Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Similar documents
ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

The Quantum Threat to Cybersecurity (for CxOs)

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Post-Quantum Cryptography & Privacy. Andreas Hülsing

White paper Quantum computing in financial services

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

The science behind these computers originates in

Information Security in the Age of Quantum Technologies

The quantum threat to cryptography

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

What are we talking about when we talk about post-quantum cryptography?

Quantum Cryptography

FIS' Partnership with Zelle for P2P Payments

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security

Cyber Security in the Quantum Era

Lattice-Based Cryptography

Alternative Approaches: Bounded Storage Model

Int er net Saf et y Tip s

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Quantum technology popular science description

Quantum Technologies: Threats & Solutions to Cybersecurity

Errors, Eavesdroppers, and Enormous Matrices

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel

Public-key Cryptography and elliptic curves

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Quantum threat...and quantum solutions

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

Cryptography and Security Final Exam

Fast, Quantum-Resistant Public-Key Solutions for Constrained Devices Using Group Theoretic Cryptography

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

Quantum Differential and Linear Cryptanalysis

F L I G H T R I S K I N M & A : T H E A R T A N D S C I E N C E O F R E T A I N I N G T A L E N T

The Quantum Age Technological Opportunities

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Quantum Cryptography. Marshall Roth March 9, 2007

19. Coding for Secrecy

A brief survey on quantum computing

Limits and Future of Computing Where do we go from here?

Cryptography in a quantum world

10 - February, 2010 Jordan Myronuk

RSA ENCRYPTION USING THREE MERSENNE PRIMES

Standardization of Quantum Cryptography in China

The Two Time Pad Encryption System

ARGUS.net IS THREE SOLUTIONS IN ONE

Quantum Wireless Sensor Networks

Evaluating e-government : implementing GIS services in Municipality

Web GIS: Architectural Patterns and Practices. Shannon Kalisky Philip Heede

From NewHope to Kyber. Peter Schwabe April 7, 2017

Land Board, NW Services and SDI Tambet Tiits, FRICS

Esri and GIS Education

Your Computer is Leaking. Ian J. Malloy.

T H R EAT S A R E H I D I N G I N E N C RY P T E D T R A F F I C O N YO U R N E T WO R K

FPGA-BASED ACCELERATOR FOR POST-QUANTUM SIGNATURE SCHEME SPHINCS-256

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Solution to Midterm Examination

Web GIS & ArcGIS Pro. Zena Pelletier Nick Popovich

Android Security Mechanisms

Post-quantum RSA. We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

Number Theory in Cryptography

ArcGIS Deployment Pattern. Azlina Mahad

Cryptographic Hash Functions

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Snow Cover. Snow Plowing and Removal Services Best Practices Guide. l

Post Quantum Cryptography. Kenny Paterson Information Security

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

The Elliptic Curve in https

Daniel J. Bernstein University of Illinois at Chicago. means an algorithm that a quantum computer can run.

SPHINCS: practical stateless hash-based signatures

Introduction to Cryptography. Susan Hohenberger

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

LEGAL DISCLAIMER. APG Coin (APG) White Paper (hereinafter 'the White Paper', 'the Document') is presented for informational purposes only

Number theory (Chapter 4)

Quantum Cryptography

Lecture 15: Randomness

Experimental Study of DIGIPASS GO3 and the Security of Authentication

The Reality of Quantum Computing

Web GIS Deployment for Administrators. Vanessa Ramirez Solution Engineer, Natural Resources, Esri

Quantum Strangeness In Unexpected Places. Aash Clerk ! +!

Breaking Symmetric Cryptosystems Using Quantum Algorithms

Geospatial natural disaster management

Cryptographical Security in the Quantum Random Oracle Model

Quantum Computing is Here, Powered by Open Source. Konstantinos Karagiannis CTO, Security Consulting BT

A central problem in cryptography: the key distribution problem.

CLICK HERE TO KNOW MORE

Innovation in Land Management: Integrated Solutions For National Cadastre Projects

Chapter 4 Asymmetric Cryptography

Asymmetric Cryptography

ArcGIS Earth for Enterprises DARRON PUSTAM ARCGIS EARTH CHRIS ANDREWS 3D

Asymmetric Encryption

VIDEO Intypedia008en LESSON 8: SECRET SHARING PROTOCOL. AUTHOR: Luis Hernández Encinas. Spanish Scientific Research Council in Madrid, Spain

CPSC 467: Cryptography and Computer Security

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Public-key Cryptography and elliptic curves

Oman NSDI Supporting Economic Development. Saud Al-Nofli Director of Spatial Data Directorate General of NSDI, NCSI

L E A D I N G T H E C O M P U T I N G R E V O L U T I O N

LECTURE NOTES ON Quantum Cryptography

CRYSTALS Kyber and Dilithium. Peter Schwabe February 7, 2018

Transcription:

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

What drives a company s digital strategy in 2020 and beyond? Quantum Computing it s the end of the world as we know it? July 2018 2

What drives a company s digital strategy in 2020 and beyond? INTERNET OF THINGS? Quantum Computing it s the end of the world as we know it? July 2018 3

What drives a company s digital strategy in 2020 and beyond? CYBER ATTACKS? Quantum Computing it s the end of the world as we know it? July 2018 4

What drives a company s digital strategy in 2020 and beyond? BITCOIN? Quantum Computing it s the end of the world as we know it? July 2018 5

What drives a company s digital strategy in 2020 and beyond? DIGITAL TRANSFORMATION? Quantum Computing it s the end of the world as we know it? July 2018 6

