Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Size: px
Start display at page:

Download "Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018"

Transcription

1 Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

2 What drives a company s digital strategy in 2020 and beyond? Quantum Computing it s the end of the world as we know it? July

3 What drives a company s digital strategy in 2020 and beyond? INTERNET OF THINGS? Quantum Computing it s the end of the world as we know it? July

4 What drives a company s digital strategy in 2020 and beyond? CYBER ATTACKS? Quantum Computing it s the end of the world as we know it? July

5 What drives a company s digital strategy in 2020 and beyond? BITCOIN? Quantum Computing it s the end of the world as we know it? July

6 What drives a company s digital strategy in 2020 and beyond? DIGITAL TRANSFORMATION? Quantum Computing it s the end of the world as we know it? July

7 What drives a company s digital strategy in 2020 and beyond? Regardless of what drives your digital strategy it will be based on digital identities authentication of these identities secret communication all driven by digital certificates and encryption! Quantum Computing it s the end of the world as we know it? July

8 And then comes Quantum Computing Quantum computing is coming for your data! Quantum Computing it s the end of the world as we know it? July

9 Who are we and why do we care? Quantum Computing it s the end of the world as we know it?

10 Giesecke+Devrient creating confidence since 1852 Founded 1852 > 11,000 employees > 2 billion revenue Quantum Computing it s the end of the world as we know it?

11 G+D provides secure solutions for customers in four major playing fields Payment Connectivity Identity Digital security Global leader in physical, electronic and digital payments Secure connectivity as a gateway to the Internet of Things Safeguarding personal identities and authentication Protecting classified data, communication channels & critical infrastructures Security G+D makes the lives of billions of people more secure Quantum Computing it s the end of the world as we know it?

12 The digital world is build on encryption Quantum Computing it s the end of the world as we know it? July

13 How does classical encryption work? Symmetric encryption Asymmetric encryption Examples: AES, DES Examples: RSA, ECC Quantum Computing it s the end of the world as we know it? July

14 Where you would use encryption and certificates in a mobile banking environment? storage Payment Backend Service Portal Build Portal Code security symmetric storage BANKING App BANKING API OS identity encryption Payment Reporting Development asymmetric certificates and what they are used for identity ios or Android identity encryption Bank Server Accounting encryption Build Server Admin Quantum Computing it s the end of the world as we know it? July

15 OK, encryption is well understood and widely used so we are safe, right? Quantum Computing it s the end of the world as we know it? July

16 Quantum computing has the potential to shake digital encryption to the core Remember this marvel? So what makes it so fundamentally different? Quantum Computing it s the end of the world as we know it? July

17 The fundamental difference in quantum computing are the Qubits Classical bits Qubits 0 0 Impact When using Qubits, multiple operations can happen simultaneously Clear-cut, either 1 or 0, on or off 1 1 Multiple states at the same time ( superposition ) Dramatic speedup of certain calculations compared to classical bits Quantum Computing it s the end of the world as we know it? July

18 Today s encryption will be effectively broken by quantum computers Effective key strengths Encryption type Algorithm Today: classical Future: quantum Asymmetric RSA-1024 RSA Symmetric ECC-256 ECC-521 AES-128 AES ! SHA Quantum Computing it s the end of the world as we know it? July

19 Runtime It is expected that one day, quantum computers will outperform classical ones Quantum computing Classical computing As number of useable qubits will increase, quantum computing will be able to solve problems that classical computers can not: Quantum Supremacy Number of qubits Quantum Computing it s the end of the world as we know it? July

20 Number of qubits have been steadily increasing Qubits Year Quantum Computing it s the end of the world as we know it? July

21 Time to panic? Not yet! Quantum Computing it s the end of the world as we know it? July

22 Currently, qubits are very hard to scale and show high error rates Obstacles to build and run requires intensive cooling depends on high amount of magnetic shielding consumes a lot of energy In practice high error rates, reducing the effectiveness of the qubits! Quantum Computing it s the end of the world as we know it? July

23 These obstacles still prevent breaking of today s encryption Question Approach How large is very large? How would one break a RSA key? Take a given very large number A and find its two factors B and C A = B * C RSA-2048 = What is the largest number factored using qubits and Shor s algorithm? 21 By the way, solution is 21 = 3 * 7 Quantum Computing it s the end of the world as we know it? July

