Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018
|
|
- Lorena Bailey
- 5 years ago
- Views:
Transcription
1 Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018
2 What drives a company s digital strategy in 2020 and beyond? Quantum Computing it s the end of the world as we know it? July
3 What drives a company s digital strategy in 2020 and beyond? INTERNET OF THINGS? Quantum Computing it s the end of the world as we know it? July
4 What drives a company s digital strategy in 2020 and beyond? CYBER ATTACKS? Quantum Computing it s the end of the world as we know it? July
5 What drives a company s digital strategy in 2020 and beyond? BITCOIN? Quantum Computing it s the end of the world as we know it? July
6 What drives a company s digital strategy in 2020 and beyond? DIGITAL TRANSFORMATION? Quantum Computing it s the end of the world as we know it? July
7 What drives a company s digital strategy in 2020 and beyond? Regardless of what drives your digital strategy it will be based on digital identities authentication of these identities secret communication all driven by digital certificates and encryption! Quantum Computing it s the end of the world as we know it? July
8 And then comes Quantum Computing Quantum computing is coming for your data! Quantum Computing it s the end of the world as we know it? July
9 Who are we and why do we care? Quantum Computing it s the end of the world as we know it?
10 Giesecke+Devrient creating confidence since 1852 Founded 1852 > 11,000 employees > 2 billion revenue Quantum Computing it s the end of the world as we know it?
11 G+D provides secure solutions for customers in four major playing fields Payment Connectivity Identity Digital security Global leader in physical, electronic and digital payments Secure connectivity as a gateway to the Internet of Things Safeguarding personal identities and authentication Protecting classified data, communication channels & critical infrastructures Security G+D makes the lives of billions of people more secure Quantum Computing it s the end of the world as we know it?
12 The digital world is build on encryption Quantum Computing it s the end of the world as we know it? July
13 How does classical encryption work? Symmetric encryption Asymmetric encryption Examples: AES, DES Examples: RSA, ECC Quantum Computing it s the end of the world as we know it? July
14 Where you would use encryption and certificates in a mobile banking environment? storage Payment Backend Service Portal Build Portal Code security symmetric storage BANKING App BANKING API OS identity encryption Payment Reporting Development asymmetric certificates and what they are used for identity ios or Android identity encryption Bank Server Accounting encryption Build Server Admin Quantum Computing it s the end of the world as we know it? July
15 OK, encryption is well understood and widely used so we are safe, right? Quantum Computing it s the end of the world as we know it? July
16 Quantum computing has the potential to shake digital encryption to the core Remember this marvel? So what makes it so fundamentally different? Quantum Computing it s the end of the world as we know it? July
17 The fundamental difference in quantum computing are the Qubits Classical bits Qubits 0 0 Impact When using Qubits, multiple operations can happen simultaneously Clear-cut, either 1 or 0, on or off 1 1 Multiple states at the same time ( superposition ) Dramatic speedup of certain calculations compared to classical bits Quantum Computing it s the end of the world as we know it? July
18 Today s encryption will be effectively broken by quantum computers Effective key strengths Encryption type Algorithm Today: classical Future: quantum Asymmetric RSA-1024 RSA Symmetric ECC-256 ECC-521 AES-128 AES ! SHA Quantum Computing it s the end of the world as we know it? July
19 Runtime It is expected that one day, quantum computers will outperform classical ones Quantum computing Classical computing As number of useable qubits will increase, quantum computing will be able to solve problems that classical computers can not: Quantum Supremacy Number of qubits Quantum Computing it s the end of the world as we know it? July
