ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK
|
|
- Curtis Short
- 5 years ago
- Views:
Transcription
1 ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK SESSION 1 World Tour
2 HIGHLIGHTS Session focused on activity world wide on quantum safe communications research and policy. Matthew Scholl (NIST) described the NIST Process not competition on new quantum safe primitives and time scales. Take home message: aggressive timescales starting now. Emphasis on PQC Cheng Zhi Peng (CAS) described the dual approach of space based and fibre based QKD research in China.
3 ISSUES RAISED William Huang (IDQ QTEC) described industry engagement in building the fibre based QKD backbone in China. Take home message: helps to have buy in from Government 5 year plans and identification within China s top 100 Key Projects! Norbert Luetkenhaus (IQC) described the academic industry quantum safe ecosystem in Canada. Take home message: PQC and QKD work proceeding together with proper emphasis on testing, evaluation and standards.
4 HIGHLIGHTS Masahide Sasaki (NICT) Japan looking at quantumbased solution for medical information systems. Tim Spiller, University of York UK Quantum Communications Hub bringing together Academia, Government and Industry including users. Nicolas Gisin, University of Geneva You can use your smartphone as an elementary Quantum processor!
5 CONCLUSION WORLD TOUR QKD is heavily funded worldwide, and much is happening. Links between QKD and PQC communities vary significantly from country to country. NIST process will focus attention on PQC
6 ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK Session 3: Threats to Cryptography
7 HIGHLIGHTS Good progress is being made with developing scalable quantum computers (QCs). Tens of qbits are now available in the lab and public access for experiment is now available via initiatives such as IBMQ A range of technologies are being investigated and it is speculated that machines with thousands of logical qbits may be only years away There is also good progress with controlling and understanding the power of quantum computers. For example IBM are developing the notion of QC volume (= num qbits x error rate x connectivity factor x num gates) to give an indication of the power of various technologies and architectures proposed for future QCs.
8 ISSUES RAISED However there is an increasing recognition that the additional resources required for error correction and fault tolerance for large machines will be a significant overhead. Estimates from IQC/Waterloo for inverting SHA hashes or performing Grover searches on parallel QCs with good surface codes already demonstrate the problem. Meanwhile our understanding of classical attacks on PQC is also continuing to improve. For example the complexity of lattice basis reduction algorithms is well understood and parameter size recommendations already incorporate a large safety margins. We are in a much better situation than in the 1980s with early factoring algorithms. Quantum supremacy may be approaching but in the near term this will mean that QCs cannot be simulated by classical computers, not that QCs will be able to solve currently intractable problems of interest.
9 ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK SESSION 4 System Level Issues
10 HIGHLIGHTS Each of the current proposed post quantum cryptography schemes has pros and cons to satisfy the requirements for one pass key establishment in updating public keys With a combination of post quantum TLS protocol and QKD, special engineering method is presented to establish secure multi site communication system Valuable FPGA implementation data for the comparison of New Hope and Frodo are presented
11 ISSUES RAISED One way key establishment has limits on public key update which requires carefully assess the security implications when determining how often to update keys The key pool generated through QKD for multi site communications may appear to be a vulnerable point and needs to be protected
12 WAY FORWARD Need to further explore PQC systems for one pass key establishment schemes It will be valuable to explore possible extensions of multi site network using QKD and understand the advantage of using QKD compared over using post quantum TLS only FPGA implementation data is very valuable for PQC and expect FPGA data on other PQC candidate families
13 ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK 15 SEPTEMBER 2017 SESSION 5: POST QUANTUM CRYPTO
14 HIGHLIGHTS Session focused on different approaches on post quantum cryptography, especially Hash based signature, Multivariante schemes, RLWE based key exchange/authentication, and new type of quantum safe ECC. Scott Fluhrer, Stefan Lukas, talked about a survey of Hashbased signature and their practical usages Jean Charles went through the update progress about a multivariate algr. Jintai gave a new findings about RLWE key exchanges, as well as the robustness of the scheme, and a colleague of Reza showed their new results on quantum safe ECC
15 ISSUES RAISED Scott/Stefan described how to deal with the choice of parameters while security/efficiency trade off are concerned. Stefan also explained if the hybrid model works Jintai emphasized the principle of new robust keyexchange allowing key reuse Colleague of Reza pointed out the possible ways to investigate the quantum safe proof for their schemes
16 ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK SESSION 6 Quantum Key Distribution
17 HIGHLIGHTS C. Chunnilall (NPL) pointed out the importance of traceable measurements to certify QKD security. The first measurement standard of quantum technology was established in ETSI ISG QKD. A. Fedorov (RQC) presented efficient key distillation method and a proposal of quantum secured block chain. B. Huttner (IDQ) : QKD adds a layer of security (not exclusive). For space networks, quantum enhanced physical layer cryptography would be promising.
