Quantum threat...and quantum solutions

Similar documents
Quantum Technologies: Threats & Solutions to Cybersecurity

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Cyber Security in the Quantum Era

Applications of Quantum Key Distribution (QKD)

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK

C. QUANTUM INFORMATION 111

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography in a quantum world

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing

Quantum Cryptography. Marshall Roth March 9, 2007

C. QUANTUM INFORMATION 99

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Cryptography and Security of Information Systems

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

Introduction to Quantum Cryptography

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016

Ping Pong Protocol & Auto-compensation

Quantum Cryptography

Information Security in the Age of Quantum Technologies

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography

Ground-Satellite QKD Through Free Space. Steven Taylor

Quantum Communication

Standardization of Quantum Cryptography in China

Quantum cryptography and quantum hacking. Dr. Lars Lydersen

Realization of B92 QKD protocol using id3100 Clavis 2 system

Quantum Cryptography

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Quantum Information. and Communication

Introduction on Block cipher Yoyo Game Application on AES Conclusion. Yoyo Game with AES. Navid Ghaedi Bardeh. University of Bergen.

Quantum Key Distribution. The Starting Point

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

Quantum Wireless Sensor Networks

Notes for Lecture 17

APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Cryptographical Security in the Quantum Random Oracle Model

Security of Quantum Key Distribution with Imperfect Devices

APPLICATIONS. Quantum Communications

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Lecture 17 - Diffie-Hellman key exchange, pairing, Identity-Based Encryption and Forward Security

Number theory (Chapter 4)

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

High rate quantum cryptography with untrusted relay: Theory and experiment

Lecture V : Public Key Cryptography

10 - February, 2010 Jordan Myronuk

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin

How to Use Short Basis : Trapdoors for Hard Lattices and new Cryptographic Constructions

Public Key Cryptography

Verification of the TLS Handshake protocol

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW?

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

Discrete Logarithm Problem

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Quantum Key Distribution and the Future of Encryption

arxiv: v7 [quant-ph] 20 Mar 2017

Entanglement and Quantum Key Distribution at ESA

Contents. ID Quantique SA Tel: Chemin de la Marbrerie 3 Fax : Carouge

A probabilistic quantum key transfer protocol

Introduction to Quantum Key Distribution

Solution to Midterm Examination

Introduction to Cryptography. Lecture 8

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Other Topics in Quantum Information

From NewHope to Kyber. Peter Schwabe April 7, 2017

Practical aspects of QKD security

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Fundamentals of Modern Cryptography

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

Quantum Cryptography

Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled Light

Research, Development and Simulation of Quantum Cryptographic Protocols

Cryptography. Lecture 2: Perfect Secrecy and its Limitations. Gil Segev

Fundamental rate-loss tradeoff for optical quantum key distribution

arxiv: v1 [quant-ph] 4 Mar 2009

Quantum key distribution

Everything is Quantum The EU Quantum Flagship

Quantum key distribution for the lazy and careless

The Quantum Threat to Cybersecurity (for CxOs)

Extracting a Secret Key from a Wireless Channel

Noisy Diffie-Hellman protocols

My brief introduction to cryptography

Cryptography: the science of secret communications

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Communications Quantiques

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Nano and Biological Technology Panel: Quantum Information Science

Pseudonym and Anonymous Credential Systems. Kyle Soska 4/13/2016

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Transcription:

Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017

Outline Presentation of ID Quantique The Quantum Threat Quantum Solutions (1): QRNGs Quantum Solutions (2): QKD Integration of QKD in optical networks today Towards a world-wide QKD network Conclusion 2017 ID Quantique SA, Switzerland page 2

ID Quantique Company Profile Founded in 2001 Geneva, Switzerland Key technology: photon counting Three business units: Photon counting & Instrumentation Quantis: Quantum Random Number for Key Generation Quantum-Safe Security Performs R&D, production, professional services, integration, support Clients : Governments / Banks / Gaming Industry / Universities / IT Security 2017 ID Quantique SA, Switzerland page 3

The Quantum Threat The hacker s point of view today and after the Quantum Computer 2017 ID Quantique SA, Switzerland page 4

QUANTUM SOLUTION (1): QUANTUM KEY GENERATION 2017 ID Quantique SA, Switzerland page 5

True Random Number Generator based on Quantum Physics 0 0 1 1 0 1 Photons Source of photons Semi-transparent mirror 1 2017 ID Quantique SA, Switzerland page 6

QUANTUM SOLUTION (2): QUANTUM KEY DISTRIBUTION 2017 ID Quantique SA, Switzerland page 7

Quantum Key Distribution (QKD): Basic idea Eve Alice Message Encryption Scrambled Message Decryption Bob Message Secret Key Secret Key Fragile! 2017 ID Quantique SA, Switzerland page 8

QKD: The quantum Channel Alice Bob Tapping is not useful Eve 2017 ID Quantique SA, Switzerland page 9

QKD: The quantum Channel Classical Service Channel Alice but active eavesdropping modifies the states and generate errors, which will be detected through discussions over the Service Channel Eve Bob 2017 ID Quantique SA, Switzerland page 10

QKD: Pros & Cons Pros Based on different principle (physics) Not impacted by QC Provable security of transmission Real-time eavesdropping possible only Adds one layer of security Cons Need physical infrastructure Limited distance between nodes (to date) Only part of the solution: Needs conventional crypto to use the key (e.g. symmetric key encryption); And post-quantum Authentication More complicated and costly to implement Useful for high-level and long-term security 2017 ID Quantique SA, Switzerland page 11

INTEGRATING QKD IN QUANTUM-SAFE SECURITY INFRASTRUCTURE 2017 ID Quantique SA, Switzerland page 12

All links are NOT born equal! Safety has to be adapted to the communication links. 2017 ID Quantique SA, Switzerland page 13

Use QKD today as an add-on to current encryption systems Internal or external CA Quantum Key Distribution (QKD) Public Key Agreement Master Key Session Key Agreement Quantum Key Bit-by-bit XOR Session Key Super Session Key for forward secrecy Encryption 2017 ID Quantique SA, Switzerland page 14

Use QKD today for Critical Links 2017 ID Quantique SA, Switzerland page 15

Towards integration in security infrastructure ROADMAP FOR QKD Trusted Nodes for long-distance QKD Free Space QKD with satellites Global QKD Network based on Quantum Memories 2017 ID Quantique SA, Switzerland page 16

Step 1: Long distance QKD with Trusted Nodes 2017 ID Quantique SA, Switzerland page 17

What about longer links: The Chinese Quantum Backbone 2017 ID Quantique SA, Switzerland page 18

Step 2: A Global Network Based on Free Space QKD Free Space QKD - QKD links with LEO satellites - LEO acts as a trusted node to transport the key to the necessary location. Free space QKD is moving out of the lab & into industry o o o Chinese have launched a QKD satellite in August 2016 and QKD system in space station in September. Worldwide interest at the academic/government level IDQ has started feasibility studies for practical systems (Eurostars and Swiss Space Office) 2017 ID Quantique SA, Switzerland page 19

Step 3 : A world-wide QKD infrastructure Build a QKD infrastructure based on Quantum Memories (QM) Each node exchanges QMs with the others Customers come to any node to recharge their QMs (similar to bank notes and ATM infrastructure) Nodes need not be trusted anymore 2017 ID Quantique SA, Switzerland page 20

In Conclusion What the Quantum has taken away the Quantum can give back! 2017 ID Quantique SA, Switzerland page 21

For more information http://www.idquantique.com 2017 ID Quantique SA, Switzerland page 22