24 But we should still take it seriously The National Security Agency is advising US agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually all , medical and financial records, and online transactions is rendered obsolete by quantum computing. Quantum Computing it s the end of the world as we know it? July

25 Actions to take to protect your customers and your organization 1 Follow announcements on recent developments, both from academia and the industry As new standards for 2 Identify the critical elements in your infrastructure depending on encryption post-quantum cryptography are being developed, here is what you can do Per element, assess risks (potential damage) and effort to adapt Start drafting a transition plan in order to be prepared once new standards are published Be aware but don t panic Quantum Computing it s the end of the world as we know it? July

26 Questions & Answers Dr. Philipp Schulte Corp. Development & Strategy G+D Group Dr. Christian Schläger Product Management Cyber Security G+D Mobile Security Quantum Computing it s the end of the world as we know it? July

27

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS SESSION ID: SP02-R14 ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS Jon Geater Chief Technology Officer Thales esecurity @jongeater Hold onto your hats! This is a very fast-paced

More information

The Quantum Threat to Cybersecurity (for CxOs)

The Quantum Threat to Cybersecurity (for CxOs) The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.

More information

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Post-Quantum Cryptography & Privacy. Andreas Hülsing Post-Quantum Cryptography & Privacy Andreas Hülsing Privacy? Too abstract? How to achieve privacy? Under the hood... Public-key crypto ECC RSA DSA Secret-key crypto AES SHA2 SHA1... Combination of both

More information

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Post-Quantum Cryptography & Privacy. Andreas Hülsing Post-Quantum Cryptography & Privacy Andreas Hülsing Privacy? Too abstract? How to achieve privacy? Under the hood... Asymmetric Crypto ECC RSA DSA Symmetric Crypto AES SHA2 SHA1... Combination of both

More information

White paper Quantum computing in financial services

White paper Quantum computing in financial services White paper Quantum computing in financial services There is no shortage of theoretical applications of quantum computing, at a grand scale, that approaches science fiction. How will it really affect the

More information

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M. Mosca New paradigm brings new possibilities Designing

More information

The science behind these computers originates in

The science behind these computers originates in A Methodology for Quantum Risk Assessment Author: Dr. Michele Mosca & John Mulholland DISRUPTIVE TECHNOLOGY INTRODUCTION Until recently, quantum computing was often viewed as a capability that might emerge

More information

Information Security in the Age of Quantum Technologies

Information Security in the Age of Quantum Technologies www.pwc.ru Information Security in the Age of Quantum Technologies Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes

More information

The quantum threat to cryptography

The quantum threat to cryptography The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How

More information

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016 Managing the quantum risk to cybersecurity Global Risk Institute Michele Mosca 11 April 2016 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental part of safety

More information

What are we talking about when we talk about post-quantum cryptography?

What are we talking about when we talk about post-quantum cryptography? PQC Asia Forum Seoul, 2016 What are we talking about when we talk about post-quantum cryptography? Fang Song Portland State University PQC Asia Forum Seoul, 2016 A personal view on postquantum cryptography

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Quantum Computer

More information

FIS' Partnership with Zelle for P2P Payments

FIS' Partnership with Zelle for P2P Payments FIS' Partnership with Zelle for P2P Payments Chris Burfield, SVP, Digital Market Strategy Norman Marraccini, VP, Director of Digital Payment Product Strategy & Marketing Peter Tapling, Chief Revenue Officer,

More information

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security Flight plan What s a quantum computer? How broken are your public keys? AES vs. quantum search Hidden quantum powers Defeating quantum computing

More information

Cyber Security in the Quantum Era

Cyber Security in the Quantum Era T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act

More information

Lattice-Based Cryptography

Lattice-Based Cryptography Liljana Babinkostova Department of Mathematics Computing Colloquium Series Detecting Sensor-hijack Attacks in Wearable Medical Systems Krishna Venkatasubramanian Worcester Polytechnic Institute Quantum

More information

Alternative Approaches: Bounded Storage Model

Alternative Approaches: Bounded Storage Model Alternative Approaches: Bounded Storage Model A. Würfl 17th April 2005 1 Motivation Description of the Randomized Cipher 2 Motivation Motivation Description of the Randomized Cipher Common practice in

More information

Int er net Saf et y Tip s

Int er net Saf et y Tip s BE CAREFUL AS: Facebook oft en means People oft en pret end t o be people t hey are not so be wary of t his!! Int er net Saf et y Tip s N ever accept people you do not know. Never give out your real name

More information

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? Surveillance Problem / Weak Crypto

More information

Quantum technology popular science description

Quantum technology popular science description Quantum technology popular science description 1 Quantum physics, from theory to ongoing revolution In the early 1900s observations were made that were not consistent with traditional, classical physics.

