Quantum Technologies: Threats & Solutions to Cybersecurity

Size: px
Start display at page:

Download "Quantum Technologies: Threats & Solutions to Cybersecurity"

Transcription

1 Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017

2 ID Quantique Company Profile Founded in 2001 Geneva, Switzerland By 4 quantum physicists from the University of Geneva 60 employees in CH, including 30 engineers/scientists Develops technologies and products based on quantum physics within 3 business units: Photon Counting & Instrumentation Quantis Quantum Random Number Generator Quantum-Safe Security Performs R&D, production, professional services, integration, support Clients : Governments / Banks / Gaming Industry / Universities / IT Security 2017 ID Quantique SA, Switzerland page 2

3 Outline The quantum threat to cybersecurity Need for quantum-safe security The tools: o Quantum Key Generation o Quantum-Resistant Algorithms o Quantum Key Distribution Practical implementations of QKD The future of QKD Summary 2017 ID Quantique SA, Switzerland page 3

4 The THREAT: QUANTUM COMPUTERS 2017 ID Quantique SA, Switzerland page 4

5 Principles of Quantum Computing Computation with Qubits. Main difference: build coherent superposition of states But a measurement always gives one of the two states only 2017 ID Quantique SA, Switzerland page 5

6 Classical Computing 2017 ID Quantique SA, Switzerland page 6

7 Computing with Quantum States Create superpositions Generate interferences Measure one possible outcome 2017 ID Quantique SA, Switzerland page 7

8 The Quantum Computer Behaves like a massively parallel computer. Solves problems in much fewer steps. Opportunity: some intractable computations become feasible. Threat: break current public key cryptographic primitives (DH, RSA, ECC ) This is why Quantum Computing is now discussed in Information Security ID Quantique SA, Switzerland page 8

9 Status of Cybersecurity The hacker s point of view today and after the Quantum Computer 2017 ID Quantique SA, Switzerland page 9

10 When NSA goes Public In the current global environment, rapid and secure information sharing is important to protect our Nation, its citizens and its interests. Strong cryptographic algorithms and secure protocol standards are vital tools that contribute to our national security and help address the ubiquitous need for secure, interoperable communications. IAD will initiate a transition to quantum resistant algorithms in the not too distant future. Our ultimate goal is to provide cost effective security against a potential quantum computer ID Quantique SA, Switzerland page 10

11 Timeline for the Quantum Computer Large-scale quantum computing is years away 1 in 7 chance of crypto primitives being affected by quantum attacks in in 2 chance by Estimates by Prof. Michele Mosca Institute for Quantum Computing (at ETSI/IQC workshop 09/2017) 2017 ID Quantique SA, Switzerland page 11

12 What is at risk? Data at rest All current Public Key cryptosystems Data in transit 2017 ID Quantique SA, Switzerland page 12 Two requirements: Authentication Confidentiality

13 Short aside: Blockchains Blockchain Hash functions Public key crypto Blockchains today are not Quantum-Safe! 2017 ID Quantique SA, Switzerland page 13

14 Timing issues Transaction time Time Authentication requirement Confidentiality requirement Future possible attacks Cybersecurity systems should guarantee confidentiality for a long time 2017 ID Quantique SA, Switzerland page 14

15 Trust levels for PKIs Current PKI s o Confidentiality for 15 years: LOW o Authentication today: HIGH o Authentication in 15 years: LOW Next Gen PKI s (new algorithms) o Which algorithm to choose? o What can we deploy today? o Long-term security? 2017 ID Quantique SA, Switzerland page 15

16 All links are NOT born equal! Safety has to be adapted to the communication links ID Quantique SA, Switzerland page 16

17 The SOLUTION: QUANTUM SAFE CRYPTO 2017 ID Quantique SA, Switzerland page 17

18 So What do we do now? Need to expand our toolbox, with different Quantum-Safe tools: o Quantum Key Generation o Quantum Resistant Algorithms o Quantum Key Distribution 2017 ID Quantique SA, Switzerland page 18

