Everything is Quantum The EU Quantum Flagship Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL
Contents Whats the problem? What s everyone up to? Are we there yet? What are we going to do about it? EU Flagship Explain the Plan ( 3 steps ) Back up from NSA / AIVD -> key length QKD explanation & QKD attacks Free Space KPN & Postive Innovation belief
Global Developments
Global Developments Qiang Zhang Uni. of Science & Technology of China
The world is moving mostly forwards *Dr.Jurgen Mlynek HLSC Chairman
How are we doing in the EU? *Dr.Jurgen Mlynek HLSC Chairman
During the Dutch Presidency we saw the launch *Dr.Jurgen Mlynek HLSC Chairman
Established: *Dr.Jurgen Mlynek HLSC Chairman
Established: *Dr.Jurgen Mlynek HLSC Chairman
Public Private Partnership *Dr.Jurgen Mlynek HLSC Chairman
What were we supposed to do? *Dr.Jurgen Mlynek HLSC Chairman
KPN s Quantum leap with IDQuantique *Dr.Jurgen Mlynek HLSC Chairman
Areas of Work *Dr.Jurgen Mlynek HLSC Chairman
Quantum Communication Quantum Key Distribution Quantum Random Number Generator Fully Quantum repeater Trusted Node Networks
Quantum Computing Quantum computing - stable, scalable architecture Error Correcting, Robust Qubits Quantum memory Demonstrating Quantum Speedup
Quantum simulation Quantum Simulator platform High temperature superconductivity Energy storage, distribution, transportation
Quantum Sensing and Metrology Solid State Quantum Sensors ie. MRIs Quantum Imaging devices ie. Better image resolution Atomic and molecular interferometer devicesie. navigation Quantum Metrology ie. time measurements
Domains *Dr.Jurgen Mlynek HLSC Chairman
Founding Points *Dr.Jurgen Mlynek HLSC Chairman
Are we there yet? Viable Quantum Computer:: currently no
What are we going to do about it? 1. Increase Key Length of Current Crypto used 2. Investigate options for Quantum Key Distribution for high critical links with demands for long term secrecy 3. Investigate Post Quantum Cryptographic Algorithms and determine deployment strategy
Key length -> NSA Advice IAD will initiate a transition to quantum resistant algorithms in the not too distant future. Our ultimate goal is to provide cost effective security against a potential quantum computer.
Quantum Key Distribution QKD
QKD
KPN s Quantum leap with IDQuantique
Free Space QKD
Post Quantum Cryptography PQCRYPTO A new hope PQCRYPTO.org -> Tanja Lange & Dan Bernstein Lattice Based - McEliece since 1978 CESG & Soliloquy Supersingular Isogeny Diffie Hellman (SIDH) aka- the hottest thing we have Phil Zimmermann - Post Quantum Crypto at internet scale
To Ban or Cripple Strong Encryption? The original c rypto wars What do Freeh / C omey / C ameron-teresa May / FRC azeneuve & DE - de Maizière ministers of interior want? On backdoors, front doors, and golden key management Magic al Thinking
Capture now decrypt later Vs time to implement Quandry Without quantum-safe encryption, everything that has been transmitted, or will ever be transmitted, over a network is vulnerable to eavesdropping and public disclosure.
What type of problems can we solve with a Quantum Computer
What type of problems can we solve with a Quantum Computer Dr. Jos Joore at Singularity University Large data set problems Needle in haystack problems ---------------------------------- Protein mapping and drug interaction Earlier detection of cancer
In Conclusion. We re just getting started IBM Public Access to Quantum Computing Platform 17 qubits Google Quantum Supremacy Experiment 50 qubits -within 1 year (More than a year ago) What we will need in coming days, months, years: Common way forward active participation Providing thought leadership and action in the field of future security controls in time Combining options for defense in depth like we re used to
THANK YOU! Questions? Comments? Stuff? Jaya Baloo @jayabaloo (twitter) Thanks to all web content folks for images that were borrowed!