Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Similar documents
Everything is Quantum The EU Quantum Flagship

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

Cryptography in a quantum world

POST-QUANTUM CRYPTOGRAPHY HOW WILL WE ENCRYPT TOMORROW?

Quantum Key Distribution and the Future of Encryption

Some Notes on Post-Quantum Cryptography

The Reality of Quantum Computing

The quantum threat to cryptography

The Quantum Threat to Cybersecurity (for CxOs)

Some Notes on Post-Quantum Cryptography

Quantum Cryptography

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

EU investment in Quantum Technologies

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Post-Quantum Cryptography & Privacy. Andreas Hülsing

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Quantum-resistant cryptography

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

The science behind these computers originates in

Cyber Security in the Quantum Era

Your Computer is Leaking. Ian J. Malloy.

Blockchain and Quantum Computing

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Quantum Wireless Sensor Networks

Information Security in the Age of Quantum Technologies

The quantum threat to cryptography

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

Quantum and quantum safe crypto technologies in Europe. Ales Fiala Future and Emerging Technologies European Commission

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Quantum Supremacy and its Applications

The Relativistic Quantum World

The Elliptic Curve in https

Quantum Technologies: Threats & Solutions to Cybersecurity

Introduction to Quantum Computing

Quantum threat...and quantum solutions

Quantum Computing is Here, Powered by Open Source. Konstantinos Karagiannis CTO, Security Consulting BT

Errors, Eavesdroppers, and Enormous Matrices

Secrets of Quantum Information Science

What are we talking about when we talk about post-quantum cryptography?

Quantum Technology: Challenges and Opportunities for Cyber Security. Yaoyun Shi University of Michigan

Post Quantum Cryptography. Kenny Paterson Information Security

Quantum Technologies for Cryptography

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

10 - February, 2010 Jordan Myronuk

ALICE IN POST-QUANTUM WONDERLAND; BOB THROUGH THE DIGITAL LOOKING-GLASS

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement and Quantum Key Distribution at ESA

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum-Safe Crypto Why & How? JP Aumasson, Kudelski Security

Lecture V : Public Key Cryptography

IBM Q: building the first universal quantum computers for business and science. Federico Mattei Banking and Insurance Technical Leader, IBM Italy

Risk management and the quantum threat

Mathematics of Public Key Cryptography

A brief survey of post-quantum cryptography. D. J. Bernstein University of Illinois at Chicago

Single and Entangled photons. Edward Pei

Selecting Elliptic Curves for Cryptography Real World Issues

Cryptographical Security in the Quantum Random Oracle Model

Quantum Computers. Peter Shor MIT

Post-quantum RSA. We built a great, great 1-terabyte RSA wall, and we had the university pay for the electricity

Quantum technology popular science description

Quantum Computing and the Possible Effects on Modern Security Practices

From NewHope to Kyber. Peter Schwabe April 7, 2017

Attacking the ECDLP with Quantum Computing

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Quantum Cryptography

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Public-key Cryptography and elliptic curves

CS257 Discrete Quantum Computation

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

1 What are Physical Attacks. 2 Physical Attacks on RSA. Today:

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Quantum Information Transfer and Processing Miloslav Dušek

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Introduction to Quantum Computing for Folks

Quantum Supremacy and its Applications

Quantum Entanglement Assisted Key Distribution

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

Quantum Cryptography and Security of Information Systems

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Cryptography CS 555. Topic 22: Number Theory/Public Key-Cryptography

Post-Quantum Cryptography from Lattices

Untrusted quantum devices. Yaoyun Shi University of Michigan updated Feb. 1, 2014

Device-Independent Quantum Information Processing (DIQIP)

Lecture 1: Introduction to Public key cryptography

Quantum computing and the entanglement frontier. John Preskill NAS Annual Meeting 29 April 2018

ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK

Quantum Information Processing and Diagrams of States

Algorithms, Logic and Complexity. Quantum computation. basic explanations! &! survey of progress

The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone. Quantum Information Nov. 12, 2002

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Quantum Cryptography

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Information Security

PQ Crypto Panel. Bart Preneel Professor, imec-cosic KU Leuven. Adi Shamir Borman Professor of Computer Science, The Weizmann Institute, Israel