19 THE TOOLS (1): QUANTUM KEY GENERATION 2017 ID Quantique SA, Switzerland page 19

20 Random Numbers in Cryptography ID Quantique SA, Switzerland page Random numbers are used at the source of ALL crypto systems But : they are are difficult to produce. Computer programs are deterministic. Computers cannot produce random numbers without special hardware. And: it is impossible to prove randomness of a finite sequence a posteriori. Possible only to test the statistical properties of the random numbers. When generating random numbers, understanding the method used is critical.

21 True Random Number Generator based on Quantum Physics Physical Random Number Generator exploiting a phenomenon described by quantum physics: Provably random Advantages Speed. Simple process that can be modelled influence of environment can be ruled out. Photons Live monitoring of elementary components possible to detect total failure. Source of photons Semi-transparent mirror 1 Instant full entropy ID Quantique SA, Switzerland page 21

22 QRNGs today And a new QRNG chip soon! 2017 ID Quantique SA, Switzerland page 22

23 THE TOOLS (2): QUANTUM RESISTANT ALGORITHMS 2017 ID Quantique SA, Switzerland page 23

24 Quantum-Resistant algorithms Name of method Application Resilience against Quantum Computer RSA Encryption, signature No ECC Encryption, signature No AES Encryption Widely believed Hash-based Authentication Widely believed Lattice-based (NTRU) Code-based (Mc Eliece) Encryption; signature Encryption Believed Believed Multivariate polynomials Encryption; signature Uncertain so far High level of confidence Under investigation 2017 ID Quantique SA, Switzerland page 24

25 Post-Quantum PK Algorithms: Pros & Cons Pros Cons Direct replacement of current PKs No proof of security Keep all infrastructure Not yet well-studied May be easily adapted to security protocols Interesting approach: hybrid systems, e.g. RSA + NTRU Resilience against QC not proven Might be only a temporary solution Probably the easiest to implement and most appealing solution Use for medium security levels But concerns about long-term security 2017 ID Quantique SA, Switzerland page 25

26 THE TOOLS (3): QUANTUM KEY DISTRIBUTION 2017 ID Quantique SA, Switzerland page 26

27 The scenario: Symmetric Cryptography Eve Message Message Scrambled Message Alice Bob Secret Key Secret Key Secret key distribution methods: Trusted courier ( ) Public key cryptography (not quantum-safe today ) Quantum key distribution ID Quantique SA, Switzerland page 27

28 Quantum Key Distribution (QKD): Basic idea Scrambled Message Alice Bob Symmetric Cryptography Secret Key Secret Key Fragile! 2017 ID Quantique SA, Switzerland page 28

29 QKD: Pros & Cons Pros Based on different principle (physics) Not impacted by QC Provable security of transmission Real-time eavesdropping possible only Adds one layer of security Cons Need physical infrastructure Limited distance between nodes (to date) Only part of the solution: Needs conventional crypto to use the key (e.g. symmetric key encryption); And post-quantum Authentication More complicated and costly to implement Useful for high-level and long-term security 2017 ID Quantique SA, Switzerland page 29

30 A Quantum-safe transmission scheme Scrambled Message Alice Bob AES encryption Secret Key Secret Key Fragile! Ingredients: QKD for key distribution AES for encryption Hash-based signature scheme for authentication (e.g.: Merkle scheme) 2017 ID Quantique SA, Switzerland page 30

31 PRACTICAL IMPLEMENTATIONS OF QKD 2017 ID Quantique SA, Switzerland page 31

32 Practical systems: IDQ s Cerberis Quantum Key Distribution Servers 2017 ID Quantique SA, Switzerland page Cerberis QKD Server launched Used in multiple mission critical installations in government & financial sectors since 2007 QKD Blade launched Oct Integrated into ATCA network devices - Other form factors possible (ETSI) - Building block for Trusted Nodes (2 blades linked by a trusted controller in scalable networks)