20 Number of qubits have been steadily increasing Qubits Year Quantum Computing it s the end of the world as we know it? July
21 Time to panic? Not yet! Quantum Computing it s the end of the world as we know it? July
22 Currently, qubits are very hard to scale and show high error rates Obstacles to build and run requires intensive cooling depends on high amount of magnetic shielding consumes a lot of energy In practice high error rates, reducing the effectiveness of the qubits! Quantum Computing it s the end of the world as we know it? July
23 These obstacles still prevent breaking of today s encryption Question Approach How large is very large? How would one break a RSA key? Take a given very large number A and find its two factors B and C A = B * C RSA-2048 = What is the largest number factored using qubits and Shor s algorithm? 21 By the way, solution is 21 = 3 * 7 Quantum Computing it s the end of the world as we know it? July
24 But we should still take it seriously The National Security Agency is advising US agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually all , medical and financial records, and online transactions is rendered obsolete by quantum computing. Quantum Computing it s the end of the world as we know it? July
25 Actions to take to protect your customers and your organization 1 Follow announcements on recent developments, both from academia and the industry As new standards for 2 Identify the critical elements in your infrastructure depending on encryption post-quantum cryptography are being developed, here is what you can do Per element, assess risks (potential damage) and effort to adapt Start drafting a transition plan in order to be prepared once new standards are published Be aware but don t panic Quantum Computing it s the end of the world as we know it? July
26 Questions & Answers Dr. Philipp Schulte Corp. Development & Strategy G+D Group Dr. Christian Schläger Product Management Cyber Security G+D Mobile Security Quantum Computing it s the end of the world as we know it? July
27
ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS
SESSION ID: SP02-R14 ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS Jon Geater Chief Technology Officer Thales esecurity @jongeater Hold onto your hats! This is a very fast-paced
More informationThe Quantum Threat to Cybersecurity (for CxOs)
The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.
More informationPost-Quantum Cryptography & Privacy. Andreas Hülsing
Post-Quantum Cryptography & Privacy Andreas Hülsing Privacy? Too abstract? How to achieve privacy? Under the hood... Public-key crypto ECC RSA DSA Secret-key crypto AES SHA2 SHA1... Combination of both
More informationPost-Quantum Cryptography & Privacy. Andreas Hülsing
Post-Quantum Cryptography & Privacy Andreas Hülsing Privacy? Too abstract? How to achieve privacy? Under the hood... Asymmetric Crypto ECC RSA DSA Symmetric Crypto AES SHA2 SHA1... Combination of both
More informationWhite paper Quantum computing in financial services
White paper Quantum computing in financial services There is no shortage of theoretical applications of quantum computing, at a grand scale, that approaches science fiction. How will it really affect the
More informationQuantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017
Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M. Mosca New paradigm brings new possibilities Designing
More informationThe science behind these computers originates in
A Methodology for Quantum Risk Assessment Author: Dr. Michele Mosca & John Mulholland DISRUPTIVE TECHNOLOGY INTRODUCTION Until recently, quantum computing was often viewed as a capability that might emerge
More informationInformation Security in the Age of Quantum Technologies
www.pwc.ru Information Security in the Age of Quantum Technologies Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes
More informationThe quantum threat to cryptography
The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How
More informationManaging the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016
Managing the quantum risk to cybersecurity Global Risk Institute Michele Mosca 11 April 2016 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental part of safety
More informationWhat are we talking about when we talk about post-quantum cryptography?
