Everything is Quantum The EU Quantum Flagship

Similar documents
Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW?

EU investment in Quantum Technologies

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

The quantum threat to cryptography

The Quantum Threat to Cybersecurity (for CxOs)

Some Notes on Post-Quantum Cryptography

Errors, Eavesdroppers, and Enormous Matrices

Some Notes on Post-Quantum Cryptography

Quantum threat...and quantum solutions

Cryptography in a quantum world

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

Quantum and quantum safe crypto technologies in Europe. Ales Fiala Future and Emerging Technologies European Commission

Quantum Cryptography

Cyber Security in the Quantum Era

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

H2020 FET Flagship on Quantum Technologies Infoday

Post-Quantum Cryptography from Lattices

Information Security in the Age of Quantum Technologies

Quantum Wireless Sensor Networks

The quantum threat to cryptography

Summary of Hyperion Research's First QC Expert Panel Survey Questions/Answers. Bob Sorensen, Earl Joseph, Steve Conway, and Alex Norton

Lattice-Based Cryptography

Lecture V : Public Key Cryptography

Quantum-resistant cryptography

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Preparing the Quantum Technologies Flagship

Quantum Technologies: Threats & Solutions to Cybersecurity

Blockchain and Quantum Computing

Quantum Communication Networks and Technologies

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

Standardization of Quantum Cryptography in China

Introduction to Modern Cryptography Lecture 11

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Post-Quantum Cryptography & Privacy. Andreas Hülsing

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

Quantum Key Distribution. The Starting Point

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

1500 AMD Opteron processor (2.2 GHz with 2 GB RAM)

Introduction to Quantum Safe Cryptography. ENISA September 2018

Post-Quantum Security of the Fujisaki-Okamoto (FO) and OAEP Transforms

From NewHope to Kyber. Peter Schwabe April 7, 2017

Entanglement and Quantum Key Distribution at ESA

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

Public-key Cryptography and elliptic curves

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago

Post-Quantum Cryptography & Privacy. Andreas Hülsing

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

From quantum science to quantum technologies.

Quantum Technologies for Cryptography

The Elliptic Curve in https

CRYPTANALYSIS OF COMPACT-LWE


Your Computer is Leaking. Ian J. Malloy.

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security

Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes

Quantum Computing Industry, Technologies & Business Opportunities. Industry 4.0 Research

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Public-key Cryptography and elliptic curves

Introduction to Quantum Computing

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL

Selecting Elliptic Curves for Cryptography Real World Issues

Attacking the ECDLP with Quantum Computing

Lecture 28: Public-key Cryptography. Public-key Cryptography

Quantum Technologies Flagship Intermediate Report. High-Level Steering Committee 16 February 2017

Post Quantum Cryptography. Kenny Paterson Information Security

Quantum Supremacy and its Applications

Le azioni preparatorie alla FET Flagship. Tommaso Calarco H2020 FET Flagship on Quantum Technologies Infoday, Roma

Post-quantum RSA. We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity

CALL FOR A NATIONAL QUANTUM INITIATIVE: Proposal to address the urgent need to develop the information infrastructure of tomorrow

8 Elliptic Curve Cryptography

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

ECE 646 Lecture 9. RSA: Genesis, operation & security

APPLICATIONS. Quantum Communications

The Quantum Landscape

Advances in code-based public-key cryptography. D. J. Bernstein University of Illinois at Chicago

1 What are Physical Attacks. 2 Physical Attacks on RSA. Today:

Quantum technology popular science description

Quantum Supremacy and its Applications

Quantum Networking: Deployments, Components and Opportunities September 2017

A gentle introduction to isogeny-based cryptography

The science behind these computers originates in

The Quantum Age Technological Opportunities

Quantum Key Distribution and the Future of Encryption

Lessons Learned from High-Speed Implementa6on and Benchmarking of Two Post-Quantum Public-Key Cryptosystems

Post-quantum key exchange based on Lattices

QUANTUM TECHNOLOGY: PREPARING THE NEW EUROPEAN FLAGSHIP. Prof. Dr. Jürgen Mlynek

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

Cryptographical Security in the Quantum Random Oracle Model

Quantum Technology: Challenges and Opportunities for Cyber Security. Yaoyun Shi University of Michigan