33 Quantum-Enabled Network Encryption: Today Local Area Network Local Area Network xwdm Quantum Channel Dark Fiber or multiplexed Multiple deployments in the banking and government sectors in Europe 2017 ID Quantique SA, Switzerland page 33

34 State of the Art: Long Distance QKD 2017 ID Quantique SA, Switzerland page 34

35 Implementation: Encryption in Default Mode Key exchange interoperable for all encryptors State-of-the-art FIPS approved key management RSA-2048 or ECC for public key agreement AES 256 CTR or GCM mode for high-speed data encryption AES Master and session keys, with session key updated up to once per minute Fully automatic set and forget High quality key material generated by IDQ s Quantum True Random Number Generator (selected encryptors) May be upgraded to QKD Public Key Agreement Session Key Agreement Encryption Internal or external CA Master Key Session Key 2017 ID Quantique SA, Switzerland page 35

36 36 Implementation: Encryption with QKD Dual Key Agreement Internal or external CA Quantum keys are based on high quality entropy (encryption key) from provably random QRNG. Quantum Key is mixed with the standard AES session key. Advantages: - Maintains existing encryptor certifications (eg. FIPS, CC). - Generates ''super session key which guarantees forward secrecy. - Eavesdropping protection. Quantum Key Distribution (QKD) Quantum Key Public Key Agreement Master Key Session Key Agreement Session Key Bit-by-bit XOR Encryption Super Session Key 2017 ID Quantique SA, Switzerland page 36

37 Real implementation: Practical QKD in Government & Public Administration Geneva (Switzerland) uses QKD to guarantee confidentiality & integrity of data during federal & cantonal elections. Downtown Geneva Working since October Geneva Government Data Center Central Vote Counting Station 4 km Ballots Mail Votes Cerberis QKD Solution 2017 ID Quantique SA, Switzerland page 37

38 Real Implementation: QKD in Data Center Interconnect European banks secure critical links between bank headquarters and Data Recovery Centers, and inside MAN. Data Centre or DRC Dedicated quantum channel Headquarter s o All digital assets of bank pass over DRC link. Supports AES 256 bit key exchange every hour, with additional quantum key buffer. Quantum channel: o Either on dedicated dark fibre (up to 100km). o Or multiplexed with data over single fibre (up to ~30 kms). DWDM Site A Passiv e DWD M Multiplexed quantum channel Data links Data links Data & SC Data+SC+Q C DWDM Site B Passiv e DWD M 2017 ID Quantique SA, Switzerland page 38

39 ROADMAP FOR QKD QKD for Access Networks Trusted Nodes for long-distance QKD Free Space QKD with satellites Global QKD Network based on Quantum Memories 2017 ID Quantique SA, Switzerland page 39

40 2017 ID Quantique SA, Switzerland page QKD for Access Network: one Bob, many Alices Site A1 Site A2 WDM NETWORK (MAN or WAN) Data link & SC Data link & SC Site B WDM ALICE WDM QC BOB Site A3 ALICE Optical switch WDM ALICE

41 Long distance QKD with Trusted Nodes Cambridge Exchange Ipswich Exchange Cambridge University BT Labs Adastral Park Testbed between BT Labs at Adastral Park and Cambridge University 2017 ID Quantique SA, Switzerland page 41 Adva FSP 3000

42 What about longer links: The Chinese Quantum Backbone 2017 ID Quantique SA, Switzerland page 42

43 2017 ID Quantique SA, Switzerland page A Global Network Based on Free Space QKD Free Space QKD QKD links with LEO satellites LEO acts as a trusted node to transport the key to the necessary location. Free space QKD is moving out of the lab & into industry Chinese have launched a QKD satellite in August 2016 and QKD system in space station in September. Worldwide interest at the academic/government level IDQ feasibility studies for practical systems (Eurostars and Swiss Space Office)

