Quantum Cryptography Christian Schaffner ICT OPEN 2017

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
1 Introduction to Information Security , Spring 2015 Lecture 7: Applied cryptography: asymmetric Eran Tromer Slides credit: John Mitchell, Stanford.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Midterm Review Cryptography & Network Security
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Amsterdam.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Exam Review for First Half of C430 2 May pm in Huxley 308 Michael Huth 2 May pm in Huxley 308 Michael Huth.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Nawaf M Albadia
Potential vulnerabilities of IPsec-based VPN
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Formal Verification of Quantum Cryptography Dominique Unruh University of Tartu.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Secret Key Cryptography
A Summary in Fifteen Minutes mas y menos
Web Applications Security Cryptography 1
Hash Functions Which of these problems is easier to solve:
Asymmetric-Key Cryptography
Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council.
A Simple Provably Secure AKE from the LWE Problem
Chuck Frank Northern Kentucky University
Computer Communication & Networks
Privacy & Security.
COMPSCI 290.2: Computer Security
CMSC 414 Computer and Network Security Lecture 15
Chapter 8 Network Security.
Quantum Cryptography Quantum Computing
Basic Network Encryption
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Preparing for the Quantum Era Michele Mosca 16 January 2018
Digital Signatures Last Updated: Oct 14, 2017.
Practical Aspects of Modern Cryptography
Quantum Key Distribution
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Cryptography and Security Fall 2009 Steve Lai
Quantum Cryptography Christian Schaffner
Quantum Cryptography Alok.T.J EC 11.
Cryptography Lecture 24.
Security in Network Communications
Chuck Frank Northern Kentucky University
Introduction to Symmetric-key and Public-key Cryptography
Encryption NSA – used to be able to crack most codes, technology has changed that. Now other methods are applied by NSA to access transmissions (see 2013.
Cryptography: Basics (2)
Quantum Cryptography Scott Roberts CSE /01/2001.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Practical Aspects of Modern Cryptography
Encryption NSA – used to be able to crack most codes, technology has changed that Encryption is the art of encoding messages so they can’t be understood.
Basic Network Encryption
Quantum Cryptography Quantum Computing
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Cryptology Design Fundamentals
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Quantum Cryptography Quantum Computing
Presentation transcript:

Quantum Cryptography Christian Schaffner ICT OPEN 2017 Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica ICT OPEN 2017 Tuesday, 21 March 2017

Keynote: Quantum Computer Barbara Terhal Where we stand with building This talk: What are the effects on cryptography?

Talk Outline When do we need to worry? Classical Cryptography Impact of Quantum Computers on Crypto When do we need to worry? Solutions Quantum Future

Ancient Cryptography Blaise de Vigenère Scytale Caesar Cipher (ROT4) 50 BC 500 BC Scytale 500 AD 1000 AD 2015 AD 1500 AD Caesar Cipher (ROT4)

Ancient Cryptography Charles Babbage Claude Shannon Diffie / Hellman 1850 1800 1900 1950 2015 Charles Babbage 1976 Claude Shannon Diffie / Hellman Auguste Kerckhoffs “A cryptosystem should be secure even if everything about the system, except the key, is public knowledge” Enigma Alan Turing

Modern Cryptography is everywhere! is concerned with all settings where people do not trust each other

Cyber Security “Cyber Security in the Netherlands is an important focal area that provides security, safety and privacy solutions that are vital for our economy including but not limited to critical infrastructures, smart cities, cloud computing, online services and e-government.” Cloud computing Internet of Things (IoT) Payment systems eHealth Auto-updates – Digital Signatures Secure Browsing - TLS/SSL VPN – IPSec Secure email – s/MIME, PGP RSA, DSA, DH, ECDH, … AES, 3-DES, SHA, … Based on slides by Michele Mosca

Quantum Effects Classical bit: 0 or 1 Quantum bit: can be in superposition of 0 and 1 Yields a more powerful computational model: 1. Shor’s algorithm allows to efficiently factor integers 2. Grover’s algorithm allows to search faster You are all familiar with classical bits who can be 0 or 1. In quantum mechanics, we like to think of them as orthogonal directions: say horizontal for 0, and vertical for 1. Now, a quantum bit can be both 0 and 1 at the same time, it can be in a “superposition” of them, you can think of them as these two 45-degree directions. This ability to be in superposition yields a more powerful computational model, the most famous example being Shor’s algorithm which allows to factor large integer number efficiently on a quantum computer. Another peculiarity of quantum mechanics is the “no-cloning theorem” which says that if we have an unknown quantum state, say one of our four states here, and we want to make a perfect clone of this state (like with Dolly the sheep). That is not allowed by quantum mechanics. You see, the inability of copying information already smells like cryptography, and indeed.