More information

Quantum Technologies: Threats & Solutions to Cybersecurity

Quantum Technologies: Threats & Solutions to Cybersecurity Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017 ID Quantique Company Profile

More information

Errors, Eavesdroppers, and Enormous Matrices

Errors, Eavesdroppers, and Enormous Matrices Errors, Eavesdroppers, and Enormous Matrices Jessalyn Bolkema September 1, 2016 University of Nebraska - Lincoln Keep it secret, keep it safe Public Key Cryptography The idea: We want a one-way lock so,

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel #RSAC SESSION ID: CRYP-W10 PQ Crypto Panel MODERATOR: Bart Preneel Professor, imec-cosic KU Leuven PANELISTS: Dr. Dan Boneh Professor, Stanford University Michele Mosca Professor, UWaterloo and evolutionq

More information

Public-key Cryptography and elliptic curves

Public-key Cryptography and elliptic curves Public-key Cryptography and elliptic curves Dan Nichols nichols@math.umass.edu University of Massachusetts Oct. 14, 2015 Cryptography basics Cryptography is the study of secure communications. Here are

More information

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it

More information

Quantum threat...and quantum solutions

Quantum threat...and quantum solutions Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique

More information

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015 L7. Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang, 5 March 2015 1 Outline The basic foundation: multiplicative group modulo prime The basic Diffie-Hellman (DH) protocol The discrete logarithm

More information

Cryptography and Security Final Exam

Cryptography and Security Final Exam Cryptography and Security Final Exam Serge Vaudenay 17.1.2017 duration: 3h no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication devices are not

More information

Fast, Quantum-Resistant Public-Key Solutions for Constrained Devices Using Group Theoretic Cryptography

Fast, Quantum-Resistant Public-Key Solutions for Constrained Devices Using Group Theoretic Cryptography Fast, Quantum-Resistant Public-Key Solutions for Constrained Devices Using Group Theoretic Cryptography International Cryptographic Module Conference May 18, 2017 Derek Atkins, Chief Technology Officer

More information

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Cryptography in the Quantum Era Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Postulate #1: Qubit state belongs to Hilbert space of dimension 2 ψ

More information

Quantum Differential and Linear Cryptanalysis

Quantum Differential and Linear Cryptanalysis Quantum Differential and Linear Cryptanalysis Marc Kaplan 1,2 Gaëtan Leurent 3 Anthony Leverrier 3 María Naya-Plasencia 3 1 LTCI, Télécom ParisTech 2 School of Informatics, University of Edinburgh 3 Inria

More information

F L I G H T R I S K I N M & A : T H E A R T A N D S C I E N C E O F R E T A I N I N G T A L E N T

F L I G H T R I S K I N M & A : T H E A R T A N D S C I E N C E O F R E T A I N I N G T A L E N T H E A L T H W E A L T H C A R E E R F L I G H T R I S K I N M & A : T H E A R T A N D S C I E N C E O F R E T A I N I N G T A L E N T M E R C E R S 2 0 1 7 R E S E A R C H R E P O R T MARCH 30, 2017 Ursula

More information

The Quantum Age Technological Opportunities

The Quantum Age Technological Opportunities The Quantum Age Technological Opportunities Sir Mark Walport FRS Government Chief Scientific Adviser ETSI / IQC Quantum Safe Workshop 13 September 2017 Government Chief Scientific Adviser Health, wellbeing,

More information

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago A brief survey of post-quantum cryptography D. J. Bernstein University of Illinois at Chicago Once the enormous energy boost that quantum computers are expected to provide hits the street, most encryption

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

19. Coding for Secrecy

19. Coding for Secrecy 19. Coding for Secrecy 19.1 Introduction Protecting sensitive information from the prying eyes and ears of others is an important issue today as much as it has been for thousands of years. Government secrets,

More information

A brief survey on quantum computing

A brief survey on quantum computing A brief survey on quantum computing Edward Poon University of Ottawa Edward Poon (Ottawa) A brief survey on quantum computing March 19, 2018 1 / 7 Outline Goal: Provide a high-level overview of what quantum

More information

Limits and Future of Computing Where do we go from here?