18 ISSUES RAISED Physical measurements with accuracy and precision need to be developed and applied to certification of QKD security. QKD needs to be efficient and cost effective. QKD has a distance limitation. Satellites will enable broader scale QKD. Protocols and implementation can, however, be simplified by taking into account that space optical link is lineof sight, unlike optical fibres, i.e., Eve s ability of physical access to the channel can be limited.
19 WAY FORWARD Continue to work on QKD implementation security with traceable measurements and to standardize those measurements. Further investigate Q secured authentication, block chain etc. For space networks, not only conventional QKD but also quantum enhanced physical layer cryptography need to be explored for various options (high end security solution, high speed solution with reasonable security assumption).
20 THE 6TH ETSI/IQC QUANTUM SAFE WORKSHOP WELCOME TO BEIJING NOV. 6 8, 2018
21 THE 6TH ETSI/IQC QUANTUM SAFE WORKSHOP Beijing is the culture center of China
22 THE 6TH ETSI/IQC QUANTUM SAFE WORKSHOP Updated progress since the 5 th QSC workshop Keynote speeches PQC+QKD standardization Special issues in quantum resistant algorithms Threats from incoming quantum computer
Quantum threat...and quantum solutions
Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique
More informationThe quantum threat to cryptography
The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How
More informationThe Quantum Threat to Cybersecurity (for CxOs)
The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.
More informationQuantum Technologies: Threats & Solutions to Cybersecurity
Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017 ID Quantique Company Profile
More informationCryptography in a quantum world
T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?
More informationCyber Security in the Quantum Era
T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act
More informationQuantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017
Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M. Mosca New paradigm brings new possibilities Designing
More informationManaging the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016
Managing the quantum risk to cybersecurity Global Risk Institute Michele Mosca 11 April 2016 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental part of safety
More informationPQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel
#RSAC SESSION ID: CRYP-W10 PQ Crypto Panel MODERATOR: Bart Preneel Professor, imec-cosic KU Leuven PANELISTS: Dr. Dan Boneh Professor, Stanford University Michele Mosca Professor, UWaterloo and evolutionq
More informationPost-Quantum Cryptography & Privacy. Andreas Hülsing
Post-Quantum Cryptography & Privacy Andreas Hülsing Privacy? Too abstract? How to achieve privacy? Under the hood... Public-key crypto ECC RSA DSA Secret-key crypto AES SHA2 SHA1... Combination of both
More informationPost-Quantum Cryptography & Privacy. Andreas Hülsing
Post-Quantum Cryptography & Privacy Andreas Hülsing Privacy? Too abstract? How to achieve privacy? Under the hood... Asymmetric Crypto ECC RSA DSA Symmetric Crypto AES SHA2 SHA1... Combination of both
More informationWHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION
WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION Based on the discussion during the respective workshop at the ZEISS Symposium Optics in the Quantum World on 18 April 2018 in Oberkochen, Germany
More informationPOST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW?
POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW? Hanno Böck https://hboeck.de 1 INTRODUCTION Hanno Böck, freelance journalist and hacker. Writing for Golem.de and others. Fuzzing Project, funded
More informationQuantum Communication Networks and Technologies
Groman123, Flickr CC BY-SA Quantum Communication Networks and Technologies Join the conversation on twitter JAKE TAYLOR CHRISTOPH SIMON MARIA SPIROPULU JOSEPH LYKKEN MERCEDES GIMENO-SEGOVIA JAKE TAYLOR
More informationTalk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016
Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Vadim Makarov www.vad1.com/lab Security model of QKD Security proof.laws of physics & Model of equipment Hack Integrate
More informationALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS
SESSION ID: SP02-R14 ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS Jon Geater Chief Technology Officer Thales esecurity @jongeater Hold onto your hats! This is a very fast-paced
More informationQuantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security
Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security Flight plan What s a quantum computer? How broken are your public keys? AES vs. quantum search Hidden quantum powers Defeating quantum computing
More informationThe Quantum Age Technological Opportunities
The Quantum Age Technological Opportunities Sir Mark Walport FRS Government Chief Scientific Adviser ETSI / IQC Quantum Safe Workshop 13 September 2017 Government Chief Scientific Adviser Health, wellbeing,
More informationQuantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge
Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it
More informationOn the Complexity of the Hybrid Approach on HFEv-
On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt National Institute of Standards and Technology, Gaithersburg, Maryland, USA albrecht.petzoldt@gmail.com Abstract. The HFEv- signature
More informationPost-quantum key exchange for the Internet based on lattices
Post-quantum key exchange for the Internet based on lattices Craig Costello Talk at MSR India Bangalore, India December 21, 2016 Based on J. Bos, C. Costello, M. Naehrig, D. Stebila Post-Quantum Key Exchange
More informationCryptographical Security in the Quantum Random Oracle Model
Cryptographical Security in the Quantum Random Oracle Model Center for Advanced Security Research Darmstadt (CASED) - TU Darmstadt, Germany June, 21st, 2012 This work is licensed under a Creative Commons
More informationWhat are we talking about when we talk about post-quantum cryptography?
PQC Asia Forum Seoul, 2016 What are we talking about when we talk about post-quantum cryptography? Fang Song Portland State University PQC Asia Forum Seoul, 2016 A personal view on postquantum cryptography
More informationInformation Security in the Age of Quantum Technologies
www.pwc.ru Information Security in the Age of Quantum Technologies Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes
More informationQuantum Preimage and Collision Attacks on CubeHash
Quantum Preimage and Collision Attacks on CubeHash Gaëtan Leurent University of Luxembourg, Gaetan.Leurent@uni.lu Abstract. In this paper we show a quantum preimage attack on CubeHash-512-normal with complexity
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 15 October 20, 2014 CPSC 467, Lecture 15 1/37 Common Hash Functions SHA-2 MD5 Birthday Attack on Hash Functions Constructing New
More informationEverything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL
Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? Surveillance Problem / Weak Crypto
More informationEU investment in Quantum Technologies
EU investment in Quantum Technologies ENISA Summer School, 26. September2018 Dr. Gustav Kalbe High Performance Computing and Quantum Technologies DG CNECT, European Commission 2 nd Quantumrevolution: manipulating/exploiting
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information by Michael
More informationThe quantum threat to cryptography
The quantum threat to cryptography Ashley Montanaro School of Mathematics, University of Bristol 20 October 2016 Quantum computers University of Bristol IBM UCSB / Google University of Oxford Experimental
More informationFPGA-BASED ACCELERATOR FOR POST-QUANTUM SIGNATURE SCHEME SPHINCS-256
IMES FPGA-BASED ACCELERATOR FOR POST-QUANTUM SIGNATURE SCHEME SPHINCS-256 Dorian Amiet 1, Andreas Curiger 2 and Paul Zbinden 1 1 HSR Hochschule für Technik, Rapperswil, Switzerland 2 Securosys SA, Zürich,
More informationQUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA
QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING: I CAN SUM IT UP IN ONE SLIDE Pure Magic! 2 SERIOUSLY: HOW DOES IT WORK? That s simple: Even
More informationInformation Security
SE 4472 / ECE 9064 Information Security Week 12: Random Number Generators and Picking Appropriate Key Lengths Fall 2015 Prof. Aleksander Essex Random Number Generation Where do keys come from? So far we
More informationSummary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.