What drives a company s digital strategy in 2020 and beyond? Regardless of what drives your digital strategy it will be based on digital identities authentication of these identities secret communication all driven by digital certificates and encryption! Quantum Computing it s the end of the world as we know it? July 2018 7

And then comes Quantum Computing Quantum computing is coming for your data! Quantum Computing it s the end of the world as we know it? July 2018 8

Who are we and why do we care? Quantum Computing it s the end of the world as we know it? 11.04.2018 9

Giesecke+Devrient creating confidence since 1852 Founded 1852 > 11,000 employees > 2 billion revenue Quantum Computing it s the end of the world as we know it? 11.04.2018 10

G+D provides secure solutions for customers in four major playing fields Payment Connectivity Identity Digital security Global leader in physical, electronic and digital payments Secure connectivity as a gateway to the Internet of Things Safeguarding personal identities and authentication Protecting classified data, communication channels & critical infrastructures Security G+D makes the lives of billions of people more secure Quantum Computing it s the end of the world as we know it? 13.07.2018 11

The digital world is build on encryption Quantum Computing it s the end of the world as we know it? July 2018 12

How does classical encryption work? Symmetric encryption Asymmetric encryption Examples: AES, DES Examples: RSA, ECC Quantum Computing it s the end of the world as we know it? July 2018 13

Where you would use encryption and certificates in a mobile banking environment? storage Payment Backend Service Portal Build Portal Code security symmetric storage BANKING App BANKING API OS identity encryption Payment Reporting Development asymmetric certificates and what they are used for identity ios or Android identity encryption Bank Server Accounting encryption Build Server Admin Quantum Computing it s the end of the world as we know it? July 2018 14

OK, encryption is well understood and widely used so we are safe, right? Quantum Computing it s the end of the world as we know it? July 2018 15

Quantum computing has the potential to shake digital encryption to the core Remember this marvel? So what makes it so fundamentally different? Quantum Computing it s the end of the world as we know it? July 2018 16

The fundamental difference in quantum computing are the Qubits Classical bits Qubits 0 0 Impact When using Qubits, multiple operations can happen simultaneously Clear-cut, either 1 or 0, on or off 1 1 Multiple states at the same time ( superposition ) Dramatic speedup of certain calculations compared to classical bits Quantum Computing it s the end of the world as we know it? July 2018 17

Today s encryption will be effectively broken by quantum computers Effective key strengths Encryption type Algorithm Today: classical Future: quantum Asymmetric RSA-1024 RSA-2048 80 112 0 0 Symmetric ECC-256 ECC-521 AES-128 AES-256 128 128 256 256 0 0 64 128! SHA3-256 256 128 Quantum Computing it s the end of the world as we know it? July 2018 18

Runtime It is expected that one day, quantum computers will outperform classical ones Quantum computing Classical computing As number of useable qubits will increase, quantum computing will be able to solve problems that classical computers can not: Quantum Supremacy Number of qubits Quantum Computing it s the end of the world as we know it? July 2018 19

Number of qubits have been steadily increasing Qubits 80 60 40 20 0 1996 1998 2000 2002 2004 2006 2008 2010 2012 2014 2016 2018 2020 Year Quantum Computing it s the end of the world as we know it? July 2018 20

Time to panic? Not yet! Quantum Computing it s the end of the world as we know it? July 2018 21

Currently, qubits are very hard to scale and show high error rates Obstacles to build and run requires intensive cooling depends on high amount of magnetic shielding consumes a lot of energy In practice high error rates, reducing the effectiveness of the qubits! Quantum Computing it s the end of the world as we know it? July 2018 22

These obstacles still prevent breaking of today s encryption Question Approach How large is very large? How would one break a RSA key? Take a given very large number A and find its two factors B and C A = B * C RSA-2048 = 251959084756578934940271832400483985714292821262040320277 771378360436620207075955562640185258807844069182906412495 150821892985591491761845028084891200728449926873928072877 767359714183472702618963750149718246911650776133798590957 000973304597488084284017974291006424586918171951187461215 151726546322822168699875491824224336372590851418654620435 767984233871847744479207399342365848238242811981638150106 748104516603773060562016196762561338441436038339044149526 344321901146575444541784240209246165157233507787077498171 257724679629263863563732899121548314381678998850404453640 23527381951378636564391212010397122822120720357 What is the largest number factored using qubits and Shor s algorithm? 21 By the way, solution is 21 = 3 * 7 Quantum Computing it s the end of the world as we know it? July 2018 23

But we should still take it seriously The National Security Agency is advising US agencies and businesses to prepare for a time in the not-too-distant future when the cryptography protecting virtually all e-mail, medical and financial records, and online transactions is rendered obsolete by quantum computing. Quantum Computing it s the end of the world as we know it? July 2018 24

Actions to take to protect your customers and your organization 1 Follow announcements on recent developments, both from academia and the industry As new standards for 2 Identify the critical elements in your infrastructure depending on encryption post-quantum cryptography are being developed, here is what you can do 5 4 3 Per element, assess risks (potential damage) and effort to adapt Start drafting a transition plan in order to be prepared once new standards are published Be aware but don t panic Quantum Computing it s the end of the world as we know it? July 2018 25

Questions & Answers Dr. Philipp Schulte Corp. Development & Strategy G+D Group philipp.schulte@gi-de.com??? Dr. Christian Schläger Product Management Cyber Security G+D Mobile Security christian.schlaeger@gi-de.com Quantum Computing it s the end of the world as we know it? July 2018 26