44 The first QKD in Space experiments again in China! QKD satellite Launched: 15/08/ ID Quantique SA, Switzerland page 44 QKD in Chinese Space station Launched: 15/09/2016

45 Global QKD Network based on Quantum Memories: A world-wide QKD infrastructure Build a QM infrastructure Each node exchanges QMs with the others Customers come to any node to recharge their QMs (similar to bank notes and ATM infrastructure) 2017 ID Quantique SA, Switzerland page 45

46 Summary The risk on cyber-security caused by the Quantum Computer has become real Need new solutions now Improve key quality with QRNG s Quantum Resistant Algorithms and QKD should be used together to provide Quantum- Safe security QKD can and should be used today to improve security on high-value links requiring long-term security No risk, only adds one (very different) layer of security World-wide QKD now feasible 2017 ID Quantique SA, Switzerland page 46

47 2017 ID Quantique SA, Switzerland page 47 For more information

48 Announcement: Winter school on Quantum Cybersecurity ID Quantique is proud to announce its 10 th Winter School Topic: The coming of age of Quantum Cyber Security; Date: Saturday, January 20 th, to Friday, January 26 th, 2017; Location: Les Diablerets, Switzerland; Some confirmed speakers: Charles Bennett; Gilles Brassard; Artur Ekert; Nicolas Gisin; Michele Mosca Come, learn and have fun with us! Contact: 2017 ID Quantique SA, Switzerland page 48

49 2017 ID Quantique SA, Switzerland page 49 EXTRA SLIDES

50 QKD example: the BB84 protocol 2017 ID Quantique SA, Switzerland page 50

51 QKD: Proof of Security 4 assumptions: 1. Alice and Bob operate in a protected environment 2. Public channel is authentified 3. Eve cannot use the QC to probe Alice and Bob s setup 4. QC only carries quantum states within the pre-defined Hilbert space Proof of security 2017 ID Quantique SA, Switzerland page 51

52 Global QKD Network based on Quantum Memories: 1. Building blocks 1. Generate and store entangled states in quantum memories source 2. Distribute entangled memories A 1 B 1 A 2 B 2 entangled memories Physical distribution channel A 1 B 1 3. Teleport states upon request A 1 Classical communication channel B 1 B 2 B ID Quantique SA, Switzerland page 52

53 Global QKD Network based on Quantum Memories: 2. Implementation Alice Issuing Authority 2 Issuing Authority 1 Issuing Authority ID Quantique SA, Switzerland page 53 Bob exchange memories teleport states

Quantum threat...and quantum solutions

Quantum threat...and quantum solutions Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique

More information

The Quantum Threat to Cybersecurity (for CxOs)

The Quantum Threat to Cybersecurity (for CxOs) The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

Cyber Security in the Quantum Era

Cyber Security in the Quantum Era T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

The quantum threat to cryptography

The quantum threat to cryptography The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How

More information

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK SESSION 1 World Tour HIGHLIGHTS Session focused on activity world wide on quantum safe communications research and policy. Matthew Scholl (NIST) described

More information

Quantum Communication

Quantum Communication Quantum Communication Nicolas Gisin, Hugo Zbinden, Mikael Afzelius Group of Applied Physics Geneva University, Switzerland Nonlocal Secret Randomness Quantum Key Distribution Quantum Memories and Repeaters

More information

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M. Mosca New paradigm brings new possibilities Designing

More information

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016 Managing the quantum risk to cybersecurity Global Risk Institute Michele Mosca 11 April 2016 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental part of safety

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Quantum Computer

More information

Information Security in the Age of Quantum Technologies

Information Security in the Age of Quantum Technologies www.pwc.ru Information Security in the Age of Quantum Technologies Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes

More information

C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 111 C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