PQC Asia Forum Seoul, 2016 What are we talking about when we talk about post-quantum cryptography? Fang Song Portland State University PQC Asia Forum Seoul, 2016 A personal view on postquantum cryptography
More informationQuantum Cryptography
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Quantum Computer
More informationFIS' Partnership with Zelle for P2P Payments
FIS' Partnership with Zelle for P2P Payments Chris Burfield, SVP, Digital Market Strategy Norman Marraccini, VP, Director of Digital Payment Product Strategy & Marketing Peter Tapling, Chief Revenue Officer,
More informationQuantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security
Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security Flight plan What s a quantum computer? How broken are your public keys? AES vs. quantum search Hidden quantum powers Defeating quantum computing
More informationCyber Security in the Quantum Era
T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act
More informationLattice-Based Cryptography
Liljana Babinkostova Department of Mathematics Computing Colloquium Series Detecting Sensor-hijack Attacks in Wearable Medical Systems Krishna Venkatasubramanian Worcester Polytechnic Institute Quantum
More informationAlternative Approaches: Bounded Storage Model
Alternative Approaches: Bounded Storage Model A. Würfl 17th April 2005 1 Motivation Description of the Randomized Cipher 2 Motivation Motivation Description of the Randomized Cipher Common practice in
More informationInt er net Saf et y Tip s
BE CAREFUL AS: Facebook oft en means People oft en pret end t o be people t hey are not so be wary of t his!! Int er net Saf et y Tip s N ever accept people you do not know. Never give out your real name
More informationEverything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL
Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? Surveillance Problem / Weak Crypto
More informationQuantum technology popular science description
Quantum technology popular science description 1 Quantum physics, from theory to ongoing revolution In the early 1900s observations were made that were not consistent with traditional, classical physics.
More informationQuantum Technologies: Threats & Solutions to Cybersecurity
Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017 ID Quantique Company Profile
More informationErrors, Eavesdroppers, and Enormous Matrices
Errors, Eavesdroppers, and Enormous Matrices Jessalyn Bolkema September 1, 2016 University of Nebraska - Lincoln Keep it secret, keep it safe Public Key Cryptography The idea: We want a one-way lock so,
More informationLogic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation
Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate
More informationPQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel
#RSAC SESSION ID: CRYP-W10 PQ Crypto Panel MODERATOR: Bart Preneel Professor, imec-cosic KU Leuven PANELISTS: Dr. Dan Boneh Professor, Stanford University Michele Mosca Professor, UWaterloo and evolutionq
More informationPublic-key Cryptography and elliptic curves
Public-key Cryptography and elliptic curves Dan Nichols nichols@math.umass.edu University of Massachusetts Oct. 14, 2015 Cryptography basics Cryptography is the study of secure communications. Here are
More informationQuantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge
Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it
More informationQuantum threat...and quantum solutions
Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique
More informationL7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015
L7. Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang, 5 March 2015 1 Outline The basic foundation: multiplicative group modulo prime The basic Diffie-Hellman (DH) protocol The discrete logarithm
More informationCryptography and Security Final Exam
Cryptography and Security Final Exam Serge Vaudenay 17.1.2017 duration: 3h no documents allowed, except one 2-sided sheet of handwritten notes a pocket calculator is allowed communication devices are not
More informationFast, Quantum-Resistant Public-Key Solutions for Constrained Devices Using Group Theoretic Cryptography
Fast, Quantum-Resistant Public-Key Solutions for Constrained Devices Using Group Theoretic Cryptography International Cryptographic Module Conference May 18, 2017 Derek Atkins, Chief Technology Officer
More informationCryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International
Cryptography in the Quantum Era Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Postulate #1: Qubit state belongs to Hilbert space of dimension 2 ψ
More informationQuantum Differential and Linear Cryptanalysis
Quantum Differential and Linear Cryptanalysis Marc Kaplan 1,2 Gaëtan Leurent 3 Anthony Leverrier 3 María Naya-Plasencia 3 1 LTCI, Télécom ParisTech 2 School of Informatics, University of Edinburgh 3 Inria
More informationF L I G H T R I S K I N M & A : T H E A R T A N D S C I E N C E O F R E T A I N I N G T A L E N T
H E A L T H W E A L T H C A R E E R F L I G H T R I S K I N M & A : T H E A R T A N D S C I E N C E O F R E T A I N I N G T A L E N T M E R C E R S 2 0 1 7 R E S E A R C H R E P O R T MARCH 30, 2017 Ursula
More informationThe Quantum Age Technological Opportunities
The Quantum Age Technological Opportunities Sir Mark Walport FRS Government Chief Scientific Adviser ETSI / IQC Quantum Safe Workshop 13 September 2017 Government Chief Scientific Adviser Health, wellbeing,
More informationA brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago
A brief survey of post-quantum cryptography D. J. Bernstein University of Illinois at Chicago Once the enormous energy boost that quantum computers are expected to provide hits the street, most encryption
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationQuantum Cryptography. Marshall Roth March 9, 2007
Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and
More information19. Coding for Secrecy
19. Coding for Secrecy 19.1 Introduction Protecting sensitive information from the prying eyes and ears of others is an important issue today as much as it has been for thousands of years. Government secrets,
More informationA brief survey on quantum computing
A brief survey on quantum computing Edward Poon University of Ottawa Edward Poon (Ottawa) A brief survey on quantum computing March 19, 2018 1 / 7 Outline Goal: Provide a high-level overview of what quantum
More informationLimits and Future of Computing Where do we go from here?
