic Council is a unique forum for interaction between the governments of the Arctic States, the Permanent Participants

More information

Notes for Lecture 17

Notes for Lecture 17 U.C. Berkeley CS276: Cryptography Handout N17 Luca Trevisan March 17, 2009 Notes for Lecture 17 Scribed by Matt Finifter, posted April 8, 2009 Summary Today we begin to talk about public-key cryptography,

More information

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M. Mosca New paradigm brings new possibilities Designing

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

CHEMICAL AND EXPLOSIVE TERRORISM

CHEMICAL AND EXPLOSIVE TERRORISM CHEMICAL AND EXPLOSIVE TERRORISM THE THREAT OF CHEMICAL AND EXPLOSIVE TERRORISM The use of chemical and explosive materials by criminals and terrorist groups poses a significant threat today and all regions

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

The Two Time Pad Encryption System

The Two Time Pad Encryption System Hardware Random Number Generators This document describe the use and function of a one-time-pad style encryption system for field and educational use. You may download sheets free from www.randomserver.dyndns.org/client/random.php

More information

Attacks on RSA & Using Asymmetric Crypto

Attacks on RSA & Using Asymmetric Crypto Attacks on RSA & Using Asymmetric Crypto Luke Anderson luke@lukeanderson.com.au 7 th April 2017 University Of Sydney Overview 1. Crypto-Bulletin 2. Breaking RSA 2.1 Chinese Remainder Theorem 2.2 Common

More information

Putting the U.S. Geospatial Services Industry On the Map

Putting the U.S. Geospatial Services Industry On the Map Putting the U.S. Geospatial Services Industry On the Map December 2012 Definition of geospatial services and the focus of this economic study Geospatial services Geospatial services industry Allow consumers,

More information

9 Knapsack Cryptography

9 Knapsack Cryptography 9 Knapsack Cryptography In the past four weeks, we ve discussed public-key encryption systems that depend on various problems that we believe to be hard: prime factorization, the discrete logarithm, and

More information

Quantum Networking: Deployments, Components and Opportunities September 2017

Quantum Networking: Deployments, Components and Opportunities September 2017 Quantum Networking: Deployments, Components and Opportunities 2017-2026 September 2017 2025 Library Ave., Suite 402 Quantum Networking: Deployments, Components and Opportunities 2017-2026 Page 1 Report

More information

European Lignite Mines Benchmarking. Sanitized Report

European Lignite Mines Benchmarking. Sanitized Report European Lignite Mines Benchmarking Sanitized Report European lignite industry, at a glance The global lignite production is approx. 1 billion metric tons for 2012 with major production coming from Europe,

More information

CIMA Dates and Prices Online Classroom Live September August 2016

CIMA Dates and Prices Online Classroom Live September August 2016 CIMA Dates and Prices Online Classroom Live September 2015 - August 2016 This document provides detail of the programmes that are being offered for the Objective Tests and Integrated Case Study Exams from

More information

White paper Quantum computing in financial services

White paper Quantum computing in financial services White paper Quantum computing in financial services There is no shortage of theoretical applications of quantum computing, at a grand scale, that approaches science fiction. How will it really affect the

More information

The Elliptic Curve in https

The Elliptic Curve in https The Elliptic Curve in https Marco Streng Universiteit Leiden 25 November 2014 Marco Streng (Universiteit Leiden) The Elliptic Curve in https 25-11-2014 1 The s in https:// HyperText Transfer Protocol

More information

Alluvium Consulting Australia Senior integrated water management specialist Position Description March 2018

Alluvium Consulting Australia Senior integrated water management specialist Position Description March 2018 Alluvium Consulting Australia Senior integrated water management specialist Position Description March 2018 Overview of Alluvium We are an employee-owned consulting firm founded in 2006 to provide advice

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Build your own CSIRT/SOC real projects experience

Build your own CSIRT/SOC real projects experience Dr. Vilius Benetis Build your own CSIRT/SOC real projects experience 5 th of June 2018 15.30-16.30 ADD YOUR BRAND HERE TRUSTED CYBER SECURITY NETWORKS AROUND THE WORLD N R D C Y B E R S E C U R I T Y C

More information

COGNITIVE GROUP why talent is the key to successful business transformation

COGNITIVE GROUP why talent is the key to successful business transformation COGNITIVE GROUP 2018 why talent is the key to successful business transformation i m p l e m e n t i n g b u s i n e s s t r a n s f o r m a t i o n u n d e r p i n n e d b y e n a b l i n g I T s o l

More information

EU investment in Quantum Technologies

EU investment in Quantum Technologies EU investment in Quantum Technologies ENISA Summer School, 26. September2018 Dr. Gustav Kalbe High Performance Computing and Quantum Technologies DG CNECT, European Commission 2 nd Quantumrevolution: manipulating/exploiting

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Ground-Satellite QKD Through Free Space. Steven Taylor

Ground-Satellite QKD Through Free Space. Steven Taylor Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution

More information

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.

