Quantum Computing is Here, Powered by Open Source. Konstantinos Karagiannis CTO, Security Consulting BT

Similar documents
Quantum Key Distribution and the Future of Encryption

Introduction to Quantum Computing

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

The Relativistic Quantum World

Quantum technology popular science description

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

Quantum Computers Is the Future Here?

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Quantum computing with superconducting qubits Towards useful applications

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

A Reconfigurable Quantum Computer

Quantum Optics. Manipulation of «simple» quantum systems

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

Quantum Computation and Communication

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

Index. Vladimir Silva 2018 V. Silva, Practical Quantum Computing for Developers,

10 - February, 2010 Jordan Myronuk

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

A central problem in cryptography: the key distribution problem.

Quantum Information Science (QIS)

The Reality of Quantum Computing

Quantum theory has opened to us the microscopic world of particles, atoms and photons..and has given us the keys of modern technologies

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW?

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Canary Foundation at Stanford. D-Wave Systems Murray Thom February 27 th, 2017

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

Cyber Security in the Quantum Era

Cryptography in a quantum world

What are we talking about when we talk about post-quantum cryptography?

Algorithms, Logic and Complexity. Quantum computation. basic explanations! &! survey of progress

IBM Systems for Cognitive Solutions

Asymmetric Encryption

Information Security in the Age of Quantum Technologies

Promise of Quantum Computation

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

LECTURE NOTES ON Quantum Cryptography

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Secrets of Quantum Information Science

Lattice-Based Cryptography

The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone. Quantum Information Nov. 12, 2002

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Future of Quantum Science and Technology

Quantum Effect or HPC without FLOPS. Lugano March 23, 2016

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Quantum-resistant cryptography

We all live in a yellow submarine

The quantum threat to cryptography

Post Von Neumann Computing

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Reversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016

Risk management and the quantum threat

Public-key Cryptography and elliptic curves

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum Computing. Thorsten Altenkirch

Information Security

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Security Implications of Quantum Technologies

Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L.

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Quantum Optics and Quantum Informatics 7.5hp (FKA173) Introductory Lecture

Quantum Cryptography. Marshall Roth March 9, 2007

MAA509: Quantum Computing and Information Introduction

Building Quantum Computers: Is the end near for the silicon chip?

Quantum Cryptography

Blockchain and Quantum Computing

Quantum Information & Quantum Computation

Why Quantum Technologies?

Quantum Computing An Overview

Quantum Computing. The Future of Advanced (Secure) Computing. Dr. Eric Dauler. MIT Lincoln Laboratory 5 March 2018

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

*WILEY- Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co.

SPHINCS: practical stateless hash-based signatures

phys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference

The Quantum Threat to Cybersecurity (for CxOs)

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

Computers of the Future? Moore s Law Ending in 2018?

The Future. Currently state of the art chips have gates of length 35 nanometers.

Quantum Technology 101: Overview of Quantum Computing and Quantum Cybersecurity

9 Knapsack Cryptography

Summary of Hyperion Research's First QC Expert Panel Survey Questions/Answers. Bob Sorensen, Earl Joseph, Steve Conway, and Alex Norton

Other Public-Key Cryptosystems

Quantum Technologies: Threats & Solutions to Cybersecurity

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co. KGaA

EU investment in Quantum Technologies

Mathematics of Public Key Cryptography

Introduction to Superconductivity. Superconductivity was discovered in 1911 by Kamerlingh Onnes. Zero electrical resistance

Intel s approach to Quantum Computing

Quantum Computing and the Possible Effects on Modern Security Practices

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks

Odd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initi

Transcription:

Quantum Computing is Here, Powered by Open Source Konstantinos Karagiannis CTO, Security Consulting BT Americas @KonstantHacker

It all started with the need to crack encryption

We re there again Snowden documents cited $79.7 million research program Penetrating Hard Targets Not surprising considering EVERYONE wants one in this arms race What are these new supercomputing machines, and why will we need new types of encryption soon?