The science behind these computers originates in

The science behind these computers originates in A Methodology for Quantum Risk Assessment Author: Dr. Michele Mosca & John Mulholland DISRUPTIVE TECHNOLOGY INTRODUCTION Until recently, quantum computing was often viewed as a capability that might emerge

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 What drives a company s digital strategy in 2020 and beyond? Quantum Computing it s the end of the world

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? Surveillance Problem / Weak Crypto

More information

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Cryptography in the Quantum Era Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Postulate #1: Qubit state belongs to Hilbert space of dimension 2 ψ

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016

More information

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel #RSAC SESSION ID: CRYP-W10 PQ Crypto Panel MODERATOR: Bart Preneel Professor, imec-cosic KU Leuven PANELISTS: Dr. Dan Boneh Professor, Stanford University Michele Mosca Professor, UWaterloo and evolutionq

More information

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Post-Quantum Cryptography & Privacy. Andreas Hülsing Post-Quantum Cryptography & Privacy Andreas Hülsing Privacy? Too abstract? How to achieve privacy? Under the hood... Public-key crypto ECC RSA DSA Secret-key crypto AES SHA2 SHA1... Combination of both

More information

Applications of Quantum Key Distribution (QKD)

Applications of Quantum Key Distribution (QKD) Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Cryptographical Security in the Quantum Random Oracle Model

Cryptographical Security in the Quantum Random Oracle Model Cryptographical Security in the Quantum Random Oracle Model Center for Advanced Security Research Darmstadt (CASED) - TU Darmstadt, Germany June, 21st, 2012 This work is licensed under a Creative Commons

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Post-Quantum Cryptography & Privacy. Andreas Hülsing Post-Quantum Cryptography & Privacy Andreas Hülsing Privacy? Too abstract? How to achieve privacy? Under the hood... Asymmetric Crypto ECC RSA DSA Symmetric Crypto AES SHA2 SHA1... Combination of both

More information

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING: I CAN SUM IT UP IN ONE SLIDE Pure Magic! 2 SERIOUSLY: HOW DOES IT WORK? That s simple: Even

More information

How to Use Short Basis : Trapdoors for Hard Lattices and new Cryptographic Constructions

How to Use Short Basis : Trapdoors for Hard Lattices and new Cryptographic Constructions Presentation Article presentation, for the ENS Lattice Based Crypto Workgroup http://www.di.ens.fr/~pnguyen/lbc.html, 30 September 2009 How to Use Short Basis : Trapdoors for http://www.cc.gatech.edu/~cpeikert/pubs/trap_lattice.pdf

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing Lecture 11: Key Management, Secret Sharing Céline Blondeau Email: celine.blondeau@aalto.fi Department of Computer Science Aalto University, School of Science Key Management Secret Sharing Shamir s Threshold

More information

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off. The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

Entanglement and Quantum Key Distribution at ESA

Entanglement and Quantum Key Distribution at ESA Entanglement and Quantum Key Distribution at ESA Eric Wille, TEC-MMO E.Murphy, TEC-MME ESA UNCLASSIFIED - For Official Use Entanglement and QKD Motivation Fundamental Research - Limitations of Quantum

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Standardization of Quantum Cryptography in China

Standardization of Quantum Cryptography in China Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018 CONTENTS 1 Background on Quantum Cryptography

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it

More information

Quantum Key Distribution and the Future of Encryption

Quantum Key Distribution and the Future of Encryption Quantum Key Distribution and the Future of Encryption Konstantinos Karagiannis Global Technical Lead, Ethical Hacking BT Security Amsterdam, October 16 th, 2014 Understanding QM? I think I can safely say

More information

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW?