Applications of Quantum Key Distribution (QKD)

9 Knapsack Cryptography

Transcription:

Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Contents Whats the problem? Surveillance Problem / Weak Crypto /& Threat Explain Quantum Computing superpositioning, entanglement, fragility, nocloning - types of computers/annealing/ universal What s everyone up to? DWAVE/DELFT/IBM/NSA Are we there yet? What are we going to do about it? Explain the Plan ( 3 steps ) Back up from NSA / AIVD -> key length ( maybe use time slide ) QKD explanation & QKD attacks Free Space Post Quantum explanation Lattice,Post Q attacks Soliliqy, SIDH Whats everyone doing Europe plan / UK / Chinese slides Crypto currencies Google quantum supremacy experiment w/in 1 year IBM cloud KPN

The Threat Intelligence agencies possess total information awareness - 2011 Location ; contacts & confederates; digital life dossier; Intelligence agencies fear of crypto Going Dark problem Despite Snowden revelations - lack of informed public opinion Renewed Global Crypto Wars NSA Programs : Black Budget for Quantum research Penetrating Hard Targets - project that aims to break strong encryption development of a Quantum Computer Owning the Net - facilitate offensive operations to compromise target networks where quantum is part of a larger program

So what s this quantum stuff about? Classical physics Before 1900 Describes the macroscopic world Deterministic Intuitive Quantum physics After 1900 Describes of the microscopic world Probabilistic Central role of the observer Not very intuitive When will the Post Quantum Era arrive? A World with quantum computers

What are the properties of a quantum computer? Current computers use bits but quantum computers use qubits.

Entanglement It thus appears that one particle of an entangled pair "knows" what measurement has been performed on the other, and with what outcome, even though there is no known means for such information to be communicated between the particles, which at the time of measurement may be separated by arbitrarily large distances Its entanglement that gives quantum computing the ability to scale exponentially, as entangled qubits can represent 4 states. The more linked qubits, exponential increase in states and thus computing power.

Entanglement Loophole Free Bell Test Ronald Hanson TU Delft Spooky Action at a distance

Fragility & No-Cloning

There s more than 1 type of Quantum Computer? Quantum Annealer Analog Quantum Universal Quantum Computer

What s it all mean? Amdahl s Law & processing power Shor integer factorization Grover unsorted database Other really cool stuff Everyone is trying to do this globally European Commission 1bn Euros

Are we there yet? Viable Quantum Computer:: currently no

What are we going to do about it? 1. Increase Key Length of Current Crypto used 2. Investigate options for Quantum Key Distribution for high critical links with demands for long term secrecy 3. Investigate Post Quantum Cryptographic Algorithms and determine deployment strategy

Key length -> NSA Advice IAD will initiate a transition to quantum resistant algorithms in the not too distant future. Our ultimate goal is to provide cost effective security against a potential quantum computer.

Quantum Key Distribution QKD

QKD

Free Space QKD

Global Developments Qiang Zhang Uni. of Science & Technology of China

Post Quantum Cryptography PQCRYPTO A new hope PQCRYPTO.org -> Tanja Lange & Dan Bernstein Lattice Based - McElise since 1978 CESG & Soliliqy Supersingular Isogeny Diffie Hellman (SIDH) aka- the hottest thing we have Phil Zimmermann - Post Quantum Crypto at internet scale Without quantum-safe encryption, everything that has been transmitted, or will ever be transmitted, over a network is vulnerable to eavesdropping and public disclosure. ETSI

KPN s Quantum leap with IDQuantique

In Conclusion. We re just getting started IBM Public Access to Quantum Computing Platform 5 qubits Google Quantum Supremacy Experiment 50 qubits -within 1 year What we will need in coming days, months, years: Common way forward http://youtu.be/coxmjth06zl Providing thought leadership and action in the field of future security controls Combining options for defense in depth like we re used to

THANK YOU! Questions? Comments? Stuff? Jaya Baloo Jaya.baloo@kpn.com Thanks to all web content folks for images that were borrowed!