Limits and Future of Computing Where do we go from here? Limits and Future of Computing Where do we go from here? Notes for CSC 100 - The Beauty and Joy of Computing The University of North Carolina at Greensboro Back to Algorithms... Recall that algorithms

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

RSA ENCRYPTION USING THREE MERSENNE PRIMES

RSA ENCRYPTION USING THREE MERSENNE PRIMES Int. J. Chem. Sci.: 14(4), 2016, 2273-2278 ISSN 0972-768X www.sadgurupublications.com RSA ENCRYPTION USING THREE MERSENNE PRIMES Ch. J. L. PADMAJA a*, V. S. BHAGAVAN a and B. SRINIVAS b a Department of

More information

Standardization of Quantum Cryptography in China

Standardization of Quantum Cryptography in China Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018 CONTENTS 1 Background on Quantum Cryptography

More information

The Two Time Pad Encryption System

The Two Time Pad Encryption System Hardware Random Number Generators This document describe the use and function of a one-time-pad style encryption system for field and educational use. You may download sheets free from www.randomserver.dyndns.org/client/random.php

More information

ARGUS.net IS THREE SOLUTIONS IN ONE

ARGUS.net IS THREE SOLUTIONS IN ONE OVERVIEW H i g h l y c o n f i g u r a b l e s o f t w a r e a c c o m m o d a t e s a w i d e r a n g e o f c o l l e c t i o n s T h r e e s o l u t i o n s c o v e r P o r t a l s, C o l l e c t i o

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

Evaluating e-government : implementing GIS services in Municipality

Evaluating e-government : implementing GIS services in Municipality Evaluating e-government : implementing GIS services in Municipality Municipality of Thessaloniki - G.I.S. Unit Misirloglou Symeon Head of the GIS Unit ESRI UC - 2016 The GIS Section - subset of the department

More information

Web GIS: Architectural Patterns and Practices. Shannon Kalisky Philip Heede

Web GIS: Architectural Patterns and Practices. Shannon Kalisky Philip Heede Web GIS: Architectural Patterns and Practices Shannon Kalisky Philip Heede Web GIS Transformation of the ArcGIS Platform Desktop Apps Server GIS Web Maps Web Scenes Layers Web GIS Transformation of the

More information

From NewHope to Kyber. Peter Schwabe April 7, 2017

From NewHope to Kyber. Peter Schwabe   April 7, 2017 From NewHope to Kyber Peter Schwabe peter@cryptojedi.org https://cryptojedi.org April 7, 2017 In the past, people have said, maybe it s 50 years away, it s a dream, maybe it ll happen sometime. I used

More information

Land Board, NW Services and SDI Tambet Tiits, FRICS

Land Board, NW Services and SDI Tambet Tiits, FRICS Land Board, NW Services and SDI Tambet Tiits, FRICS 07.09.2016 200th anniversary of the Struve Geodetic Arc Friedrich Georg Wilhelm Struve and Carl Friedrich Tenner Struve Geodetic Arc The Struve Geodetic

More information

Esri and GIS Education

Esri and GIS Education Esri and GIS Education Organizations Esri Users 1,200 National Government Agencies 11,500 States & Regional Agencies 30,800 Cities & Local Governments 32,000 Businesses 8,500 Utilities 12,600 NGOs 11,000

More information

Your Computer is Leaking. Ian J. Malloy.

Your Computer is Leaking. Ian J. Malloy. Your Computer is Leaking Ian J. Malloy Dennis Hollenbeck, 149 W Managed Services dennis.hollenbeck@149w-managed-services.com Abstract This presentation focuses on differences between quantum computing

More information

T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T WO R K

T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T WO R K 1 T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T WO R K Manoj Sharma Technical Director Symantec Corp Mark Sanders Lead Security Architect Venafi T H R E A T S A R E

More information

FPGA-BASED ACCELERATOR FOR POST-QUANTUM SIGNATURE SCHEME SPHINCS-256

FPGA-BASED ACCELERATOR FOR POST-QUANTUM SIGNATURE SCHEME SPHINCS-256 IMES FPGA-BASED ACCELERATOR FOR POST-QUANTUM SIGNATURE SCHEME SPHINCS-256 Dorian Amiet 1, Andreas Curiger 2 and Paul Zbinden 1 1 HSR Hochschule für Technik, Rapperswil, Switzerland 2 Securosys SA, Zürich,