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW? POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW? Hanno Böck https://hboeck.de 1 INTRODUCTION Hanno Böck, freelance journalist and hacker. Writing for Golem.de and others. Fuzzing Project, funded

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS SESSION ID: SP02-R14 ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS Jon Geater Chief Technology Officer Thales esecurity @jongeater Hold onto your hats! This is a very fast-paced

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Zhengjun Cao Abstract What is the behavior of an adversary to launch attacks against a communication? The good choice

More information

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD International Journal of Scientific and Research Publications, Volume 5, Issue 1, January 2015 1 Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD Mohamed Youssef Khalaf Elwadeya

More information

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Quantum cryptography and quantum hacking. Dr. Lars Lydersen

Quantum cryptography and quantum hacking. Dr. Lars Lydersen Quantum cryptography and quantum hacking Dr. Lars Lydersen GOVCERT.NL, Rotterdam 5. November 2 Quantum Hacking group NTNU, Trondheim & UNIK, Kjeller www.iet.ntnu.no/groups/optics/qcr/ Prof. Johannes Skaar

More information

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION Based on the discussion during the respective workshop at the ZEISS Symposium Optics in the Quantum World on 18 April 2018 in Oberkochen, Germany

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Quantum and quantum safe crypto technologies in Europe. Ales Fiala Future and Emerging Technologies European Commission

Quantum and quantum safe crypto technologies in Europe. Ales Fiala Future and Emerging Technologies European Commission Quantum and quantum safe crypto technologies in Europe 51214 Ales Fiala Future and Emerging Technologies European Commission Outline o Future and Emerging Technologies (FET) basics o Quantum Technologies

More information

Technical Report Communicating Secret Information Without Secret Messages

Technical Report Communicating Secret Information Without Secret Messages Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,

More information

Secrecy and the Quantum

Secrecy and the Quantum Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and

More information

Ground-Satellite QKD Through Free Space. Steven Taylor

Ground-Satellite QKD Through Free Space. Steven Taylor Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution

More information

Asymmetric Encryption

Asymmetric Encryption -3 s s Encryption Comp Sci 3600 Outline -3 s s 1-3 2 3 4 5 s s Outline -3 s s 1-3 2 3 4 5 s s Function Using Bitwise XOR -3 s s Key Properties for -3 s s The most important property of a hash function

More information

Cryptographic Hash Functions

Cryptographic Hash Functions Cryptographic Hash Functions Çetin Kaya Koç koc@ece.orst.edu Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331 Technical Report December 9, 2002 Version 1.5 1 1 Introduction

More information

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information by Michael

More information

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key

More information

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada Crypto against modern computers No known attack against RSA, AES,... yet They are not proven (and they cannot be) Crypto against modern computers

More information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can

More information

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles Device-independent Quantum Key Distribution and Randomness Generation Stefano Pironio Université Libre de Bruxelles Tropical QKD, Waterloo, June 14-17, 2010 Device-independent security proofs establish

More information

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Intro to Public Key Cryptography Diffie & Hellman Key Exchange Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie & Hellman Key Exchange Course Summary - Math Part

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 7, 2015 CPSC 467, Lecture 11 1/37 Digital Signature Algorithms Signatures from commutative cryptosystems Signatures from

More information

This is a repository copy of Unite to build a quantum internet. White Rose Research Online URL for this paper:

This is a repository copy of Unite to build a quantum internet. White Rose Research Online URL for this paper: This is a repository copy of Unite to build a quantum internet. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/98773/ Version: Accepted Version Article: Pirandola, Stefano

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics

More information

Quantum Technologies for Cryptography

Quantum Technologies for Cryptography University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms

More information

Device-Independent Quantum Information Processing (DIQIP)

Device-Independent Quantum Information Processing (DIQIP) Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,

More information

Lecture 1: Introduction to Public key cryptography

Lecture 1: Introduction to Public key cryptography Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means

More information

EU investment in Quantum Technologies

EU investment in Quantum Technologies EU investment in Quantum Technologies ENISA Summer School, 26. September2018 Dr. Gustav Kalbe High Performance Computing and Quantum Technologies DG CNECT, European Commission 2 nd Quantumrevolution: manipulating/exploiting