The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer
More information+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1
Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction
More informationSummary of Hyperion Research's First QC Expert Panel Survey Questions/Answers. Bob Sorensen, Earl Joseph, Steve Conway, and Alex Norton
Summary of Hyperion Research's First QC Expert Panel Survey Questions/Answers Bob Sorensen, Earl Joseph, Steve Conway, and Alex Norton Hyperion s Quantum Computing Program Global Coverage of R&D Efforts
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 16 October 30, 2017 CPSC 467, Lecture 16 1/52 Properties of Hash Functions Hash functions do not always look random Relations among
More informationQuantum and quantum safe crypto technologies in Europe. Ales Fiala Future and Emerging Technologies European Commission
Quantum and quantum safe crypto technologies in Europe 51214 Ales Fiala Future and Emerging Technologies European Commission Outline o Future and Emerging Technologies (FET) basics o Quantum Technologies
More informationPost Quantum Cryptography. Kenny Paterson Information Security
Post Quantum Cryptography Kenny Paterson Information Security Group @kennyog Lifetime of a Hash Algorithm SHA-1 1995: SHA-1 published (NIST, tweak of 1993 SHA-0 design) 1990s: (various attacks on SHA-0,
More informationQuantum Cryptography
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Quantum Computer
More informationSide-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman
Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman Presenter: Reza Azarderakhsh CEECS Department and I-Sense, Florida Atlantic University razarderakhsh@fau.edu Paper by: Brian
More informationEavesdropping or Disrupting a Communication On the Weakness of Quantum Communications
Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Zhengjun Cao Abstract What is the behavior of an adversary to launch attacks against a communication? The good choice
More informationQuantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018
Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018 What drives a company s digital strategy in 2020 and beyond? Quantum Computing it s the end of the world
More informationStandardization of Quantum Cryptography in China
Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018 CONTENTS 1 Background on Quantum Cryptography
More informationCryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International
Cryptography in the Quantum Era Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Postulate #1: Qubit state belongs to Hilbert space of dimension 2 ψ
More informationQuantum Differential and Linear Cryptanalysis
Quantum Differential and Linear Cryptanalysis Marc Kaplan 1,2 Gaëtan Leurent 3 Anthony Leverrier 3 María Naya-Plasencia 3 1 LTCI, Télécom ParisTech 2 School of Informatics, University of Edinburgh 3 Inria
More informationQuantum Technologies for Cryptography
University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms
More informationQuantum computing with superconducting qubits Towards useful applications
Quantum computing with superconducting qubits Towards useful applications Stefan Filipp IBM Research Zurich Switzerland Forum Teratec 2018 June 20, 2018 Palaiseau, France Why Quantum Computing? Why now?
More informationQuantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace
Quantum Computing Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September 2010 10:00am PST, Teleplace The Hope All computing is constrained by the laws of Physics and
More informationAsymmetric Encryption
-3 s s Encryption Comp Sci 3600 Outline -3 s s 1-3 2 3 4 5 s s Outline -3 s s 1-3 2 3 4 5 s s Function Using Bitwise XOR -3 s s Key Properties for -3 s s The most important property of a hash function
More informationChallenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley
Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying
More informationBreaking Symmetric Cryptosystems Using Quantum Algorithms
Breaking Symmetric Cryptosystems Using Quantum Algorithms Gaëtan Leurent Joined work with: Marc Kaplan Anthony Leverrier María Naya-Plasencia Inria, France FOQUS Workshop Gaëtan Leurent (Inria) Breaking
More informationEverything is Quantum The EU Quantum Flagship
Everything is Quantum The EU Quantum Flagship Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? What
More informationA Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016
More informationQuantum-resistant cryptography
Quantum-resistant cryptography Background: In quantum computers, states are represented as vectors in a Hilbert space. Quantum gates act on the space and allow us to manipulate quantum states with combination
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 7, 2015 CPSC 467, Lecture 11 1/37 Digital Signature Algorithms Signatures from commutative cryptosystems Signatures from
More information1500 AMD Opteron processor (2.2 GHz with 2 GB RAM)
NICT 2019 2019 2 7 1 RSA RSA 2 3 (1) exp $ 64/9 + *(1) (ln 0) 1/2 (ln ln 0) 3/2 (2) 2009 12 768 (232 ) 1500 AMD Opteron processor (2.2 GHz with 2 GB RAM) 4 (3) 18 2 (1) (2) (3) 5 CRYPTREC 1. 2. 3. 1024,
More informationH2020 FET Flagship on Quantum Technologies Infoday
H2020 FET Flagship on Quantum Technologies Infoday Sapienza Università di Roma, 14 dicembre 2017 Jean-François Buggenhout deputy Head of Unit - DG CNECT.C2 High Performance Computing & Quantum Technology
More informationPicnic Post-Quantum Signatures from Zero Knowledge Proofs
Picnic Post-Quantum Signatures from Zero Knowledge Proofs MELISSA CHASE, MSR THE PICNIC TEAM DAVID DERLER STEVEN GOLDFEDER JONATHAN KATZ VLAD KOLESNIKOV CLAUDIO ORLANDI SEBASTIAN RAMACHER CHRISTIAN RECHBERGER
More informationWALNUT DIGITAL SIGNATURE ALGORITHM
WALNUT DIGITAL SIGNATURE ALGORITHM Dorian Goldfeld SecureRF Corporation NATO Post Quantum Cryptography Workshop, September 27, 2016 1 INTRODUCING WALNUTDSA 2 INTRODUCING WALNUTDSA (joint work with Iris
More informationFundamental rate-loss tradeoff for optical quantum key distribution
Fundamental rate-loss tradeoff for optical quantum key distribution Masahiro Takeoka (NICT) Saikat Guha (BBN) Mark M. Wilde (LSU) Quantum Krispy Kreme Seminar @LSU January 30, 2015 Outline Motivation Main
More informationCS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing
Lecture 11: Key Management, Secret Sharing Céline Blondeau Email: celine.blondeau@aalto.fi Department of Computer Science Aalto University, School of Science Key Management Secret Sharing Shamir s Threshold
More informationQuantum Key Distribution and the Future of Encryption
Quantum Key Distribution and the Future of Encryption Konstantinos Karagiannis Global Technical Lead, Ethical Hacking BT Security Amsterdam, October 16 th, 2014 Understanding QM? I think I can safely say
More informationQuantum Cryptography
http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.
More informationQuantum Computing and the Possible Effects on Modern Security Practices
Quantum Computing and the Possible Effects on Modern Security Practices SE 4C03 Winter 2005 Kartik Sivaramakrishnan Researched by: Jeffery Lindner, 9904294 Due: April 04, 2005 Table of Contents Introduction...