More information

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. ) Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson

More information

Solution to Midterm Examination

Solution to Midterm Examination YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Handout #13 Xueyuan Su November 4, 2008 Instructions: Solution to Midterm Examination This is a closed book

More information

Web GIS & ArcGIS Pro. Zena Pelletier Nick Popovich

Web GIS & ArcGIS Pro. Zena Pelletier Nick Popovich Web GIS & ArcGIS Pro Zena Pelletier Nick Popovich Web GIS Transformation of the ArcGIS Platform Desktop Apps GIS Web Maps Web Scenes Layers Evolution of the modern GIS Desktop GIS (standalone GIS) GIS

More information

Android Security Mechanisms

Android Security Mechanisms Android Security Mechanisms Lecture 8 Operating Systems Practical 7 December 2016 This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license,

More information

Post-quantum RSA. We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity

Post-quantum RSA. We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity Daniel J. Bernstein Joint work with: Nadia Heninger Paul Lou Luke Valenta The referees are questioning applicability...

More information

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING: I CAN SUM IT UP IN ONE SLIDE Pure Magic! 2 SERIOUSLY: HOW DOES IT WORK? That s simple: Even

More information

Number Theory in Cryptography

Number Theory in Cryptography Number Theory in Cryptography Introduction September 20, 2006 Universidad de los Andes 1 Guessing Numbers 2 Guessing Numbers (person x) (last 6 digits of phone number of x) 3 Guessing Numbers (person x)

More information

ArcGIS Deployment Pattern. Azlina Mahad

ArcGIS Deployment Pattern. Azlina Mahad ArcGIS Deployment Pattern Azlina Mahad Agenda Deployment Options Cloud Portal ArcGIS Server Data Publication Mobile System Management Desktop Web Device ArcGIS An Integrated Web GIS Platform Portal Providing

More information

Cryptographic Hash Functions

Cryptographic Hash Functions Cryptographic Hash Functions Çetin Kaya Koç koc@ece.orst.edu Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331 Technical Report December 9, 2002 Version 1.5 1 1 Introduction

More information

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers

More information

Snow Cover. Snow Plowing and Removal Services Best Practices Guide. l

Snow Cover. Snow Plowing and Removal Services Best Practices Guide.  l Snow Cover Snow Plowing and Removal Services Best Practices Guide 2015 2016 www.hortica.com l 800.851.7740 During a recent trip to upstate NY, Hortica Loss Control representatives met with several insureds

More information

Post Quantum Cryptography. Kenny Paterson Information Security

Post Quantum Cryptography. Kenny Paterson Information Security Post Quantum Cryptography Kenny Paterson Information Security Group @kennyog Lifetime of a Hash Algorithm SHA-1 1995: SHA-1 published (NIST, tweak of 1993 SHA-0 design) 1990s: (various attacks on SHA-0,

More information

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off. The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer

More information

The Elliptic Curve in https

The Elliptic Curve in https The Elliptic Curve in https Marco Streng Universiteit Leiden 25 November 2014 Marco Streng (Universiteit Leiden) The Elliptic Curve in https 25-11-2014 1 The s in https:// HyperText Transfer Protocol

More information

Daniel J. Bernstein University of Illinois at Chicago. means an algorithm that a quantum computer can run.

Daniel J. Bernstein University of Illinois at Chicago. means an algorithm that a quantum computer can run. Quantum algorithms 1 Daniel J. Bernstein University of Illinois at Chicago Quantum algorithm means an algorithm that a quantum computer can run. i.e. a sequence of instructions, where each instruction

More information

SPHINCS: practical stateless hash-based signatures

SPHINCS: practical stateless hash-based signatures SPHINCS: practical stateless hash-based signatures D. J. Bernstein, D. Hopwood, A. Hülsing, T. Lange, R. Niederhagen, L. Papachristodoulou, P. Schwabe, and Z. Wilcox O'Hearn Digital Signatures are Important!

