Cybersecurity in a post-quantum world

Slides:



Advertisements
Similar presentations
Electron Configuration and New Atomic Model Chapter 4.
Advertisements

The Arrangement of Electrons in Atoms
Chapter 15: Duality of Matter Did you read chapter 15 before coming to class? A.Yes B.No.
Pre-IB/Pre-AP CHEMISTRY
Electromagnetic Radiation and Atomic Structure EMR and Properties of Light Bohr Model of the Atom & Atomic Line Spectra Quantum Theory Quantum Numbers,
Quantum Entanglement David Badger Danah Albaum. Some thoughts on entanglement... “Spooky action at a distance.” -Albert Einstein “It is a problem that.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
The Development of a New Atomic Model.
Electrons in Atoms The Quantum Model of the Atom.
Chemistry 40S Unit 2 – Atomic Structure Lesson 2.
Chapter 7: Electronic Structure Electrons in an atom determine virtually all of the behavior of the atom. Quantum theory – the study of how energy and.
Particles (matter) behave as waves and the Schrödinger Equation 1. Comments on quiz 9.11 and Topics in particles behave as waves:  The (most.
Quantum Theory. Black Body Radiation Temperature determines the wavelength of emitted light. “Red hot”: mostly red light - 3,000 o C. “White hot”: all.
By Ryan Deetscreek and Greg Goettner
The Quantum Model of the Atom. Proposed that the photoelectric effect could be explained by the concept of quanta, or packets of energy that only occur.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Chapter 4 Notes for those students who missed Tuesday notes.
Section 2 The Quantum Model of the Atom Lesson Starter Write down your address using the format of street name, house/apartment number, and ZIP Code. These.
Electromagnetic Spectrum Light as a Wave - Recap Light exhibits several wavelike properties including Refraction Refraction: Light bends upon passing.
Copyright © by Holt, Rinehart and Winston. All rights reserved. ResourcesChapter menu Section 1 The Development of a New Atomic Model Properties of Light.
Atomic Particles  Atoms are made of protons, neutrons and electrons  % of the atom is empty space  Electrons have locations described.
Quanta to Quarks Focus Area 2. Wait…Electrons are waves? In explaining the photoelectric effect, Einstein introduced a model of electromagnetic radiation.
1 High School Technology Initiative © 2001 Quantum History Pasteurization 1861 Albert Einstein 1905 Louis de Broglie 1924 Max Planck 1900 Columbus discovers.
Objective 6: TSW explain how the quantum mechanical model evolved from Bohr’s model.
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
The Quantum Model of the Atom Section 4.2. Bohr’s Problems Why did hydrogen’s electron exist around the nucleus only in certain allowed orbits? Why couldn’t.
The Development of a New Atomic Model  The Rutherford model of the atom was an improvement over previous models of the atom.  But, there was one major.
Mullis Chemistry Holt Ch.41 Arrangement of Electrons in Atoms Principles of electromagnetic radiation led to Bohr’s model of the atom. Electron location.
Quantum Theory By: Brian Williams. Blackbody Radiation Around the turn of the 20 th century, physicists were studying the total energy carried by all.
The Dilemma  Particles have mass and a specific position in space (matter)  Waves have NO mass and NO specific position in space (light and energy)
4.1 Refinements of the Atomic Model
Introduction to Quantum Computing
FNI 1H Quantum Mechanics 1 Quantum Mechanics I don't like it, and I'm sorry I ever had anything to do with it. -- Erwin Schrodinger talking about Quantum.
Enriched Chemistry Chapter 4 – Arrangement of Electrons in Atoms
Copyright © by Holt, Rinehart and Winston. All rights reserved. ResourcesChapter menu Table of Contents Chapter 4 Arrangement of Electrons in Atoms Section.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
QUANTUM COMPUTERS, COMPUTING AND INFORMATION ALAN DURNEV, PHYSICS.
Quantum Computers By Ryan Orvosh.
Chapter 4 © Houghton Mifflin Harcourt Publishing Company Section 2 The Quantum Model of the Atom Electrons as Waves French scientist Louis de Broglie suggested.
Chemistry I Chapter 4 Arrangement of Electrons. Electromagnetic Radiation Energy that exhibits wavelike behavior and travels through space Moves at the.
Norman Littlejohn COSC480.  Quantum Computing  History  How it works  Usage.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Entangled Electrons.
UNIT 1: Structure and properties wave mechanical model
Second quantum revolution, or Why it’s time to study quantum physics
Atom Building Game Part Two: Electrons. Atom Building Game Part Two: Electrons.
Chapter 4: Arrangement of Electrons in Atoms
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Emergence of Modern Science
Electromagnetic Radiation
QUANTUM CRYPTOGRAPHY.
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Electronic Structure and Light
Quantum Model of the Atom
The Quantum Model of the Atom.
14.2 Electrons in the atom Each different element has its own characteristic pattern of colors called a spectrum. The colors of clothes, paint, and.
Quantum Cryptography Alok.T.J EC 11.
Electromagnetic spectrum
Arrangement of electrons
The Quantum Model of the Atom
Electromagnetic spectrum
Light and Energy Electromagnetic Radiation is a form of energy that is created through the interaction of electrical and magnetic fields. It displays wave-like.
Chapter 4 Quantum Numbers and e- configurations
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Presentation transcript:

Cybersecurity in a post-quantum world Welcome to the future Cybersecurity in a post-quantum world drhgfdjhngngfmhgmghmghjmghfmf http://idealeague.net/wp-content/uploads/2015/03/newqubitcont.jpg Yacine merdjemak Software Engineer, Risk & Infrastructure Science Center Global Security Sciences Argonne National Laboratory Homeland Defense & Security Education Summit March 23-24, 2017 George Mason University, Arlington, VA

What’s happening…?

Cybersecurity http://uwf.edu/go/cybersecurity/

What’s happening...? D-Wave Quantum computing Leading quantum computing company Canadian based, founded in 1999 Currently features a 2000-Qubit quantum system 1000 times faster than previous generation D-Wave 2X™ system Recently formed an independent subsidiary for the U.S Government Partners with NASA, Google, and Lockheed Martin

What’s happening...? Quantum computing IBM Q QxBranch Rigetti Release it’s 5 qubit experimental computer in the form of a cloud service (May, 2016) QxBranch Based in Australia QxBranch currently collaborates with leading firms to develop strategies for engaging this quantum computing technology. Partners with Lockheed Martin Rigetti Based in Berkeley, CA Developing cloud-deployed quantum computers

Public key cryptography The eavesdropper problem Alice (sender) Bob (receiver) Public Key Plaintext Plaintext Public Key RSA Encryption Algorithm RSA Decryption Algorithm http://uwf.edu/go/cybersecurity/ Eve (Eavesdropper) Ciphertext Public Channel (internet) Ciphertext Private Key

