QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

Similar documents
Cryptography in a quantum world

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Quantum Cryptography

Quantum Key Distribution and the Future of Encryption

The Relativistic Quantum World

Quantum Information & Quantum Computation

Cyber Security in the Quantum Era

The Reality of Quantum Computing

Cryptographical Security in the Quantum Random Oracle Model

Introduction to Quantum Computing

Security Implications of Quantum Technologies

226 My God, He Plays Dice! Entanglement. Chapter This chapter on the web informationphilosopher.com/problems/entanglement

Report on Conceptual Foundations and Foils for QIP at the Perimeter Institute, May 9 May

Why Quantum Technologies?

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Quantum Computing. Quantum Computing. Sushain Cherivirala. Bits and Qubits

The quantum threat to cryptography

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW?

Algorithms, Logic and Complexity. Quantum computation. basic explanations! &! survey of progress

Quantum Information Processing

Future of Quantum Science and Technology

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

Quantum Technologies for Cryptography

Quantum Wireless Sensor Networks

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Computation, NP-Completeness and physical reality [1] [2] [3]

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Quantum Information Transfer and Processing Miloslav Dušek

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

An Introduction to Quantum Information and Applications

The Weird World of Quantum Mechanics

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

6.080/6.089 GITCS May 6-8, Lecture 22/23. α 0 + β 1. α 2 + β 2 = 1

10 - February, 2010 Jordan Myronuk

C. QUANTUM INFORMATION 111

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan

Lecture 1: Introduction to Quantum Computing

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

Classical Verification of Quantum Computations

Advanced Cryptography Quantum Algorithms Christophe Petit

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Lecture th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics

Quantum Programming. Juliana K. Vizzotto 1 and Amr Sabry 2. 8 November Yale CS Colloquium Page 1. 1 Federal University of Rio Grande do Sul

What are we talking about when we talk about post-quantum cryptography?

Introduction to Quantum Computing

QOT - Quantum Optical Technologies

Quantum Computers Is the Future Here?

Introduction to Quantum Computing

Quantum Teleportation Pt. 3

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

Quantum Cryptography

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Quantum Computing: Foundations to Frontier

How Quantum Can a Computer Be? 1

The Future. Currently state of the art chips have gates of length 35 nanometers.

Lecture 1: Introduction to Quantum Computing

Secrets of Quantum Information Science

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

Quantum Entanglement. Chapter Introduction. 8.2 Entangled Two-Particle States

MAA509: Quantum Computing and Information Introduction

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Week 11: April 9, The Enigma of Measurement: Detecting the Quantum World

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

Lecture 22: Quantum computational complexity

Basics on quantum information

Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L.

Quantum Computing: Foundations to Frontier Fall Lecture 3

Introduction to Quantum Computing for Folks

C. QUANTUM INFORMATION 99

Quantum Key Distribution. The Starting Point

Quantum Information Science (QIS)

arxiv: v7 [quant-ph] 20 Mar 2017

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Entanglement and information

Quantum Cryptography

Tele9757 Quantum Communications Course Outline 2015

Secrecy and the Quantum

Quantum Optics and Quantum Informatics 7.5hp (FKA173) Introductory Lecture

IBM Q: building the first universal quantum computers for business and science. Federico Mattei Banking and Insurance Technical Leader, IBM Italy

LECTURE NOTES ON Quantum Cryptography

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

Lecture 10: Zero-Knowledge Proofs

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Quantum Computing. Part I. Thorsten Altenkirch

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

3/10/11. Which interpreta/on sounds most reasonable to you? PH300 Modern Physics SP11

Quantum Computing. Thorsten Altenkirch

6.080 / Great Ideas in Theoretical Computer Science Spring 2008

Basics on quantum information

Transcription:

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

QUANTUM COMPUTING: I CAN SUM IT UP IN ONE SLIDE Pure Magic! 2

SERIOUSLY: HOW DOES IT WORK? That s simple: Even Justin Trudeau knows it! It works by harnessing the quantum phenomenon where Particles can be in multiple states at the same time Multiple places at the same time Looking at (reading the state) will change the state Nothing is really under control including the states and read-outs No one knows if a quantum algorithm when run will give the correct output (probabilistic) But it works 3

LET S TRY THIS AGAIN: HOW DOES IT WORK? Honestly, no one really understands QM! 4

HOW CAN SCIENTISTS ACCEPT SUCH A THING? That s the toughest part most engineers/scientists cannot accept not understanding the underlying systems that they are working with So most don t care for quantum computing and that s perfectly fine! The smart ones, however, avoid asking the tough questions It is how it is tell me how can I make money off of this! 5

LET S GET TO IT THEN Quantum computing: analogue computing based on principles of quantum mechanics Quantum cryptography: uses photons as quantum particles to achieve secure key distribution over insecure public channels Contrary to common thinking, these are completely different from each other Hardly anything common between them in terms of implementation/technology used Quantum computing is in its early stages Quantum cryptography is mature enough - buy off-the-shelf 6

QUANTUM COMPUTING NEWS IN LAST WEEK China s new quantum computing device built inside a diamond Factor 35 into 5 and 7 Computerworld: It s time to decide how quantum computing will help your business Planning must start right now: 5-10 years away Phys.org: New materials bring quantum computing closer to reality Trendintech.com: Quantum computers sound great but who will program them Singularityhub.com: Quantum computing demands a whole new kind of programmer Wired.com: The bizarre quantum test that could keep your data secure Trendintech.com: Europe takes quantum computing to the next level with this billion euro project 7