More information

Introduction to Cryptography. Susan Hohenberger

Introduction to Cryptography. Susan Hohenberger Introduction to Cryptography Susan Hohenberger 1 Cryptography -- from art to science -- more than just encryption -- essential today for non-military applications 2 Symmetric Crypto Shared secret K =>

More information

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography CIS 6930/4930 Computer and Network Security Topic 5.2 Public Key Cryptography 1 Diffie-Hellman Key Exchange 2 Diffie-Hellman Protocol For negotiating a shared secret key using only public communication

More information

LEGAL DISCLAIMER. APG Coin (APG) White Paper (hereinafter 'the White Paper', 'the Document') is presented for informational purposes only

LEGAL DISCLAIMER. APG Coin (APG) White Paper (hereinafter 'the White Paper', 'the Document') is presented for informational purposes only LEGAL DISCLAIMER THIS DOCUMENT DOES NOT GIVE PERSONAL LEGAL OR FINANCIAL ADVICE. YOU ARE STRONGLY ENCOURAGED TO SEEK YOUR OWN PROFESSIONAL LEGAL AND FINANCIAL ADVICE. APG Coin (APG) White Paper (hereinafter

More information

Number theory (Chapter 4)

Number theory (Chapter 4) EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland

More information

Lecture 15: Randomness

Lecture 15: Randomness Lecture 15: Randomness CS105: Great Insights in Computer Science Michael L. Littman, Fall 2006 Voting Machines Average of List Let s say we ve got a list of n small integers (n = 10,000,000,000, for example).

More information

Experimental Study of DIGIPASS GO3 and the Security of Authentication

Experimental Study of DIGIPASS GO3 and the Security of Authentication Experimental Study of DIGIPASS GO3 and the Security of Authentication Igor Semaev Department of Informatics, University of Bergen, Norway e-mail: igor@ii.uib.no arxiv:1506.06332v1 [cs.cr] 21 Jun 2015 Abstract.

More information

The Reality of Quantum Computing

The Reality of Quantum Computing The Reality of Quantum Computing Now and in the Future @qant Christoph Lameter Jump Trading LLC Great Expectations But the current state: Wild West Funding: Governments see a chance to win

More information

Web GIS Deployment for Administrators. Vanessa Ramirez Solution Engineer, Natural Resources, Esri

Web GIS Deployment for Administrators. Vanessa Ramirez Solution Engineer, Natural Resources, Esri Web GIS Deployment for Administrators Vanessa Ramirez Solution Engineer, Natural Resources, Esri Agenda Web GIS Concepts Web GIS Deployment Patterns Components of an On-Premises Web GIS Federation of Server

More information

Quantum Strangeness In Unexpected Places. Aash Clerk ! +!

Quantum Strangeness In Unexpected Places. Aash Clerk ! +! Quantum Strangeness In Unexpected Places Aash Clerk! +! Schrodinger s Homer? Can we make large objects act in strange quantum ways? Quantum computers? When can I buy one? Quantum Weirdness? Quantum mechanics

More information

Breaking Symmetric Cryptosystems Using Quantum Algorithms

Breaking Symmetric Cryptosystems Using Quantum Algorithms Breaking Symmetric Cryptosystems Using Quantum Algorithms Gaëtan Leurent Joined work with: Marc Kaplan Anthony Leverrier María Naya-Plasencia Inria, France FOQUS Workshop Gaëtan Leurent (Inria) Breaking

More information

Geospatial natural disaster management

Geospatial natural disaster management Geospatial natural disaster management disasters happen. are you ready? Natural disasters can strike almost anywhere at any time, with no regard to a municipality s financial resources. These extraordinarily

More information

Cryptographical Security in the Quantum Random Oracle Model

Cryptographical Security in the Quantum Random Oracle Model Cryptographical Security in the Quantum Random Oracle Model Center for Advanced Security Research Darmstadt (CASED) - TU Darmstadt, Germany June, 21st, 2012 This work is licensed under a Creative Commons

More information

Quantum Computing is Here, Powered by Open Source. Konstantinos Karagiannis CTO, Security Consulting BT

Quantum Computing is Here, Powered by Open Source. Konstantinos Karagiannis CTO, Security Consulting BT Quantum Computing is Here, Powered by Open Source Konstantinos Karagiannis CTO, Security Consulting BT Americas @KonstantHacker It all started with the need to crack encryption We re there again Snowden

More information

A central problem in cryptography: the key distribution problem.