R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E

More information

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS SESSION ID: SP02-R14 ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS Jon Geater Chief Technology Officer Thales esecurity @jongeater Hold onto your hats! This is a very fast-paced

More information

The purpose of this report is to recommend a Geographic Information System (GIS) Strategy for the Town of Richmond Hill.

The purpose of this report is to recommend a Geographic Information System (GIS) Strategy for the Town of Richmond Hill. Staff Report for Committee of the Whole Meeting Department: Division: Subject: Office of the Chief Administrative Officer Strategic Initiatives SRCAO.18.12 GIS Strategy Purpose: The purpose of this report

More information

Working with Rumaila's Supply Chain

Working with Rumaila's Supply Chain Working with Rumaila's Supply Chain 2 3 With a heritage of over half a century of continued oil and gas production, Rumaila's vast resources makes it comparable with the very largest producing fields in

More information

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems CPE 776:DATA SECURITY & CRYPTOGRAPHY Some Number Theory and Classical Crypto Systems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Some Number Theory

More information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Copernicus Academy. Roles and responsibilities of the Copernicus Academy. user uptake. Focus Data uptake, capacity building and skills development

Copernicus Academy. Roles and responsibilities of the Copernicus Academy. user uptake. Focus Data uptake, capacity building and skills development Copernicus Academy user uptake Roles and responsibilities of the Copernicus Academy The European Commission has launched two Networks, the Copernicus Relays and the Copernicus Academy, to contribute on

More information

The Quantum Age Technological Opportunities

The Quantum Age Technological Opportunities The Quantum Age Technological Opportunities Sir Mark Walport FRS Government Chief Scientific Adviser ETSI / IQC Quantum Safe Workshop 13 September 2017 Government Chief Scientific Adviser Health, wellbeing,

More information

Ministry of Health and Long-Term Care Geographic Information System (GIS) Strategy An Overview of the Strategy Implementation Plan November 2009

Ministry of Health and Long-Term Care Geographic Information System (GIS) Strategy An Overview of the Strategy Implementation Plan November 2009 Ministry of Health and Long-Term Care Geographic Information System (GIS) Strategy An Overview of the Strategy Implementation Plan November 2009 John Hill, Health Analytics Branch Health System Information

More information

Cryptography. pieces from work by Gordon Royle

Cryptography. pieces from work by Gordon Royle Cryptography pieces from work by Gordon Royle The set-up Cryptography is the mathematics of devising secure communication systems, whereas cryptanalysis is the mathematics of breaking such systems. We

More information

DATA ENCRYPTION DEVICE USING RADIOACTIVE DECAY AND A HYBRID QUANTUM ENCRYPTION ALGORITM

DATA ENCRYPTION DEVICE USING RADIOACTIVE DECAY AND A HYBRID QUANTUM ENCRYPTION ALGORITM DATA ENCRYPTION DEVICE USING RADIOACTIVE DECAY AND A HYBRID QUANTUM ENCRYPTION ALGORITM Anthony Kunkel, Karthik Paidi, Dennis Guster, Renat Sultanov, and Erich Rice Department of Information Systems Saint

More information

Arctic Spatial Data Infrastructure Enabling Access to Arctic Location-Based Information

Arctic Spatial Data Infrastructure Enabling Access to Arctic Location-Based Information Arctic Spatial Data Infrastructure Enabling Access to Arctic Location-Based Information Arctic SDI Side Event Co-Chairs: Arvo Kokkonen Arctic SDI Board Chair & Director General, National Land Survey of

More information

PUBLIC SAFETY POWER SHUTOFF POLICIES AND PROCEDURES

PUBLIC SAFETY POWER SHUTOFF POLICIES AND PROCEDURES PACIFIC GAS AND ELECTRIC COMPANY PUBLIC SAFETY POWER SHUTOFF POLICIES AND PROCEDURES SEPTEMBER 2018 1 PACIFIC GAS AND ELECTRIC COMPANY PUBLIC SAFETY POWER SHUTOFF POLICIES AND PROCEDURES SEPTEMBER 2018

More information

Lattice-Based Cryptography

Lattice-Based Cryptography Liljana Babinkostova Department of Mathematics Computing Colloquium Series Detecting Sensor-hijack Attacks in Wearable Medical Systems Krishna Venkatasubramanian Worcester Polytechnic Institute Quantum

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Quantum Teleportation Enters the Real World By Nathaniel Scharping med expo