Cracking the key What if …. -----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAgb9XVQ+X4+Hvj0kcgevRH3avSY2wMctUY6XWKOuiOawoSpBPFs653ndqK6+U 6VSqsjs+blf9+wBFPvPglGgNhbiM7QWYX+4tuZ8ibtZCLkoMr+smaTOZqDsr0QbfdB206glvTj0i srW50RZ7HkPuzfjxdEdBykxQx/CnfV1pAf18UkXq16d2RE2S3zFS6HE3lgDuBjGrK4MpzIOrb05X BVDM3zqRwJ2ZyXzSBd0i9Hke/OPw+jSrxZeWKAtWprw11CoiT5OwI0iF4qrWkTGMyBe1FfjtYXVb 3Dv91fOrRkD8fNhlsYryf0/vDZMcsr7pO8BD7yXqhN8luVHXCd/10QIDAQABAoIBACLBsw9iQfoV yCrGFxDmrvqSvJojjpOIOG8JObl0hdyVNaXjyov9jOT/cD2Lp4Rp3eAo5qyAfdUDWYlnoz2eMiEk Mvw7h3oLP8x9yKeQVeI4i/WENKHx5LOgRjiUcr+URaZ8KIj475aX/9L3BrwwzoP2sBfKDuG2V913 piZ7I2oYrvH8QkbHlssLY0Pn3Eh/huBTDqtdGiGPqjR2329xMUxwmmM9VQFUNrQ9TKGbpUmJtGrx oEO06TaU0lFnWQ8rAhAGyzJRvhPplgZK3bvcyJjZotEXuuL9+76RWOKE91/ZRO4m8A1AIOEDl/rN Hfl7k3VD3Z8IwnMR0NgK/utD4sECgYEA0HmoVKRZbo73TWuvG08iiYlq+3BvYnyNk6qBv671OEOu 6uig6jJNzZBctj2GJUn1oZhcS2Pm2IzXrgo8Rn744ZN9QBHLrS4Ztg4sBA7h1Lg1Cc67/i1FPKKF 6nGtDoaei9oz2YZ4W1n7hbZJet6YraWgTD4gIp8loU60gTisoS0CgYEAn1M7W/HzXbQFoPpCHMNO VssOO94WqYbcrxheI2ulsYsRewRtjiUDNow+BJWISzl9R1BCqCJU3otttb9LNOxibdBwwmDSkCUT IuPwcbQlEyVgMerAZ7o2Urh/5bkdlJIhLLErE8b60exlIxRerVb0o/sKoshRpLpxE1mzsJmwpbUC gYEAtGzF2VNPrxZ+Q3vx1XG8k0nh0/CwBY2EPgtwNYPm6KXzKYzhTy7wFPtesb43beg/dHZXUkwI ytvCAfcLyXs0TI4H9T4xhxUB3YUQZQa4PhCann1USBvH8z05Jvjw7ERnzOOwwg7V9UHAJC3qFDO3 8XkJbVLLHwubVqq2H6v8A5UCgYEAls1B/voYvpVZSo/1KaJWsOILO/EvBBDJKtXmrKIEN/MIfaao R4WS7/t37ADY+1KT2H8ISHoOWIIiOoewmIwxcf177Q+V3aep4DldaVH4UZHr5fNrYAKpzkwhin9X lztlORcMTfDlkPKum7B5GJqYfelsnLz8Qe3Sf11FLh+aSo0CgYBEGko6b+FQDmuJnIN7CzhCZnln 7TA1mjB+TmCNZPRTmbzZC0Uy7To6Tv5wHjRPUgloOb0PiRZg6rsiE/Wtx+gjchOjoBnPnGKP0/JD oHcv8LEX/982tB0dw6FmRVJdtVd0RlB48lhMrMePwaE+l3Vg9X2SYyr5GSPuqeFwfzkXeA== -----END RSA PRIVATE KEY----- Can someone work backwards with a 2048 bit public key to decrypt a cyphertext? 2048 bit  617 digit Desktop computer: 470,000 times the age of the universe * * Age of the universe ~ 13.8 billon years

Quantum Key cryptography Swiss Secure Balloting iStock, James Steidl In 2007, elections officials in Geneva successfully used quantum cryptography to secure the network linking their ballot data entry center to the government repository where votes are stored https://www.scientificamerican.com/article/swiss-test-quantum-cryptography/ http://www.cse.wustl.edu/~jain/cse571-07/ftp/ballots.pdf

What’s happening...? China’s quantum satellite On Aug. 16, China launched a satellite into orbit with a unique feature: the ability to send information securely, not with mathematical encryption but by using the fundamental laws of physics. http://phys.org/news/2016-10-china-quantum-satellite-breaches.html Shutterstock

What‘s Quantum Physics?