Limits and Future of Computing Where do we go from here? Notes for CSC 100 - The Beauty and Joy of Computing The University of North Carolina at Greensboro Back to Algorithms... Recall that algorithms
More informationCryptography in a quantum world
T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?
More information10 - February, 2010 Jordan Myronuk
10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States
More informationRSA ENCRYPTION USING THREE MERSENNE PRIMES
Int. J. Chem. Sci.: 14(4), 2016, 2273-2278 ISSN 0972-768X www.sadgurupublications.com RSA ENCRYPTION USING THREE MERSENNE PRIMES Ch. J. L. PADMAJA a*, V. S. BHAGAVAN a and B. SRINIVAS b a Department of
More informationStandardization of Quantum Cryptography in China
Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018 CONTENTS 1 Background on Quantum Cryptography
More informationThe Two Time Pad Encryption System
Hardware Random Number Generators This document describe the use and function of a one-time-pad style encryption system for field and educational use. You may download sheets free from www.randomserver.dyndns.org/client/random.php
More informationARGUS.net IS THREE SOLUTIONS IN ONE
OVERVIEW H i g h l y c o n f i g u r a b l e s o f t w a r e a c c o m m o d a t e s a w i d e r a n g e o f c o l l e c t i o n s T h r e e s o l u t i o n s c o v e r P o r t a l s, C o l l e c t i o
More informationQuantum Wireless Sensor Networks
Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.
More informationEvaluating e-government : implementing GIS services in Municipality
Evaluating e-government : implementing GIS services in Municipality Municipality of Thessaloniki - G.I.S. Unit Misirloglou Symeon Head of the GIS Unit ESRI UC - 2016 The GIS Section - subset of the department
More informationWeb GIS: Architectural Patterns and Practices. Shannon Kalisky Philip Heede
Web GIS: Architectural Patterns and Practices Shannon Kalisky Philip Heede Web GIS Transformation of the ArcGIS Platform Desktop Apps Server GIS Web Maps Web Scenes Layers Web GIS Transformation of the
More informationFrom NewHope to Kyber. Peter Schwabe April 7, 2017
From NewHope to Kyber Peter Schwabe peter@cryptojedi.org https://cryptojedi.org April 7, 2017 In the past, people have said, maybe it s 50 years away, it s a dream, maybe it ll happen sometime. I used
More informationLand Board, NW Services and SDI Tambet Tiits, FRICS
Land Board, NW Services and SDI Tambet Tiits, FRICS 07.09.2016 200th anniversary of the Struve Geodetic Arc Friedrich Georg Wilhelm Struve and Carl Friedrich Tenner Struve Geodetic Arc The Struve Geodetic
More informationEsri and GIS Education
Esri and GIS Education Organizations Esri Users 1,200 National Government Agencies 11,500 States & Regional Agencies 30,800 Cities & Local Governments 32,000 Businesses 8,500 Utilities 12,600 NGOs 11,000
More informationYour Computer is Leaking. Ian J. Malloy.
