Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

Similar documents
The Quantum Threat to Cybersecurity (for CxOs)

The quantum threat to cryptography

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel

The science behind these computers originates in

Quantum Cryptography

Evolution of Cryptography April 25 th 2017

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Quantum Technologies: Threats & Solutions to Cybersecurity

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Information Security in the Age of Quantum Technologies

Risk management and the quantum threat

Identifying and Analyzing Implicit Interactions in Critical Infrastructure Systems

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

Lattice-Based Cryptography

Random Number Generation Is Getting Harder It s Time to Pay Attention

Information Security

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW?

The quantum threat to cryptography

GeoComply Overview. 666 Burrard Street, Suite 1530, Vancouver BC V6C 2X8

Entanglement and Quantum Key Distribution at ESA

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

Blockchain and Quantum Computing

2014 Russell County Hazard Mitigation Plan Update STAKEHOLDERS AND TECHNICAL ADVISORS MEETING 2/6/14

White paper Quantum computing in financial services

Cyber Security in the Quantum Era

Quantum Computing and the Possible Effects on Modern Security Practices

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

Foundations of Network and Computer Security

Climate Risk Visualization for Adaptation Planning and Emergency Response

Cryptographic Hash Functions

America must act to protect its power grid

Cryptography in a quantum world

Selecting Elliptic Curves for Cryptography Real World Issues

POLICY ISSUE (INFORMATION)

FIS' Partnership with Zelle for P2P Payments

Orford Completes Phase 1 Exploration Program and Generates High-Quality Drill Targets on its Carolina Gold Properties

On error distributions in ring-based LWE

Quantum Cryptography

1500 AMD Opteron processor (2.2 GHz with 2 GB RAM)

FLORENCE AFTERMATH PAYNE INSTITUTE COMMENTARY SERIES: VIEWPOINT. Can the Power Outages Be Seen from Space?

Public Key Cryptography

Practical, Quantum-Secure Key Exchange from LWE

Everything is Quantum The EU Quantum Flagship

PKCS #1 v2.0 Amendment 1: Multi-Prime RSA

City of Manitou Springs

An Introduction to Elliptic Curve Cryptography

GEO Geohazards Community of Practice

Side Channel Analysis and Protection for McEliece Implementations

An Introduction to Day Two. Linking Conservation and Transportation Planning Lakewood, Colorado August 15-16, 16, 2006

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security

ACCA Interactive Timetable

CustomWeather Statistical Forecasting (MOS)

Internal Audit Report

ACCA Interactive Timetable

Quantum Wireless Sensor Networks

Your Computer is Leaking. Ian J. Malloy.

CIMA Professional

CIMA Professional

Table Of Contents. ! 1. Introduction to Quantum Computing. ! 2. Physical Implementation of Quantum Computers

28 March Sent by to: Consultative Document: Fundamental review of the trading book 1 further response

For Excellence in Organic Chemistry

ACCA Interactive Timetable

A Summary of the Galaxy 15 Incident and its Impact on Space Sustainability

Foundations of Network and Computer Security

Water Data Sharing an Update

An Original Numerical Factorization Algorithm

On the Key-collisions in the Signature Schemes

2018 Project Prioritization and Budgeting Process

Space Weather & Critical Infrastructures

ACCA Interactive Timetable & Fees

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

ACCA Interactive Timetable & Fees

Enabling Web GIS. Dal Hunter Jeff Shaner

C L O U D S E C U R I T Y A L L I A N C E : W H E R E W E A R E & W H E R E W E A R E G O I N G

SpyMeSat Mobile App. Imaging Satellite Awareness & Access

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable & Fees

Extreme Temperature Protocol in Middlesex-London

ACCA Interactive Timetable & Fees

ACCA Interactive Timetable

Elliptic Curves and Cryptography

Outage Coordination and Business Practices

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago

Week 12: Hash Functions and MAC

ACCA Interactive Timetable

ACCA Interactive Timetable & Fees

Quantum threat...and quantum solutions

SPHINCS: practical stateless hash-based signatures

16th Year. In-Class Grade 6 Astronomy & Flight Workshops

ACCA Interactive Timetable & Fees

Attacking the ECDLP with Quantum Computing

Dr. Steven Koch Director, NOAA National Severe Storms Laboratory Chair, WRN Workshop Executive Committee. Photo Credit: Associated Press

CIMA Dates and Prices Online Classroom Live September August 2016

Transcription:

Managing the quantum risk to cybersecurity Global Risk Institute Michele Mosca 11 April 2016

Cyber technologies are becoming increasingly pervasive.

Cybersecurity is a growing and fundamental part of safety and security of individuals, organizations and society.