Current Crypto under Quantum Attacks 9 Security level systems Conventional attacks Quantum attacks Symmetric-key encryption (AES-256) 256 bits 128 bits Hash functions (SHA3-256) 85 bits Public-key crypto (key exchange, digital signatures, encryption) (RSA-2048) 112 bits ~ 0 bits Public-key crypto (ECC-256) Fastest algorithms for ECC need O(sqrt(n)) steps Products, services, businesses relying on security either stop functioning or do not provide expected levels of security

When do we need to worry? Depends on: How long do you need to keep your secrets secure? (x years) How much time will it take to re-tool the existing infrastructure? (y years) How long will it take for a large-scale quantum computer to be built? (z years) Theorem (Mosca): If x + y > z, then worry. y x The majority of the current work in quantum cryptography is spent on securing communication between Alice and Bob who want to communicate over an insecure line overheard by Eve. For this problem, quantum cryptography offers a solution called “Quantum Key Distribution” which exploits the no-cloning theorem. On the other hand, the standard classical solution for securely communicating on the internet is the RSA public-key scheme, whose security is based on the difficulty of factoring large integers. If a quantum computer is built, Shor’s factoring algorithm would render basically all of the internet communication insecure. secrets revealed z time 2017 2027 Corollary: If x > z or y > z, you are in big trouble! Slide by Michele Mosca

Talk Outline Classical Cryptography Impact of Quantum Computers on Crypto When do we need to worry? Solutions Quantum Future

Solution: Quantum-Safe Cryptography Conventional quantum-safe cryptography (post-quantum crypto) Can be deployed without quantum technologies Believed to be secure against quantum attacks of the future Quantum Cryptography Requires some quantum technology (but no large-scale quantum computer) Typically no computational assumptions The majority of the current work in quantum cryptography is spent on securing communication between Alice and Bob who want to communicate over an insecure line overheard by Eve. For this problem, quantum cryptography offers a solution called “Quantum Key Distribution” which exploits the no-cloning theorem. On the other hand, the standard classical solution for securely communicating on the internet is the RSA public-key scheme, whose security is based on the difficulty of factoring large integers. If a quantum computer is built, Shor’s factoring algorithm would render basically all of the internet communication insecure. Slide by Michele Mosca

Quantum Cryptography Landscape 13 Security level systems Conventional attacks Quantum attacks Symmetric-key encryption (AES-256) 256 bits 128 bits Hash functions (SHA3-256) 85 bits Public-key crypto (key exchange, digital signatures, encryption) (RSA-2048) 112 bits ~ 0 bits Hash-based signatures probably McEliece Lattice-based Quantum Key Distribution (QKD) provable technical difficulty (€) add link to BB84 Qantum-safe Crypto

Conventional Quantum-Safe Crypto Wanted: new assumptions to replace factoring and discrete logarithms in order to build conventional public-key cryptography

U No-Cloning Theorem ? ? ? Proof: copying is a non-linear operation Quantum operations: ? ? ? information vs disturbance trade-off Proof: copying is a non-linear operation

Quantum Key Distribution (QKD) [Bennett Brassard 84] 16 Alice Bob k = ? k = 0101 1011 k = 0101 1011 Eve Offers an quantum solution to the key-exchange problem which does not rely on computational assumptions (such as factoring, discrete logarithms, security of AES, SHA-3 etc.) Puts the players into the starting position to use symmetric-key cryptography (encryption, authentication etc.). add link to BB84

Quantum Key Distribution (QKD) [Bennett Brassard 84] 17 Alice Bob Eve technically feasible: no quantum computer required, only quantum communication

Quantum Networks 2000km QKD backbone network between Beijing and Shanghai first QKD satellite launched in 2016 from China Applied for funding to build the first quantum network in NL Quantum entanglement allows to generate secure keys (like QKD)

Secure Computing in Quantum Cloud Distributed quantum computing Recent result: quantum homomorphic encryption allows for secure delegated quantum computation Y. Dulek, C. Schaffner, and F. Speelman, arXiv:1603.09717 Quantum homomorphic encryption for polynomial-sized circuits, in CRYPTO 2016, QIP 2017

Summary Cyber Security Impact of Quantum Computing on crypto Cloud computing Internet of Things (IoT) Payment systems, eHealth Auto-updates – Digital Signatures Secure Browsing - TLS/SSL VPN – IPSec Secure email – s/MIME, PGP RSA, DSA, DH, ECDH, … AES, 3-DES, SHA, … Cyber Security Impact of Quantum Computing on crypto Security level systems Conventional attacks Quantum attacks Symmetric-key crypto 128 bits reduced Public-key crypto 112 bits broken! Thm: If x + y > z, then worry

Summary Quantum-safe crypto: Quantum Key Distribution, Quantum Cloud Conventional quantum-safe cryptography (post-quantum crypto) Quantum Cryptography

Thank you for your attention! Questions check http://arxiv.org/abs/1510.06120 for a recent survey on quantum cryptography beyond key distribution