Quantum Key Distribution and the Future of Encryption

Similar documents
Quantum Computing is Here, Powered by Open Source. Konstantinos Karagiannis CTO, Security Consulting BT

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

The Relativistic Quantum World

Introduction to Quantum Computing

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

10 - February, 2010 Jordan Myronuk

Algorithms, Logic and Complexity. Quantum computation. basic explanations! &! survey of progress

Quantum Optics. Manipulation of «simple» quantum systems

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Future of Quantum Science and Technology

Promise of Quantum Computation

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

A central problem in cryptography: the key distribution problem.

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

Quantum Information Science (QIS)

How to Train Your Photon Dragon

Quantum technology popular science description

Why Quantum Technologies?

Odd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initi

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

We all live in a yellow submarine

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum Optics and Quantum Informatics 7.5hp (FKA173) Introductory Lecture

The Reality of Quantum Computing

Secrets of Quantum Information Science

U.S. ARMY RESEARCH, DEVELOPMENT AND ENGINEERING COMMAND

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone. Quantum Information Nov. 12, 2002

Quantum Computing. The Future of Advanced (Secure) Computing. Dr. Eric Dauler. MIT Lincoln Laboratory 5 March 2018

Limits and Future of Computing Where do we go from here?

Cyber Security in the Quantum Era

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Quantum Computers Is the Future Here?

Introduction to Quantum Computing for Folks

The Impact of Quantum Computing

The Nobel Prize in Physics 2012

Quantum Information & Quantum Computation

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

phys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference

Cryptography in a quantum world

Quantum Technology 101: Overview of Quantum Computing and Quantum Cybersecurity

Quantum Information Processing

Quantum Effect or HPC without FLOPS. Lugano March 23, 2016

The wavefunction and quantum jumps

Quantum theory has opened to us the microscopic world of particles, atoms and photons..and has given us the keys of modern technologies

Quantum Mechanics: Blackbody Radiation, Photoelectric Effect, Wave-Particle Duality

A trip to Quantum Physics

Quantum threat...and quantum solutions

THE DELAYED CHOICE QUANTUM EXPERIMENT

Quantum Computation and Communication

Reversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016

Computers of the Future? Moore s Law Ending in 2018?

Quantum Cryptography. Marshall Roth March 9, 2007

Talk by Johannes Vrana

Quantum Strangeness In Unexpected Places. Aash Clerk ! +!

The long road of Quantum Computing

Introduction to Superconductivity. Superconductivity was discovered in 1911 by Kamerlingh Onnes. Zero electrical resistance

The Weird World of Quantum Mechanics

Your Computer is Leaking. Ian J. Malloy.

Quantum Computing An Overview

Quantum Mechanics. Physics April 2002 Lecture 9. Planck Bohr Schroedinger Heisenberg

From Niels Bohr to Quantum Computing - from philosophical struggle to technological revolution

Introduction to Cavity QED: fundamental tests and application to quantum information Serge Haroche July 2004

Physics. Light Quanta

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Quantum Computer. Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security

Chaos, Quantum Mechanics, and Computers

Quantum Technologies for Cryptography

QUANTUM TECHNOLOGIES: THE SECOND QUANTUM REVOLUTION* Jonathan P. Dowling

Physics 1161: Lecture 22

Quantum Computing. Computation that basis on probability nature of reality and low of physics

Topological Quantum Computation. George Toh 11/6/2017

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

C. QUANTUM INFORMATION 111

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Quantum Mechanics: Blackbody Radiation, Photoelectric Effect, Wave-Particle Duality

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

The Future. Currently state of the art chips have gates of length 35 nanometers.

Quantum Computing. Hans De Raedt Zernike Institute for Advanced Materials University of Groningen, NL

Entanglement and Quantum Teleportation

Quantum Computing and the Possible Effects on Modern Security Practices

15110 in a Nutshell. Computer Science for Non majors

Revolution in Physics. What is the second quantum revolution? Think different from Particle-Wave Duality

Lecture 8: Wave-Particle Duality. Lecture 8, p 2

Quantum Computing. Thorsten Altenkirch

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

ALBERT EINSTEIN AND THE FABRIC OF TIME by Gevin Giorbran

Post-Quantum Cryptography & Privacy. Andreas Hülsing

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

QUANTUM TECHNOLOGIES: THE SECOND QUANTUM REVOLUTION* Jonathan P. Dowling

Double slit questions

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Quantum Technologies: Threats & Solutions to Cybersecurity

Transcription:

Quantum Key Distribution and the Future of Encryption Konstantinos Karagiannis Global Technical Lead, Ethical Hacking BT Security Amsterdam, October 16 th, 2014