A central problem in cryptography: the key distribution problem. Scientific American 314, 48-55 (2016) A central problem in cryptography: the key distribution problem. Mathematics solution: public key cryptography. Public-key cryptography relies on the computational

More information

CLICK HERE TO KNOW MORE

CLICK HERE TO KNOW MORE CLICK HERE TO KNOW MORE GeoSpace for Singapore s Whole-of-Government Data Sharing Asia GeoSpatial Forum 17 19 Oct 2011 Lee Kim Haw Singapore Land Authority Introducing Singapore Land Authority Limited

More information

Innovation in Land Management: Integrated Solutions For National Cadastre Projects

Innovation in Land Management: Integrated Solutions For National Cadastre Projects Success With GIS Innovation in Land Management: Integrated Solutions For National Cadastre Projects XXIII International FIG Congress Munich These documents are only complete, when used in connection with

More information

Chapter 4 Asymmetric Cryptography

Chapter 4 Asymmetric Cryptography Chapter 4 Asymmetric Cryptography Introduction Encryption: RSA Key Exchange: Diffie-Hellman [NetSec/SysSec], WS 2008/2009 4.1 Asymmetric Cryptography General idea: Use two different keys -K and +K for

More information

Asymmetric Cryptography

Asymmetric Cryptography Asymmetric Cryptography Chapter 4 Asymmetric Cryptography Introduction Encryption: RSA Key Exchange: Diffie-Hellman General idea: Use two different keys -K and +K for encryption and decryption Given a

More information

ArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D

ArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D ArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D ArcGIS Earth is ArcGIS Earth is a lightweight globe desktop application that helps you explore any part of the world and investigate

More information

Asymmetric Encryption

Asymmetric Encryption -3 s s Encryption Comp Sci 3600 Outline -3 s s 1-3 2 3 4 5 s s Outline -3 s s 1-3 2 3 4 5 s s Function Using Bitwise XOR -3 s s Key Properties for -3 s s The most important property of a hash function

More information

VIDEO Intypedia008en LESSON 8: SECRET SHARING PROTOCOL. AUTHOR: Luis Hernández Encinas. Spanish Scientific Research Council in Madrid, Spain

VIDEO Intypedia008en LESSON 8: SECRET SHARING PROTOCOL. AUTHOR: Luis Hernández Encinas. Spanish Scientific Research Council in Madrid, Spain VIDEO Intypedia008en LESSON 8: SECRET SHARING PROTOCOL AUTHOR: Luis Hernández Encinas Spanish Scientific Research Council in Madrid, Spain Hello and welcome to Intypedia. We have learned many things about

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 16 October 30, 2017 CPSC 467, Lecture 16 1/52 Properties of Hash Functions Hash functions do not always look random Relations among

More information

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles Quantum Computation 650 Spring 2009 Lectures 1-21 The World of Quantum Information Marianna Safronova Department of Physics and Astronomy February 10, 2009 Outline Quantum Information: fundamental principles

More information

Public-key Cryptography and elliptic curves

Public-key Cryptography and elliptic curves Public-key Cryptography and elliptic curves Dan Nichols University of Massachusetts Amherst nichols@math.umass.edu WINRS Research Symposium Brown University March 4, 2017 Cryptography basics Cryptography

More information

Oman NSDI Supporting Economic Development. Saud Al-Nofli Director of Spatial Data Directorate General of NSDI, NCSI

Oman NSDI Supporting Economic Development. Saud Al-Nofli Director of Spatial Data Directorate General of NSDI, NCSI Oman NSDI Supporting Economic Development 2017 Saud Al-Nofli Director of Spatial Data Directorate General of NSDI, NCSI "It s critical to make correct decisions the first time to optimize the Investments

More information

L E A D I N G T H E C O M P U T I N G R E V O L U T I O N

L E A D I N G T H E C O M P U T I N G R E V O L U T I O N L E A D I N G T H E COMPUTING REVOLUTION 22 SAFE HARBOR Statements in this presentation that are not descriptions of historical facts are forwardlooking statements relating to future events, and as such

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

CRYSTALS Kyber and Dilithium. Peter Schwabe February 7, 2018

CRYSTALS Kyber and Dilithium. Peter Schwabe   February 7, 2018 CRYSTALS Kyber and Dilithium Peter Schwabe peter@cryptojedi.org https://cryptojedi.org February 7, 2018 Crypto today 5 building blocks for a secure channel Symmetric crypto Block or stream cipher (e.g.,

More information