LET S FIRST TALK ABOUT QUANTUM COMPUTING Quantum mechanics was born in early 20 th century An attempt to make sense of experimental observations Most famous is the Young s double slit experiment one particle appears to be in multiple places at the same time Einstein famously disliked quantum mechanics In an attempt to prove it wrong, he published the famous paper on EPR pairs Also known as Entangled particles Two particles separated by infinite amount of distance can be entangled a interaction with one will instantaneously change the other Goes against theory of relativity: nothing can travel faster than speed of light Max Born, Heisenberg, Pauli: coined the term quantum mechanics circa 1924 Schrodinger, Dirac, etc. Quantum computing: The idea mainly originated in 1980s paper by Feynman 8

TIMELINE (INTERSPERSED WITH CRYPTO) Quantum cryptography arguably started around 1970s 1970: Stephen Wiesner tried to publish a paper on unclonable electronic money 1973: Bennett provided a model for reversible Turing machine 1980-82: Paul Benioff developed the quantum Turing machine that does not dissipate any energy 1982: Feynman said we should build a quantum computer 1982: No-cloning theorem introduced 1984: Bennett and Brassard developed the first quantum cryptography protocol that provides unconditional security 1985: Deutsch gave a model for universal quantum computer 9

TIMELINE CONTINUED 1993: Quantum teleportation introduced 1992 (Bang!): Deutsch introduced the first quantum algorithm that is faster than classical algorithms 1994: Shor introduced a factoring algorithm that would destroy modern public-key cryptography 1995: Shor developed a 9-qubit quantum error correcting code 1996: Quantum search algorithm by Grover New decision algorithms and Quantum Artificial Intelligence Immense progress in the area of quantum information theory 10

QUANTUM COMPUTING: WHAT MADE IF FAMOUS Factorization in log n steps rather than n 1/2 steps [Shor] Database search in n 1/2 rather than n steps [Grover] 11

QUANTUM PRIMITIVES Superposition Collapse upon measurement Deterministic evolution (Schrödinger equation) No cloning of an unknown state Counter-intuitive behavior of objects New quantum information science 12

WHAT MAKES QUANTUM COMPUTERS SO POWERFUL: QUANTUM REGISTER IN SUPERPOSITION Each cell has a qubit. Number of states is 2 n 1 2 3 4 5..... n 13

DEUTSCH S ALGORITHM 14

GROVER S SEARCH ALGORITHM: UNSORTED DATABASE 15

IBM QUANTUM COMPUTER: A 5-QUBIT COMPUTER 16

BREAKING NEWS: THIS MORNING IS THIS MOORE S LAW IN EXPONENTIAL FORM? 17

OTHER COMPANIES Google s quantum computer: https://www.technologyreview.com/s/544421/googles-quantum-dream-machine/ Google s project estimates that Martinis s group can make a quantum annealer with 100 qubits as soon as 2017 haven t heard anything yet https://en.wikipedia.org/wiki/list_of_companies_involved_in_quantum_computi ng_or_communication 18

DWAVE: WHAT APPLICATIONS IS IT CURRENTLY BEING USED FOR? Good to break widely used crypto (potentially) Modeling quantum mechanical processes: behavior of atoms/particles Optimization problems (D-Wave) Radiotherapy optimization Protein Folding Water Network Optimization Machine learning Object Detection Labeling News Stories Video Compression Monte-Carlo Simulation 19

QUANTUM COMPUTING IMPACT ON CRYPTOGRAPHY NIST Timeline: Fall 2016 formal Call for Proposals Nov 2017 Deadline for submissions 3-5 years Analysis Phase 2 years later Draft standards ready 20

CRYPTOGRAPHY IN A QUANTUM WORLD Quantum Cryptography we ll discuss this next Classical Cryptography believed to be resistant to Quantum Attacks Lattice-based crypto Multivariate polynomials based crypto Hash-based crypto Error-correction code based crypto Supersingular elliptic curve isogeny crypto Several other candidates 21

WHICH ONE SHOULD WE ADOPT? NIST is playing it safe There are already classical systems deployed and hence does not want to take the leap to quantum crypto New classical algorithm don t have security proofs either There may be another quantum computing algorithm discovered tomorrow that may break them For us unfortunately it is what it is Once there are quantum computers, it is natural to phase out classical cryptographic algorithms Maybe this will become a fall back 22

QUANTUM COMPUTING: AT PRESENT NO ONE KNOWS HOW POWERFUL THEY ARE 23

QUANTUM CRYPTOGRAPHY Replace public key encryption systems Therefore provides a way to exchange encryption keys 24

QUANTUM CRYPTOGRAPHY: OTHER APPLICATIONS Quantum random number generator Quantum secret sharing: key management Semi quantum communication: one side quantum other classical Quantum teleportation Secure direct communication Position based quantum cryptography Superdense coding 25

THERE IS A LOT THAT QUANTUM CRYPTO CANNOT DO What it does, it does with perfect secrecy but there is a lot that it cannot do Bit commitment protocols (online gambling) Secure multiparty computations No homomorphic encryption Cannot work over large distances Does not solve the authentication problem 26

PHYSICAL IMPLEMENTATIONS Difficult to manufacture single photon emitters and detectors As a result, several implementation based attacks exist on QKD systems Number of newer protocols fix these issues: Decoy state protocol Device-independent cryptography 27

QUANTUM PROGRAMMING LANGUAGES Race to be The programming language for quantum computers Wikipedia has a reasonably good article Quantiki.org is a quantum Wikipedia and has great amounts of detail 28

QKD AT UNIVERSITY OF NEBRASKA OMAHA 29

QUASIM: A QUANTUM GAME BEING BUILT AT UNO: NSF FUNDED 30

THANK YOU! Words of Great Charles Bennett A Founder of quantum information theory: https://www.youtube.com/watch?v=9q-qoeqvvd0 Talk to your kids about quantum theory before it s too late: https://imgur.com/gallery/ftilh 31