Your Computer is Leaking Ian J. Malloy Dennis Hollenbeck, 149 W Managed Services dennis.hollenbeck@149w-managed-services.com Abstract This presentation focuses on differences between quantum computing
More informationT H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T WO R K
1 T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T WO R K Manoj Sharma Technical Director Symantec Corp Mark Sanders Lead Security Architect Venafi T H R E A T S A R E
More informationFPGA-BASED ACCELERATOR FOR POST-QUANTUM SIGNATURE SCHEME SPHINCS-256
IMES FPGA-BASED ACCELERATOR FOR POST-QUANTUM SIGNATURE SCHEME SPHINCS-256 Dorian Amiet 1, Andreas Curiger 2 and Paul Zbinden 1 1 HSR Hochschule für Technik, Rapperswil, Switzerland 2 Securosys SA, Zürich,
More informationQuantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )
Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson
More informationSolution to Midterm Examination
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Handout #13 Xueyuan Su November 4, 2008 Instructions: Solution to Midterm Examination This is a closed book
More informationWeb GIS & ArcGIS Pro. Zena Pelletier Nick Popovich
Web GIS & ArcGIS Pro Zena Pelletier Nick Popovich Web GIS Transformation of the ArcGIS Platform Desktop Apps GIS Web Maps Web Scenes Layers Evolution of the modern GIS Desktop GIS (standalone GIS) GIS
More informationAndroid Security Mechanisms
Android Security Mechanisms Lecture 8 Operating Systems Practical 7 December 2016 This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license,
More informationPost-quantum RSA. We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity
We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity Daniel J. Bernstein Joint work with: Nadia Heninger Paul Lou Luke Valenta The referees are questioning applicability...
More informationQUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA
QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING: I CAN SUM IT UP IN ONE SLIDE Pure Magic! 2 SERIOUSLY: HOW DOES IT WORK? That s simple: Even
More informationNumber Theory in Cryptography
Number Theory in Cryptography Introduction September 20, 2006 Universidad de los Andes 1 Guessing Numbers 2 Guessing Numbers (person x) (last 6 digits of phone number of x) 3 Guessing Numbers (person x)
More informationArcGIS Deployment Pattern. Azlina Mahad
ArcGIS Deployment Pattern Azlina Mahad Agenda Deployment Options Cloud Portal ArcGIS Server Data Publication Mobile System Management Desktop Web Device ArcGIS An Integrated Web GIS Platform Portal Providing
More informationCryptographic Hash Functions
Cryptographic Hash Functions Çetin Kaya Koç koc@ece.orst.edu Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331 Technical Report December 9, 2002 Version 1.5 1 1 Introduction
More informationHacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security
Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers
More informationSnow Cover. Snow Plowing and Removal Services Best Practices Guide. l
Snow Cover Snow Plowing and Removal Services Best Practices Guide 2015 2016 www.hortica.com l 800.851.7740 During a recent trip to upstate NY, Hortica Loss Control representatives met with several insureds
More informationPost Quantum Cryptography. Kenny Paterson Information Security
Post Quantum Cryptography Kenny Paterson Information Security Group @kennyog Lifetime of a Hash Algorithm SHA-1 1995: SHA-1 published (NIST, tweak of 1993 SHA-0 design) 1990s: (various attacks on SHA-0,
More informationSummary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.
The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer
More informationThe Elliptic Curve in https
The Elliptic Curve in https Marco Streng Universiteit Leiden 25 November 2014 Marco Streng (Universiteit Leiden) The Elliptic Curve in https 25-11-2014 1 The s in https:// HyperText Transfer Protocol
More informationDaniel J. Bernstein University of Illinois at Chicago. means an algorithm that a quantum computer can run.