Quantum Teleportation Enters the Real World By Nathaniel Scharping med expo Quantum Teleportation Enters the Real World By Nathaniel Scharping med expo Two separate teams of scientists have taken quantum teleportation from the lab into the real world. Researchers working in Calgary,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Can I still get paid via direct deposit? Can I use e- wallet to pay for USANA auto ship orders? Can I use e- wallet to pay for USANA products? Can I use e- wallet to pay for

More information

Standardization of Quantum Cryptography in China

Standardization of Quantum Cryptography in China Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018 CONTENTS 1 Background on Quantum Cryptography

More information

THE ROLE OF GEOSPATIAL AT THE WORLD BANK

THE ROLE OF GEOSPATIAL AT THE WORLD BANK THE ROLE OF GEOSPATIAL AT THE WORLD BANK INSPIRE Conference Barcelona, Spain September 26, 2016 Kathrine Kelm Senior Land Administration Specialist Global Land and Geospatial Unit The World Bank Group

More information

Intel s approach to Quantum Computing

Intel s approach to Quantum Computing Intel s approach to Quantum Computing Dr. Astrid Elbe, Managing Director Intel Lab Europe Quantum Computing: Key Concepts Superposition Classical Physics Quantum Physics v Heads or Tails Heads and Tails

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

Quantum Computing and the Possible Effects on Modern Security Practices

Quantum Computing and the Possible Effects on Modern Security Practices Quantum Computing and the Possible Effects on Modern Security Practices SE 4C03 Winter 2005 Kartik Sivaramakrishnan Researched by: Jeffery Lindner, 9904294 Due: April 04, 2005 Table of Contents Introduction...

More information

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR NSA/CSS QUANTUM COMPUTING RESEARCH 10-25 Effective Date: 21 September 2011 Revised Date(s): CLASSIFIED BY: //s// REASON FOR

More information

Whitepaper. All Currency, One Wallet!

Whitepaper. All Currency, One Wallet! Whitepaper BitStupm All Currency, One Wallet! All Currency, One Wallet! TABLE OF CONTENTS: BitStupm 1. WHAT IS CRYPTOCURRENCY? 2. HISTORY OF CRYPTOCURRENCY. 3. STRENGTH OF CRYPTOCURRENCY. 4. WHAT IS BITS?

More information

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel #RSAC SESSION ID: CRYP-W10 PQ Crypto Panel MODERATOR: Bart Preneel Professor, imec-cosic KU Leuven PANELISTS: Dr. Dan Boneh Professor, Stanford University Michele Mosca Professor, UWaterloo and evolutionq

More information

CRYPTOGRAPHY AND NUMBER THEORY

CRYPTOGRAPHY AND NUMBER THEORY CRYPTOGRAPHY AND NUMBER THEORY XINYU SHI Abstract. In this paper, we will discuss a few examples of cryptographic systems, categorized into two different types: symmetric and asymmetric cryptography. We

More information

Cryptographic Hash Functions

Cryptographic Hash Functions Cryptographic Hash Functions Çetin Kaya Koç koc@ece.orst.edu Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331 Technical Report December 9, 2002 Version 1.5 1 1 Introduction

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

EVALUATION REPORT OF THE RUSSIAN QUANTUM CENTER RQC

EVALUATION REPORT OF THE RUSSIAN QUANTUM CENTER RQC MAY 2018 EVALUATION REPORT OF THE RUSSIAN QUANTUM CENTER RQC Evaluation Committee members: Prof. Ignacio Cirac, Max Planck Institute for Quantum Optics Prof. Michael Lukin, Harvard University Prof. Eugene

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

The Swedish National Geodata Strategy and the Geodata Project

The Swedish National Geodata Strategy and the Geodata Project The Swedish National Geodata Strategy and the Geodata Project Ewa Rannestig, Head of NSDI Co-ordination Unit, Lantmäteriet, ewa.rannstig@lm.se Ulf Sandgren, Project Manager Geodata Project, Lantmäteriet,

More information

Using Quantum Effects for Computer Security

Using Quantum Effects for Computer Security Using Quantum Effects for Computer Security Arran Hartgroves, James Harvey, Kiran Parmar Thomas Prosser, Michael Tucker December 3, 2004 1 Introduction Computer security is a rapidly changing field. New

More information

Draft Model Memorandum of Understanding to promote voluntary cooperation between Government and Chemical Industry to enhance Precursors Chemicals

Draft Model Memorandum of Understanding to promote voluntary cooperation between Government and Chemical Industry to enhance Precursors Chemicals Draft Model Memorandum of Understanding to promote voluntary cooperation between Government and Chemical Industry to enhance Precursors Chemicals Control 1 Introduction There has been growing recognition