E= hν Quantum physics Pioneers Max Plank (1858-1947) German theoretical physicist, Nobel laureate Observed black-body radiation spectrum Discovery of Energy Quanta https://en.wikipedia.org/wiki/Max_Planck E= hν h: Plank Constant ν : radiation frequency

Quantum physics Pioneers Einstein (1879-1955) German theoretical physicist, Nobel laureate Observed the photoelectric effect Discovery of Photon Particles https://en.wikipedia.org/wiki/Albert_Einstein

Quantum physics Pioneers Niels Bohr (1885-1962) Danish physicist, Nobel laureate Made foundational contributions to understanding atomic structure and quantum theory The Bohr model of the hydrogen atom https://en.wikipedia.org/wiki/Niels_Bohr

Quantum physics Pioneers Erwin Schrödinger (1887-1961) Austrian physicist, Nobel laureate Developed a number of fundamental results in quantum theory and is best known for the Schrödinger Equation https://en.wikipedia.org/wiki/Erwin_Schrodinger Werner Heisenberg (1901-1976) German theoretical physicist, Nobel laureate One of the key pioneers of quantum mechanics, best known for the uncertainty principle https://en.wikipedia.org/wiki/Werner_Heisenberg

weird physics Quantum Nonlocality and Quantum Superposition Double slit experiment: Thomas Young (1801) Demonstrates that photons or particles of matter (like an electron) produce a wave pattern when two slits are used In the Copenhagen interpretation (1925), Bohr and Heisenberg introduced the concept that Physical systems do not have definite properties prior to being measured Quantum mechanics can only predict the probabilities that measurements will produce certain results The act of measurement affects the system, causing the set of probabilities to reduce to only one of the possible values immediately after the measurement (known as the observer effect) https://en.wikipedia.org/wiki/Double-slit_experiment

Quantum physics Quantum Entanglement Alain Aspect (Born 1947, Age 69) French physicist Demonstrated quantum entanglement experimentally Quantum entanglement occurs when two particles originate at the same point in space and time and behave as a single system https://en.wikipedia.org/wiki/Alain_Aspect https://en.wikipedia.org/wiki/Quantum_entanglement

weird physics “Spooky action at a distance” https://www.pinterest.com/pin/451767406340954025/

What’s a Quantum computer?

Quantum computing Pioneers Yuri Manin, Mathematician 1980: First to proposes the idea quantum computer https://arxiv.org/pdf/quant-ph/0005003.pdf Paul Benioff, Argonne Scientist 1980: Described quantum mechanical models of computers http://link.springer.com/article/10.1007%2FBF01011339 Richard Feynman (1918-1988), Physicist 1981: Presented a logical quantum computer model Demonstrated the impossibility to conduct the simulation of a quantum system with the use of a classic computer Demonstrated that the traditional approach to computer development would never lead to a revolution https://pdfs.semanticscholar.org/75df/806e432f706b25ca35adb57d3a1a59ec9e22.pdf

Quantum computing Classical computer Uses Transistors Type of switch: On = 1 Off = 0 Binary language Logic gates = grouping of transistors Allows computations based on man-made programs

1 Quantum computing Quantum Superposition Quantum computer Quantum state of an elementary particle such as an electron Example of state: Spin (Magnetic Orientation) 1 http://1.bp.blogspot.com/-Thtz1MHS-xU/V0CuCxD3IOI/AAAAAAAAEdk/GcB690jxvEw0qxRTTpTeTIJUJ-8LNvLNACK4B/s1600/spin-quantum-number.png

1 or Quantum computing Classical computer Quantum computer Classical bit or 1 Quantum bit: Qubit Superposition Incredible possibilities!