A word on current supercomputers As of June 2017, 498 of top 500 supercomputers run Linux (www.top500.org) The other two? They run Unix

Understanding QM? I think I can safely say that no one understands quantum mechanics. Richard Feynman (Nobel Prize, 1965) We ll start with quanta being discrete bundles of energy and give it a shot anyway

Particle-wave duality Expected particle behavior or pooling

Particle-wave duality Wave pattern without observation of which slit a particle goes through

Particle-wave duality Even one particle at a time creates wave pattern

Particle-wave duality Use a detector on either slit, and pooling appears: particle-wave duality

Superposition Observing either slit destroyed quantum superposition Decoherence of critical importance in QC Quantum weirdness can t occur on a macro scale because universe makes observations We can use superposition to make an important element in computing be 2 things at once

Copenhagen (20s) vs. Many Worlds Interpretation (50s) Niels Bohr Werner Heisenberg Hugh Everett III David Deutsch

Entanglement Back to superposition Einstein troubled by a type called entanglement God does not play dice with the universe. Spooky action at a distance. Quantum event entangles particles share quality in superposition (say, spin up/down) Until measured/observed, each particle is in both states

Spooky decoherence Observe the spin of one particle, decoherence occurs If one particle is spin down, we know instantly the other is spin up Instantly could mean faster than light!? No. Information sent by entanglement is random can t send 0/1, etc.

Enter the qubit Unlike bits, qubits can be: Zero One Or a superposition of both (with probabilities of each) Qubits can perform certain functions with a percentage of effort of a classical computer

Staying coherent QCs must maintain coherence in many particles via: Quantum optics Single atom silicon Large artificial qubits NMR Discord 2012 Nobel Prize for this work: Serge Haroche (France) David Wineland (USA) On to what a coherent QC can do

Cracking public-key crypto PK crypto relies on a classical computer s difficulty at factoring large numbers Example find factors of a 400-digit number: 400-digit number = 200-digit number * 200-digit number

Shor s Algorithm 1994 Peter Shor showed a QC could find the factors of large numbers quickly Shor s Algorithm has likely answers interfere constructively, unlikely ones destructively Proven on a simple QC with four photonic qubits, showing 15=3*5 Imagine all PK in the clear! Risk to Bitcoin because of

Elliptic curve cryptography Public key system, like RSA, El Gamal, Rabin Based on algebraic structure of elliptic curves over finite fields Public key for encryption or sig validation Private key for decryption or sig generation Quantum computers can crack ECC with modified Shor s

Grover s Algorithm Traditional database searches require N/2 searches for N entries Peter Grover showed in 1996 how a QC would allow for N searches Could impact DES if encrypted file and source are available classical computer would need to search 2 55 keys, but quantum only 185 million Proven in lab to work via 2-qubit diamond chip system: 1 search for 4 items instead of 2

Google searches for quantum search capability Google and NASA have a 512-qubit D- Wave at their Quantum Artificial Intelligence Lab Google could benefit from Grover s oddly only mention: Efficient recognizers Polluted data handlers Google now working with UC Berkeley to build 49-qubit machine

D-Wave and Qbsolv Despite not providing a universal QC, D-Wave has open source dev environment for its machines (or D- Wave simulator software to test) Internet API (RESTful), with C/C++, Python, and MATLAB client libraries Can be set up as cloud resource or in high-performance computing environment. Also available via D- Wave s hosted cloud service. D-Wave dev tools and client libraries allow developers to create algorithms and applications

Australia The Centre for Quantum Computation and Communication Technology (University of New South Wales) received first installment of Aus $46 million to build practical quantum computer Team s silicon qubits hold their quantum state nearly a million times longer than do systems made from superconducting circuits Successful linking of qubits achieved expect to have working machine within 3 years!

University of Maryland Trapped-ion quantum computer module can run quantum algorithms by executing any sequence of universal logic gates. Reconfiguring gate sequences provides flexibility to use variety of algorithms without altering hardware (there are ~50 quantum algorithms) Succeeded at Deutsch-Jozsa, Bernstein- Vazirani, quantum Fourier transform (QFT needed for Shor) with 5 qubits Can be scaled to larger numbers of qubits within a single module, and can be further expanded by connecting many modules!