Understanding QM? I think I can safely say that no one understands quantum mechanics. Richard Feynman (Nobel Prize, 1965)

Planck Avoids Catastrophe, Gives Birth to a Field Science in the late 1800s we ve found everything, only need better measurements 1800s blackbody radiation 1900 Max Planck proposes quanta E=hf

Light: Wave or Particle? 1803 Thomas Young s double slit experiment 1905 Einstein shows light is made of particles 1909 Taylor finds wave interference patterns with even one photon at a time

Particle-Wave Duality Expected particle behavior or pooling

Particle-Wave Duality Wave pattern without observation of which slit a particle goes through

Particle-Wave Duality As Taylor showed, even one particle at a time shows the wave pattern

Particle-Wave Duality Use a detector on either slit, however, and pooling appears

Superposition Observing either slit destroyed quantum superposition Decoherence of critical importance in QC Quantum weirdness can t occur on a macro scale because universe makes observations

Einstein s Dilemma Einstein troubled by a type of superposition: entanglement Two of his most colorful quotes relate to it: God does not play dice with the universe. Spooky action at a distance.

Entanglement Created by a quantum event, entangled particles share a quality in superposition; say, spin up and down Until measured/observed, each particle is in both states

Spooky Decoherence Observe the spin of one particle, decoherence occurs If one particle is spin down, we know instantly the other is spin up Instantly could mean faster than light? Not exactly.

Enter the Qubit Unlike bits, qubits can be: Zero One Or a superposition of both (with probabilities of each) Qubits can perform certain functions with a percentage of effort of a classical computer

Qubits Invented for Different Purpose Stephen Wiesner invented qubits in 1969 to stop counterfeiters 20 photons in light traps that preserve their random polarity A bank could tell with a serial number if a bill was authentic This was an early quantum key, too (much more later)

Staying Coherent QCs must maintain coherence in hundreds of particles via: Quantum optics Single atom silicon Large artificial qubits NMR Discord 2012 Nobel Prize for this work: Serge Haroche (France) David Wineland (USA)

Public-Key Crypto PK crypto relies on a classical computer s difficulty at factoring large numbers Example find factors of a 400-digit number: 400-digit number = 200-digit number * 200-digit number

Shor s Algorithm 1994 Peter Shor showed a QC could find the factors of large numbers quickly Shor s Algorithm has likely answers interfere constructively, unlikely ones destructively Proven on a simple QC with four photonic qubits, showing 15=3*5

Grover s Algorithm Traditional database searches require N/2 searches for N entries Peter Grover showed in 1996 how a QC would allow for N searches Could impact DES if encrypted file and source are available classical computer would need to search 2 55 keys, but quantum only 185 million

Diamond QC Proves Grover s Algorithm Delft University (NL) and UC Santa Barbara Simple QC using impurities in a 1mm x 1mm diamond chip at room temperature Two qubits: spin of a nitrogen atom and an electron A successful result of 4 database entries performed in one search, instead of classical 2 Grover could affect scanners and AI

Google Searches for Quantum Search Capability Google and NASA have a 512-qubit D-Wave at their Quantum Artificial Intelligence Lab Google could benefit from Grover s oddly only mention: Efficient recognizers Polluted data handlers Google now working with UC Santa Barbara to build true quantum computer

NSA Getting in on the Fun Washington Post reported January 2 Snowden documents cite $79.7 million research program Penetrating Hard Targets Not surprising considering EVERYONE wants one in this arms race Keep in mind how supercomputers got their start: Colossus (1943), Tommy Flowers, GPO

Post Quantum Encryption Shor s only proven to work for PK Grover may affect DES The following still seem safe: Code based Hash based Lattice based Multivariate quadratic equations Elliptical curve One time pad (more on this in a moment) New quantum encryption on horizon

Quantum Keys to the Future Introducing QKD Quantum encoded keys sent via a relevant medium e.g., photons via fiber One-time pad system protected by QKD Works today, provides hope for complete quantum systems to take over

BT Transfers Quantum Keys over Live Fiber! BT, Toshiba, ADVA, and NPL sent Quantum Keys over live fiber QKD a reality, sharing a truly secure key over a network Any attempt to tap signal can be detected and prevented Live fiber takes this into real world applications

Field trial of 10Gb/s transmission secured by QKD* *Thanks to Yu Rong Zhou and Andrew Lord

Thank you konstantinos.karagiannis@bt.com http://www.bt.com/security Read my blogs at: http://letstalk.globalservices.bt.com/en/security