ECE297:11 Lecture 12

Lecture 7: Boneh-Boyen Proof & Waters IBE System

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks

Supersingular Isogeny Key Encapsulation

Transcription:

Everything is Quantum The EU Quantum Flagship Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Contents Whats the problem? What s everyone up to? Are we there yet? What are we going to do about it? EU Flagship Explain the Plan ( 3 steps ) Back up from NSA / AIVD -> key length QKD explanation & QKD attacks Free Space KPN & Postive Innovation belief

Global Developments

Global Developments Qiang Zhang Uni. of Science & Technology of China

The world is moving mostly forwards *Dr.Jurgen Mlynek HLSC Chairman

How are we doing in the EU? *Dr.Jurgen Mlynek HLSC Chairman

During the Dutch Presidency we saw the launch *Dr.Jurgen Mlynek HLSC Chairman

Established: *Dr.Jurgen Mlynek HLSC Chairman

Established: *Dr.Jurgen Mlynek HLSC Chairman

Public Private Partnership *Dr.Jurgen Mlynek HLSC Chairman

What were we supposed to do? *Dr.Jurgen Mlynek HLSC Chairman

KPN s Quantum leap with IDQuantique *Dr.Jurgen Mlynek HLSC Chairman

Areas of Work *Dr.Jurgen Mlynek HLSC Chairman

Quantum Communication Quantum Key Distribution Quantum Random Number Generator Fully Quantum repeater Trusted Node Networks

Quantum Computing Quantum computing - stable, scalable architecture Error Correcting, Robust Qubits Quantum memory Demonstrating Quantum Speedup

Quantum simulation Quantum Simulator platform High temperature superconductivity Energy storage, distribution, transportation

Quantum Sensing and Metrology Solid State Quantum Sensors ie. MRIs Quantum Imaging devices ie. Better image resolution Atomic and molecular interferometer devicesie. navigation Quantum Metrology ie. time measurements

Domains *Dr.Jurgen Mlynek HLSC Chairman

Founding Points *Dr.Jurgen Mlynek HLSC Chairman

Are we there yet? Viable Quantum Computer:: currently no

What are we going to do about it? 1. Increase Key Length of Current Crypto used 2. Investigate options for Quantum Key Distribution for high critical links with demands for long term secrecy 3. Investigate Post Quantum Cryptographic Algorithms and determine deployment strategy

Key length -> NSA Advice IAD will initiate a transition to quantum resistant algorithms in the not too distant future. Our ultimate goal is to provide cost effective security against a potential quantum computer.

Quantum Key Distribution QKD

QKD

KPN s Quantum leap with IDQuantique

Free Space QKD

Post Quantum Cryptography PQCRYPTO A new hope PQCRYPTO.org -> Tanja Lange & Dan Bernstein Lattice Based - McEliece since 1978 CESG & Soliloquy Supersingular Isogeny Diffie Hellman (SIDH) aka- the hottest thing we have Phil Zimmermann - Post Quantum Crypto at internet scale

To Ban or Cripple Strong Encryption? The original c rypto wars What do Freeh / C omey / C ameron-teresa May / FRC azeneuve & DE - de Maizière ministers of interior want? On backdoors, front doors, and golden key management Magic al Thinking

Capture now decrypt later Vs time to implement Quandry Without quantum-safe encryption, everything that has been transmitted, or will ever be transmitted, over a network is vulnerable to eavesdropping and public disclosure.

What type of problems can we solve with a Quantum Computer

What type of problems can we solve with a Quantum Computer Dr. Jos Joore at Singularity University Large data set problems Needle in haystack problems ---------------------------------- Protein mapping and drug interaction Earlier detection of cancer

In Conclusion. We re just getting started IBM Public Access to Quantum Computing Platform 17 qubits Google Quantum Supremacy Experiment 50 qubits -within 1 year (More than a year ago) What we will need in coming days, months, years: Common way forward active participation Providing thought leadership and action in the field of future security controls in time Combining options for defense in depth like we re used to

THANK YOU! Questions? Comments? Stuff? Jaya Baloo @jayabaloo (twitter) Thanks to all web content folks for images that were borrowed!