IBM IBM made headlines by letting you try out a working 5-qubit system the Quantum Experience Chip (http://www.research.ibm.com/quantum/) You can now register to use a beta of a 16-qubit chip! (17 qubit ver. not public) You can run Grover s search live and see the future IBM betting big on quantum just announced work on a 50-qubit machine

OpenQASM and ProjectQ In addition to using a visual Composer on the site, there are open dev kits available for the IBM Quantum Experience Chip OpenQASM lets you get down to code level of what happens at site (https://github.com/qiskit/qiskitsdk-py) ProjectQ lets users also simulate quantum programs on classical computers, emulating at a higher level of abstraction

OpenQASM Quantum Information Software Kit (QISKit) is a Python SDK that allows: Building of quantum circuits that represent a problem Compiling to run on different backends (simulators/real chips of different quantum volumes) Running the jobs QISKit has 4 programming interface objects QuantumProgram objects create, modify, compile, and execute a collection of QuantumCircuits Circuits can be of type QuantumRegister or ClassicalRegister QuantumCircuit can then generate OpenQASM code

ProjectQ and getting started with quantum coding Getting started with ProjectQ is pretty simple: python -m pip install -- user projectq Syntax well explained at http://projectq.readthedocs.io Similar to syntax in quantum physics: becomes R x (θ) qubit Rx(theta) qubit

Demo code lets you get qubits spinning on IBM QEC

Harvard wins with 51 qubits Harvard University s Mikhail Lukin announced at ICQT in Moscow his team built and tested a 51-qubit quantum computer Upstaged the Google/Berkeley 49- qubit announcement Teamed with MIT to build system of atoms that are cooled and held by lasers to form qubits

Post-quantum encryption Shor s proven in lab against PK RSA, Diffie-Hellman, elliptic curve (blockchain!) Grover aids brute force (AES-256 = AES-128) The following still seem safe: Code based Hash based Lattice based Multivariate quadratic equations One time pad (QKD)

Quantum keys to the future (for some use cases) A point-to-point protection from the quantum threat Quantum encoded keys sent via a relevant medium e.g., photons via fiber One-time pad system protected by QKD Any attempt to tap signal can be detected and prevented Works today, provides hope until complete quantum systems appear qbitcoin proposes a cryptocurrency sent this way (new networks needed, though)

Quantum channel on shared fiber with 200Gbps bidirectional traffic (9/15)

Open Quantum Safe Despite QKD s effectiveness, it s not a use everywhere solution Promising new quantum encryption: liboqs (https://openquantumsafe.org/) Open source C library for quantum-resistant crypto algorithms API suitable for post-quantum key exchange algorithms Open-quantum-safe/openssl is integration of liboqs into OpenSSL 1.0.2. Goal of providing easy prototyping of quantum-resistant cryptography

What about ECC and fixing open source money? Bitcoin wallet addresses made of: Public key, private key, and address Public key derived from private key by elliptic curve multiplication Address derived by: applying SHA256 hash function to public key applying RIPEMD-160 hash function adding checksum for error correction Used bitcoin or other entities have public keys exposed on blockchain

Bitcoin at risk within 3 years? Bitcoin transaction includes a signature and a public key to verify owner That publicly available information is all a quantum computer needs to get private key and become another user This type of attack can be done passively (offline) by downloading any type of blockchain

Lamport signatures a stopgap? Public key consists of 320 hashes rather than an elliptic curve point Address is SHA256+RIPEMD-160 hash of public key Transaction includes public key and signature verifiers check if: public key matches address signature matches message and public key Even with Grover s algorithm, it takes 2^80 steps to construct a fraudulent transaction or 2^80 * 80 steps to crack all hashes (trillions of trillions)

Quantum Resistant Ledger Post-quantum blockchain? Check out the Quantum Resistant Ledger http://theqrl.org/ The Winternitz OTS+ and Extended Merkle Signature Scheme (XMSS) Proof of Stake (Ethereum moving to this too) Genesis block expected this month!

Thank You konstantinos.karagiannis@bt.com @KonstantHacker