More informationBlockchain and Quantum Computing
M T R 1 7 0 4 8 7 M I T R E T E C H N I C A L R E P O R T Blockchain and Quantum Computing Project No.: 25SPI050-12 The views, opinions and/or findings contained in this report are those of The MITRE Corporation
More informationLattice-Based Cryptography
Liljana Babinkostova Department of Mathematics Computing Colloquium Series Detecting Sensor-hijack Attacks in Wearable Medical Systems Krishna Venkatasubramanian Worcester Polytechnic Institute Quantum
More informationReport on Learning with Errors over Rings-based HILA5 and its CCA Security
Report on Learning with Errors over Rings-based HILA5 and its CCA Security Jesús Antonio Soto Velázquez January 24, 2018 Abstract HILA5 is a cryptographic primitive based on lattices that was submitted
More informationCode-based Cryptography
a Hands-On Introduction Daniel Loebenberger Ηράκλειο, September 27, 2018 Post-Quantum Cryptography Various flavours: Lattice-based cryptography Hash-based cryptography Code-based
More informationQuantum Technologies Overview: a few qubitson Sand Hill Rd. IQIM Retreat 2016
Quantum Technologies Overview: a few qubitson Sand Hill Rd IQIM Retreat 2016 Why now? A lot is happening at the intersection of quantum and industry. Are we actually at an inflection point? Today s discussion:
More informationQuantum Communication
Quantum Communication Nicolas Gisin, Hugo Zbinden, Mikael Afzelius Group of Applied Physics Geneva University, Switzerland Nonlocal Secret Randomness Quantum Key Distribution Quantum Memories and Repeaters
More informationDevice-Independent Quantum Information Processing
Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information
More informationAdvanced Cryptography Quantum Algorithms Christophe Petit
The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat
More informationFast, Quantum-Resistant Public-Key Solutions for Constrained Devices Using Group Theoretic Cryptography
Fast, Quantum-Resistant Public-Key Solutions for Constrained Devices Using Group Theoretic Cryptography International Cryptographic Module Conference May 18, 2017 Derek Atkins, Chief Technology Officer
More informationQuantum-secure symmetric-key cryptography based on Hidden Shifts
Quantum-secure symmetric-key cryptography based on Hidden Shifts Gorjan Alagic QMATH, Department of Mathematical Sciences University of Copenhagen Alexander Russell Department of Computer Science & Engineering
More informationLecture 1: Introduction to Public key cryptography
Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means
More informationRisk management and the quantum threat
LEIDEN UNIVERSITY Risk management and the quantum threat Understanding the requirements to run Shor s algorithm to break RSA with a 2048 bit key and how to use this information to protect against the quantum
More informationFramework on reducing diffuse pollution from agriculture perspectives from catchment managers
Framework on reducing diffuse pollution from agriculture perspectives from catchment managers Photo: River Eden catchment, Sim Reaney, Durham University Introduction This framework has arisen from a series
More informationApplications of Quantum Key Distribution (QKD)
Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,
More informationIntro to Public Key Cryptography Diffie & Hellman Key Exchange
Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie & Hellman Key Exchange Course Summary - Math Part
More informationRealization of B92 QKD protocol using id3100 Clavis 2 system
Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and
More informationAPPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD
2016/2500M-0054 ISSN 1797-3457 (verkkojulkaisu) ISBN (PDF) 978-951-25-2850-9 SUMMARY REPORT APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD Ilkka Tittonen, professor, Department of Micro- and
More informationQuantum Key Distribution. The Starting Point
Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated
More informationFoundations of Network and Computer Security
Foundations of Network and Computer Security John Black Lecture #5 Sep 7 th 2004 CSCI 6268/TLEN 5831, Fall 2004 Announcements Please sign up for class mailing list by end of today Quiz #1 will be on Thursday,