00 10 01 11 Quantum computing Let’s do the math…. Classic computer Quantum computer 2 bit: Operation is repeated separately for each combinations of 0 and 1 00 10 01 11 2 qubit: Operation is performed only once for all combinations of 0 and 1

Quantum computing ……. Let’s do the math…. Classic computer 3 bit: 000 or 001 or …… or 111 1 state per operation 4 bit: 0000 or 0001 or …… or 1111 1 state per operation ……. 300 bit: 00…0 or 00…1 or ….. or 11…1 1 state per operation

Quantum computing N states 2N states N1N2 states 2N1N2 states Let’s do the math…. Classical computer Quantum computer Joining classical processors: One operation at a time  (OR) N states N1N2 states Multiplication Joining quantum processors: Superposition  (AND) 2N states 2N1N2 states Exponential growth

Quantum computing ……. Let’s do the math…. Quantum computer 3 qubit: 000 and 001 and ….. and 111 23 = 8 states per operation 4 qubit: 0000 and ….. and 1111 24 = 16 states per operation ……. 300 qubit: 00…0 and ….. and 11…1 2300 = 2x1090 states per operation More particles than in the observable universe!

Cracking the key What if …. -----BEGIN RSA PRIVATE KEY----- MIIEpAIBAAKCAQEAgb9XVQ+X4+Hvj0kcgevRH3avSY2wMctUY6XWKOuiOawoSpBPFs653ndqK6+U 6VSqsjs+blf9+wBFPvPglGgNhbiM7QWYX+4tuZ8ibtZCLkoMr+smaTOZqDsr0QbfdB206glvTj0i srW50RZ7HkPuzfjxdEdBykxQx/CnfV1pAf18UkXq16d2RE2S3zFS6HE3lgDuBjGrK4MpzIOrb05X BVDM3zqRwJ2ZyXzSBd0i9Hke/OPw+jSrxZeWKAtWprw11CoiT5OwI0iF4qrWkTGMyBe1FfjtYXVb 3Dv91fOrRkD8fNhlsYryf0/vDZMcsr7pO8BD7yXqhN8luVHXCd/10QIDAQABAoIBACLBsw9iQfoV yCrGFxDmrvqSvJojjpOIOG8JObl0hdyVNaXjyov9jOT/cD2Lp4Rp3eAo5qyAfdUDWYlnoz2eMiEk Mvw7h3oLP8x9yKeQVeI4i/WENKHx5LOgRjiUcr+URaZ8KIj475aX/9L3BrwwzoP2sBfKDuG2V913 piZ7I2oYrvH8QkbHlssLY0Pn3Eh/huBTDqtdGiGPqjR2329xMUxwmmM9VQFUNrQ9TKGbpUmJtGrx oEO06TaU0lFnWQ8rAhAGyzJRvhPplgZK3bvcyJjZotEXuuL9+76RWOKE91/ZRO4m8A1AIOEDl/rN Hfl7k3VD3Z8IwnMR0NgK/utD4sECgYEA0HmoVKRZbo73TWuvG08iiYlq+3BvYnyNk6qBv671OEOu 6uig6jJNzZBctj2GJUn1oZhcS2Pm2IzXrgo8Rn744ZN9QBHLrS4Ztg4sBA7h1Lg1Cc67/i1FPKKF 6nGtDoaei9oz2YZ4W1n7hbZJet6YraWgTD4gIp8loU60gTisoS0CgYEAn1M7W/HzXbQFoPpCHMNO VssOO94WqYbcrxheI2ulsYsRewRtjiUDNow+BJWISzl9R1BCqCJU3otttb9LNOxibdBwwmDSkCUT IuPwcbQlEyVgMerAZ7o2Urh/5bkdlJIhLLErE8b60exlIxRerVb0o/sKoshRpLpxE1mzsJmwpbUC gYEAtGzF2VNPrxZ+Q3vx1XG8k0nh0/CwBY2EPgtwNYPm6KXzKYzhTy7wFPtesb43beg/dHZXUkwI ytvCAfcLyXs0TI4H9T4xhxUB3YUQZQa4PhCann1USBvH8z05Jvjw7ERnzOOwwg7V9UHAJC3qFDO3 8XkJbVLLHwubVqq2H6v8A5UCgYEAls1B/voYvpVZSo/1KaJWsOILO/EvBBDJKtXmrKIEN/MIfaao R4WS7/t37ADY+1KT2H8ISHoOWIIiOoewmIwxcf177Q+V3aep4DldaVH4UZHr5fNrYAKpzkwhin9X lztlORcMTfDlkPKum7B5GJqYfelsnLz8Qe3Sf11FLh+aSo0CgYBEGko6b+FQDmuJnIN7CzhCZnln 7TA1mjB+TmCNZPRTmbzZC0Uy7To6Tv5wHjRPUgloOb0PiRZg6rsiE/Wtx+gjchOjoBnPnGKP0/JD oHcv8LEX/982tB0dw6FmRVJdtVd0RlB48lhMrMePwaE+l3Vg9X2SYyr5GSPuqeFwfzkXeA== -----END RSA PRIVATE KEY----- Can a 2048-bit quantum computer break it the RSA-2048 encryption key?