Quantum algorithms 1 Daniel J. Bernstein University of Illinois at Chicago Quantum algorithm means an algorithm that a quantum computer can run. i.e. a sequence of instructions, where each instruction
More informationSPHINCS: practical stateless hash-based signatures
SPHINCS: practical stateless hash-based signatures D. J. Bernstein, D. Hopwood, A. Hülsing, T. Lange, R. Niederhagen, L. Papachristodoulou, P. Schwabe, and Z. Wilcox O'Hearn Digital Signatures are Important!
More informationIntroduction to Cryptography. Susan Hohenberger
Introduction to Cryptography Susan Hohenberger 1 Cryptography -- from art to science -- more than just encryption -- essential today for non-military applications 2 Symmetric Crypto Shared secret K =>
More informationCIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography
CIS 6930/4930 Computer and Network Security Topic 5.2 Public Key Cryptography 1 Diffie-Hellman Key Exchange 2 Diffie-Hellman Protocol For negotiating a shared secret key using only public communication
More informationLEGAL DISCLAIMER. APG Coin (APG) White Paper (hereinafter 'the White Paper', 'the Document') is presented for informational purposes only
LEGAL DISCLAIMER THIS DOCUMENT DOES NOT GIVE PERSONAL LEGAL OR FINANCIAL ADVICE. YOU ARE STRONGLY ENCOURAGED TO SEEK YOUR OWN PROFESSIONAL LEGAL AND FINANCIAL ADVICE. APG Coin (APG) White Paper (hereinafter
More informationNumber theory (Chapter 4)
EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?
More informationQuantum Cryptography
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland
More informationLecture 15: Randomness
Lecture 15: Randomness CS105: Great Insights in Computer Science Michael L. Littman, Fall 2006 Voting Machines Average of List Let s say we ve got a list of n small integers (n = 10,000,000,000, for example).
More informationExperimental Study of DIGIPASS GO3 and the Security of Authentication
Experimental Study of DIGIPASS GO3 and the Security of Authentication Igor Semaev Department of Informatics, University of Bergen, Norway e-mail: igor@ii.uib.no arxiv:1506.06332v1 [cs.cr] 21 Jun 2015 Abstract.
More informationThe Reality of Quantum Computing
The Reality of Quantum Computing Now and in the Future @qant Christoph Lameter Jump Trading LLC Great Expectations But the current state: Wild West Funding: Governments see a chance to win
More informationWeb GIS Deployment for Administrators. Vanessa Ramirez Solution Engineer, Natural Resources, Esri
Web GIS Deployment for Administrators Vanessa Ramirez Solution Engineer, Natural Resources, Esri Agenda Web GIS Concepts Web GIS Deployment Patterns Components of an On-Premises Web GIS Federation of Server
More informationQuantum Strangeness In Unexpected Places. Aash Clerk ! +!
Quantum Strangeness In Unexpected Places Aash Clerk! +! Schrodinger s Homer? Can we make large objects act in strange quantum ways? Quantum computers? When can I buy one? Quantum Weirdness? Quantum mechanics
More informationBreaking Symmetric Cryptosystems Using Quantum Algorithms
Breaking Symmetric Cryptosystems Using Quantum Algorithms Gaëtan Leurent Joined work with: Marc Kaplan Anthony Leverrier María Naya-Plasencia Inria, France FOQUS Workshop Gaëtan Leurent (Inria) Breaking
More informationGeospatial natural disaster management
Geospatial natural disaster management disasters happen. are you ready? Natural disasters can strike almost anywhere at any time, with no regard to a municipality s financial resources. These extraordinarily
More informationCryptographical Security in the Quantum Random Oracle Model
Cryptographical Security in the Quantum Random Oracle Model Center for Advanced Security Research Darmstadt (CASED) - TU Darmstadt, Germany June, 21st, 2012 This work is licensed under a Creative Commons
More informationQuantum Computing is Here, Powered by Open Source. Konstantinos Karagiannis CTO, Security Consulting BT
Quantum Computing is Here, Powered by Open Source Konstantinos Karagiannis CTO, Security Consulting BT Americas @KonstantHacker It all started with the need to crack encryption We re there again Snowden
More informationA central problem in cryptography: the key distribution problem.