More informationThe science behind these computers originates in
A Methodology for Quantum Risk Assessment Author: Dr. Michele Mosca & John Mulholland DISRUPTIVE TECHNOLOGY INTRODUCTION Until recently, quantum computing was often viewed as a capability that might emerge
More informationBeyond the MD5 Collisions
Beyond the MD5 Collisions Daniel Joščák Daniel.Joscak@i.cz S.ICZ a.s. Hvězdova 1689/2a, 140 00 Prague 4; Faculty of Mathematics and Physics, Charles University, Prague Abstract We summarize results and
More informationThe odd couple: MQV and HMQV
The odd couple: MQV and HMQV Jean-Philippe Aumasson 1 / 49 Summary MQV = EC-DH-based key agreement protocol, proposed by Menezes, Qu and Vanstone (1995), improved with Law and Solinas (1998), widely standardized
More informationQuantum Computing: From Science to Application Dr. Andreas Fuhrer Quantum technology, IBM Research - Zurich
Quantum Computing: From Science to Application Dr. Andreas Fuhrer Quantum technology, IBM Research - Zurich IBM Research - Zurich Established in 1956 Focus: science & technology, systems research, computer
More informationElliptic Curves and Cryptography
Elliptic Curves and Cryptography Aleksandar Jurišić Alfred J. Menezes March 23, 2005 Elliptic curves have been intensively studied in number theory and algebraic geometry for over 100 years and there is
More informationNanocrystalline Cellulose:
Nanocrystalline Cellulose: International Standardization & Metrological Approaches Alan Steele National Research Council Institute for National Measurement Standards TAPPI International Conference on Nano
More informationC. QUANTUM INFORMATION 111
C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i
More informationImproving Disk Sector Integrity Using 3-dimension Hashing Scheme
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme Zoe L. Jiang, Lucas C.K. Hui, K.P. Chow, S.M. Yiu and Pierre K.Y. Lai Department of Computer Science The University of Hong Kong, Hong Kong
More informationQuantum Computing Industry, Technologies & Business Opportunities. Industry 4.0 Research
2018-2024 Quantum Computing Industry, Technologies & Business Opportunities Industry 4.0 Research Quantum Computing Industry, Technologies & Business Opportunities 2018-2024 Industry 4.0 Research (A division
More informationReassessing Grover s Algorithm
Reassessing Grover s Algorithm Scott Fluhrer Cisco Systems, USA sfluhrer@cisco.com Abstract. We note that Grover s algorithm (and any other quantum algorithm that does a search using an oracle) does not
More informationStream ciphers. Pawel Wocjan. Department of Electrical Engineering & Computer Science University of Central Florida
Stream ciphers Pawel Wocjan Department of Electrical Engineering & Computer Science University of Central Florida wocjan@eecs.ucf.edu Definition of block ciphers Block ciphers: crypto work horse n bits
More informationLEADING THE EVOLUTION OF COMPUTE MARK KACHMAREK HPC STRATEGIC PLANNING MANAGER APRIL 17, 2018
LEADING THE EVOLUTION OF COMPUTE MARK KACHMAREK HPC STRATEGIC PLANNING MANAGER APRIL 17, 2018 INTEL S RESEARCH EFFORTS COMPONENTS RESEARCH INTEL LABS ENABLING MOORE S LAW DEVELOPING NOVEL INTEGRATION ENABLING
More informationCRYPTANALYSIS OF COMPACT-LWE
SESSION ID: CRYP-T10 CRYPTANALYSIS OF COMPACT-LWE Jonathan Bootle, Mehdi Tibouchi, Keita Xagawa Background Information Lattice-based cryptographic assumption Based on the learning-with-errors (LWE) assumption
More informationPractical, Quantum-Secure Key Exchange from LWE
Practical, Quantum-Secure Key Exchange from LWE Douglas Stebila 4 th ETSI/IQC Workshop on Quantum-Safe Cryptography September 21, 2016 Acknowledgements Collaborators Joppe Bos Craig Costello and Michael
More informationBEYOND POST QUANTUM CRYPTOGRAPHY
BEYOND POST QUANTUM CRYPTOGRAPHY Mark Zhandry Stanford University Joint work with Dan Boneh Classical Cryptography Post-Quantum Cryptography All communication stays classical Beyond Post-Quantum Cryptography
More informationQuantum Computing is Here, Powered by Open Source. Konstantinos Karagiannis CTO, Security Consulting BT
Quantum Computing is Here, Powered by Open Source Konstantinos Karagiannis CTO, Security Consulting BT Americas @KonstantHacker It all started with the need to crack encryption We re there again Snowden
More information