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK SESSION 1 World Tour HIGHLIGHTS Session focused on activity world wide on quantum safe communications research and policy. Matthew Scholl (NIST) described

More information

UK Networked Quantum Information Technologies Hub: Opportunities for Business

UK Networked Quantum Information Technologies Hub: Opportunities for Business UK Networked Quantum Information Technologies Hub: Opportunities for Business Networked Quantum Information Technologies NQIT Industry Day 2017 Rhodes House, Oxford NQIT Industry Day The NQIT Industry

More information

Advancing Geoscientific Capability. Geological Survey of Finland

Advancing Geoscientific Capability. Geological Survey of Finland Advancing Geoscientific Capability Geological Survey of Finland GTK in brief The Geological Survey of Finland (GTK) is one of the largest European centres of excellence in assessment, research and the

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 7, 2015 CPSC 467, Lecture 11 1/37 Digital Signature Algorithms Signatures from commutative cryptosystems Signatures from

More information

CRYPTOGRAPHY AND LARGE PRIMES *

CRYPTOGRAPHY AND LARGE PRIMES * CRYPTOGRAPHY AND LARGE PRIMES * B. Hartley University of Manchester, England, and National University of Singapore The word "cryptography" derives from Greek and means "secret writing". Since ancient times,

More information

GeoComply Overview. 666 Burrard Street, Suite 1530, Vancouver BC V6C 2X8

GeoComply Overview. 666 Burrard Street, Suite 1530, Vancouver BC V6C 2X8 GeoComply Overview 666 Burrard Street, Suite 1530, Vancouver BC V6C 2X8 EXECUTIVE SUMMARY GeoComply is a global leader in geolocation technology. Since launching in 2011, GeoComply has quickly become the

More information

Vaisala AviMet Automated Weather Observing System

Vaisala AviMet Automated Weather Observing System Vaisala AviMet Automated Weather Observing System Solutions to meet your challenges Our mission: to help you operate succesfully Safe, economical, reliable and flexible operation of your airport is ensured

More information

Single and Entangled photons. Edward Pei

Single and Entangled photons. Edward Pei Single and Entangled photons Edward Pei War is most commonly thought of as men fighting with their fist, and power is determined by physical strength. Behind the lines, however, knowledge is power. For

More information

Keynote Address. Felecia Etheridge Chief Customer Engagement Officer CPS Energy

Keynote Address. Felecia Etheridge Chief Customer Engagement Officer CPS Energy Keynote Address Keynote Address Felecia Etheridge Chief Customer Engagement Officer CPS Energy E M P O W E R I N G & E N G A G I N G C U S T O M E R S P R E S E N T E D B Y : Felecia Etheridge Chief Customer

More information

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS 1 C Theme : Cryptography Instructor : Prof. C Pandu Rangan Speaker : Arun Moorthy 93115 CS 2 RSA Cryptosystem Outline of the Talk! Introduction to RSA! Working of the RSA system and associated terminology!

More information

Blockchain and Quantum Computing

Blockchain and Quantum Computing M T R 1 7 0 4 8 7 M I T R E T E C H N I C A L R E P O R T Blockchain and Quantum Computing Project No.: 25SPI050-12 The views, opinions and/or findings contained in this report are those of The MITRE Corporation

More information

VISIT MISSISSIPPI GULF COAST CRISIS COMMUNICATION MANUAL 2016

VISIT MISSISSIPPI GULF COAST CRISIS COMMUNICATION MANUAL 2016 VISIT MISSISSIPPI GULF COAST CRISIS COMMUNICATION MANUAL 2016 This manual was prepared for Visit Mississippi Gulf Coast staff in the event of a crisis, and will help to distinguish the appropriate course

More information

Economic Benefit Study on Value of Spatial Information Australian Experience

Economic Benefit Study on Value of Spatial Information Australian Experience Economic Benefit Study on Value of Spatial Information Australian Experience Dr Zaffar Sadiq Mohamed-Ghouse Director, International Relations Cooperative Research Centre for Spatial Information zsadiq@crcsi.com.au

More information

POLICY: FI/PL/03 Issued on August 5, Fee Policy for GEF Partner Agencies

POLICY: FI/PL/03 Issued on August 5, Fee Policy for GEF Partner Agencies POLICY: FI/PL/03 Issued on August 5, 2012 Fee Policy for GEF Partner Agencies Summary: The proposed Agency fee structure in this paper is the decision of the GEF Council from its meeting of June 2012.

More information

APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD

APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD 2016/2500M-0054 ISSN 1797-3457 (verkkojulkaisu) ISBN (PDF) 978-951-25-2850-9 SUMMARY REPORT APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD Ilkka Tittonen, professor, Department of Micro- and

More information