Scientific American 314, 48-55 (2016) A central problem in cryptography: the key distribution problem. Mathematics solution: public key cryptography. Public-key cryptography relies on the computational
More informationCLICK HERE TO KNOW MORE
CLICK HERE TO KNOW MORE GeoSpace for Singapore s Whole-of-Government Data Sharing Asia GeoSpatial Forum 17 19 Oct 2011 Lee Kim Haw Singapore Land Authority Introducing Singapore Land Authority Limited
More informationInnovation in Land Management: Integrated Solutions For National Cadastre Projects
Success With GIS Innovation in Land Management: Integrated Solutions For National Cadastre Projects XXIII International FIG Congress Munich These documents are only complete, when used in connection with
More informationChapter 4 Asymmetric Cryptography
Chapter 4 Asymmetric Cryptography Introduction Encryption: RSA Key Exchange: Diffie-Hellman [NetSec/SysSec], WS 2008/2009 4.1 Asymmetric Cryptography General idea: Use two different keys -K and +K for
More informationAsymmetric Cryptography
Asymmetric Cryptography Chapter 4 Asymmetric Cryptography Introduction Encryption: RSA Key Exchange: Diffie-Hellman General idea: Use two different keys -K and +K for encryption and decryption Given a
More informationArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D
ArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D ArcGIS Earth is ArcGIS Earth is a lightweight globe desktop application that helps you explore any part of the world and investigate
More informationAsymmetric Encryption
-3 s s Encryption Comp Sci 3600 Outline -3 s s 1-3 2 3 4 5 s s Outline -3 s s 1-3 2 3 4 5 s s Function Using Bitwise XOR -3 s s Key Properties for -3 s s The most important property of a hash function
More informationVIDEO Intypedia008en LESSON 8: SECRET SHARING PROTOCOL. AUTHOR: Luis Hernández Encinas. Spanish Scientific Research Council in Madrid, Spain
VIDEO Intypedia008en LESSON 8: SECRET SHARING PROTOCOL AUTHOR: Luis Hernández Encinas Spanish Scientific Research Council in Madrid, Spain Hello and welcome to Intypedia. We have learned many things about
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 16 October 30, 2017 CPSC 467, Lecture 16 1/52 Properties of Hash Functions Hash functions do not always look random Relations among
More informationQuantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles
Quantum Computation 650 Spring 2009 Lectures 1-21 The World of Quantum Information Marianna Safronova Department of Physics and Astronomy February 10, 2009 Outline Quantum Information: fundamental principles
More informationPublic-key Cryptography and elliptic curves
Public-key Cryptography and elliptic curves Dan Nichols University of Massachusetts Amherst nichols@math.umass.edu WINRS Research Symposium Brown University March 4, 2017 Cryptography basics Cryptography
More informationOman NSDI Supporting Economic Development. Saud Al-Nofli Director of Spatial Data Directorate General of NSDI, NCSI
Oman NSDI Supporting Economic Development 2017 Saud Al-Nofli Director of Spatial Data Directorate General of NSDI, NCSI "It s critical to make correct decisions the first time to optimize the Investments
More informationL E A D I N G T H E C O M P U T I N G R E V O L U T I O N
L E A D I N G T H E COMPUTING REVOLUTION 22 SAFE HARBOR Statements in this presentation that are not descriptions of historical facts are forwardlooking statements relating to future events, and as such
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationCRYSTALS Kyber and Dilithium. Peter Schwabe February 7, 2018
CRYSTALS Kyber and Dilithium Peter Schwabe peter@cryptojedi.org https://cryptojedi.org February 7, 2018 Crypto today 5 building blocks for a secure channel Symmetric crypto Block or stream cipher (e.g.,
More information