More information

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015 L7. Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang, 5 March 2015 1 Outline The basic foundation: multiplicative group modulo prime The basic Diffie-Hellman (DH) protocol The discrete logarithm

More information

Advanced Cryptography Quantum Algorithms Christophe Petit

Advanced Cryptography Quantum Algorithms Christophe Petit The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Information Security

Information Security SE 4472 / ECE 9064 Information Security Week 12: Random Number Generators and Picking Appropriate Key Lengths Fall 2015 Prof. Aleksander Essex Random Number Generation Where do keys come from? So far we

More information

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Journal of Computer Science 3 (6): 44-49, 7 ISSN 549-3636 7 Science Publications Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Iyed Ben Slimen, Olfa Trabelsi, Houria

More information

Fundamentals of Modern Cryptography

Fundamentals of Modern Cryptography Fundamentals of Modern Cryptography BRUCE MOMJIAN This presentation explains the fundamentals of modern cryptographic methods. Creative Commons Attribution License http://momjian.us/presentations Last

More information

Public-Key Cryptosystems CHAPTER 4

Public-Key Cryptosystems CHAPTER 4 Public-Key Cryptosystems CHAPTER 4 Introduction How to distribute the cryptographic keys? Naïve Solution Naïve Solution Give every user P i a separate random key K ij to communicate with every P j. Disadvantage:

More information

Contents. ID Quantique SA Tel: Chemin de la Marbrerie 3 Fax : Carouge

Contents. ID Quantique SA Tel: Chemin de la Marbrerie 3 Fax : Carouge Contents Introduction... 3 Quantis TRNG... 3 Quantifying Randomness... 4 Randomness Extractor... 4 Randomness Extraction in the Quantis Software Package... 5 Conclusion... 7 References... 7 ID Quantique

More information

Quantum Technology: Challenges and Opportunities for Cyber Security. Yaoyun Shi University of Michigan

Quantum Technology: Challenges and Opportunities for Cyber Security. Yaoyun Shi University of Michigan Quantum Technology: Challenges and Opportunities for Cyber Security Yaoyun Shi University of Michigan The Alien Monsters Are Coming! Written by Yaoyun Shi Illustrated by Oriana Shi Ultimatum to Earthlings

More information

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Vadim Makarov www.vad1.com/lab Security model of QKD Security proof.laws of physics & Model of equipment Hack Integrate

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

Foundations of Network and Computer Security

Foundations of Network and Computer Security Foundations of Network and Computer Security John Black Lecture #6 Sep 8 th 2005 CSCI 6268/TLEN 5831, Fall 2005 Announcements Quiz #1 later today Still some have not signed up for class mailing list Perhaps

More information

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

Quantum Key Distribution. The Starting Point

Quantum Key Distribution. The Starting Point Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

Practical, Quantum-Secure Key Exchange from LWE

Practical, Quantum-Secure Key Exchange from LWE Practical, Quantum-Secure Key Exchange from LWE Douglas Stebila 4 th ETSI/IQC Workshop on Quantum-Safe Cryptography September 21, 2016 Acknowledgements Collaborators Joppe Bos Craig Costello and Michael

More information

What are we talking about when we talk about post-quantum cryptography?

What are we talking about when we talk about post-quantum cryptography? PQC Asia Forum Seoul, 2016 What are we talking about when we talk about post-quantum cryptography? Fang Song Portland State University PQC Asia Forum Seoul, 2016 A personal view on postquantum cryptography

More information

Quantum Networking: Deployments, Components and Opportunities September 2017

Quantum Networking: Deployments, Components and Opportunities September 2017 Quantum Networking: Deployments, Components and Opportunities 2017-2026 September 2017 2025 Library Ave., Suite 402 Quantum Networking: Deployments, Components and Opportunities 2017-2026 Page 1 Report

More information