Unpredictable new vulnerabilities going up a down escalator

Physics and Computation Information is physical so we must recast information and computation in a quantum paradigm. By Carsten Ullrich E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST

What will be affected? Products, services, business functions that rely on security products will either stop functioning or not provide the expected levels of security. Clouding computing Payment systems Internet IoT etc. Secure Web Browsing - TLS/SSL Auto-Updates Digital Signatures VPN - IPSec Secure email -S/MIME PKI etc RSA, DSA, DH, ECDH, ECDSA, AES, 3-DES, SHA,

How much of a problem is quantum computing, really?

How soon do we need to worry? Depends on*: How long do you need your cryptographic keys to be secure? security shelf-life (x years) How much time will it take to re-tool the existing infrastructure with large-scale quantum-safe solution? (y years) migration time How long will it take for a large-scale quantum computer to be built (or for any other relevant advance)? (z years) collapse time Theorem : If x + y > z, then worry. *M. Mosca: e-proceedings of 1 st ETSI Quantum-Safe Cryptography Workshop, 2013. Also http://eprint.iacr.org/2015/1075 time y z x

Business bottom line Fact: If x+y>z, then you will not be able to provide the required x years of security. Fact: If y>z then cyber-systems will collapse in z years with no quick fix. Prediction: In the next 6-24 months, organizations will be differentiated by whether or not they have a well-articulated quantum risk management plan.

Building a large quantum computer

What is z? Mosca: [Oxford] 1996: 20 qubits in 20 years [NIST April 2015, ISACA September 2015]: 1/7 chance of breaking RSA-2048 by 2026, ½ chance by 2031 Microsoft Research [October 2015]: Recent improvements in control of quantum systems make it seem feasible to finally build a quantum computer within a decade. Use of a quantum computer enables much larger and more accurate simulations than with any known classical algorithm, and will allow many open questions in quantum materials to be resolved once a small quantum computer with around one hundred logical qubits becomes available.

NSA [August 2015]: NSA's Information Assurance Directorate will initiate a transition to quantum resistant algorithms in the not too distant future. https://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml NSA [January 2016]: CNSA Suite and Quantum Computing FAQ https://www.iad.gov/iad/library/ia-guidance/ia-solutions-forclassified/algorithm-guidance/cnsa-suite-and-quantum-computing-faq.cfm NIST [February 2016]: NISTIR 8105 DRAFT Report on Post- Quantum Cryptography outlines NIST s initial plan to move forward in this space. http://csrc.nist.gov/publications/drafts/nistir-8105/nistir_8105_draft.pdf ETSI white paper: http://www.etsi.org/images/files/etsiwhitepapers/quantumsafewhitepaper.pdf

Quantum-safe cryptographic tool-chest quantum-resistant conventional cryptography Deployable without quantum technologies Believed/hoped to be secure against quantum computer attacks of the future + quantum cryptography Requires some quantum technologies (less than a largescale quantum computer) Typically no computational assumptions and thus known to be secure against quantum attacks Both sets of cryptographic tools can work very well together in quantum-safe cryptographic ecosystem

How easy is it to evolve from one cryptographic algorithm to a quantumsecure one? Are the standards and practices ready?

What do we do today?

Managing the quantum risk At a high level, we need to assess x,y and z for the range of information assets and business functions. + > Urgent action required to minimize losses Security Shelf life Migration Time Collapse Time + < Acting now will avoid losses Proprietary Information of evolutionq Inc.

Assessing x Enumerate key information assets and business functions. Understand the nature of the systems being used (or that will be used), and the assets and functions they protect. Understand legal or regulatory influences. What is the security shelf-life of those information assets? What is the value of those assets or business functions?

Assessing z Catalog system components and assess vulnerabilities to quantum attacks. Understand threat actors who might attack your systems. Track progress of the emergence of a true quantum threat to these systems by the relevant threat actors.

Assessing and managing y Examine the existing risk mitigation policies, procedures, and processes, with a special focus on cryptography. Identify options for mitigating the quantum risk against your systems. Identify community and technical challenges to deploying quantum-safe cryptography. Natural approach is to integrate quantum readiness into current risk assessment/mitigation processes. As cryptographic tools and processes become scheduled for updates or replacement, consider quantum-safe technologies. Consider hybrid approaches to retain robustness of tools protecting against today s threats while introducing new tools designed to protect against the future quantum threat.

Assessing and managing y This is the part of the equation we have some control over. The landscape is new, uncertain and changing fast, so it s not easy. Obtaining specialized expertise and formulating a plan for your organization will help reduce losses and costs in the future.

Thank you! Comments, questions and feedback are very welcome. Michele Mosca University Research Chair, Faculty of Mathematics Co-Founder, Institute for Quantum Computing www.iqc.ca/~mmosca Director, CryptoWorks21 www.cryptoworks21.com University of Waterloo mmosca@uwaterloo.ca Co-founder and CEO, evolutionq Inc. michele.mosca@evolutionq.com Upcoming workshop of interest: 4th ETSI/IQC Workshop on Quantum-Safe Cryptography 19-21 September 2016 Toronto, Canada