Quantum computing Single-Atom Device Scientists from the University of New South Wales (2012) Scanning tunneling microscope (STM) First single-atom transistor Made from a single phosphorus atom embedded in a silicon crystal Read and write information using the spin of the electron http://www.nature.com/nnano/journal/v7/n4/full/nnano.2012.21.ht ml http://www.lps.umd.edu/MBEGroup/MBEWhatIs.htm http://www.lps.umd.edu/MBEGroup/MBEWhatIs.htm

Quantum computing Engineering Challenges Significant technological problems to overcome Long-living Qubits for memory and communication Providing separations to control decoherence due to quantum tunneling Scalable implementations Costs associated with cooling to absolute zero 10 mK = - 460 F (100 times colder then interstellar space) New quantum models of computations Better quantum error-correction New algorithms Finding quantum algorithms that achieve a speed-up Some problems do not allow for a quantum speed-up Getting funding

Quantum computing The good stuff… Simulations of quantum-mechanical systems Speed-up simulation-driven design Applications in almost everything: medicine, material science, …etc Simulation of new catalysts that can capture carbon from the atmosphere to help solve global warming More powerful forms of artificial intelligence Solve problems where patterns cannot be seen (without data) Sort through unordered databases

Quantum cryptography

Quantum Key cryptography …using entangled photons? Hypothesis: A quantum communication satellite sends and a pair of quantum entangled photons to Alice and Bob Alice and Bob are now able to come up with a shared quantum key based on the entangled photons Alice uses the key to encrypt the message and sends it to Bob on the public channel Bob uses the key to decrypt the message Alice and Bob will be able to detect if anyone has spied on the quantum channel used to determine the key Security is based on properties of physics rather then any mathematical method of encryption http://www.sciencemag.org/news/2015/08/more-evidence-support-quantum-theory-s-spooky-action-distance

Quantum Key cryptography …using entangled photons? https://en.wikipedia.org/wiki/Quantum_key_distribution

Quantum Key cryptography …using entangled photons? Alice (sender) Bob (receiver) Plaintext Plaintext Eve (Eavesdropper) Encryption Algorithm Public Channel (internet) Decryption Algorithm Ciphertext Key Key Quantum State Generator Quantum Channel (optical fiber or free space) Quantum State Detector

Quantum Key Distribution At the heart the satellite is a crystal that produces pairs of entangled photons, whose properties remain entwined however far apart they are separated. The first task will be to fire the partners in these pairs to ground-stations in Beijing and Vienna, and use them to generate a secret key. http://www.nature.com/news/chinese-satellite-is-one-giant-step-for-the-quantum-internet-1.20329 http://www.nature.com/polopoly_fs/7.7775.1355230159!/slideshowimage/quantum%E2%80%933.jpg_gen/derivatives/landscape_592/quantum%E2%80%933.jpg

A matter of time…?