Cryptography and Quantum Computing

Slides:



Advertisements
Similar presentations
Code-Breaking with a Quantum Computer Credit for ideas and examples: Prof. N. D. Mermin’s class Phys 681 / Comp Sci 483 “Quantum Computation” (A good class)
Advertisements

Digital Signatures. Anononymity and the Internet.
Public Key Encryption Algorithm
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Technology Essential Question:
Public Key Cryptography
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Chapter 3 Encryption Algorithms & Systems (Part C)
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Light as a Particle. Objectives  Define a quantum  Calculate the energy of a photon  Relate photon energy to wavelength and frequency of EMR.
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Chapter 21 Public-Key Cryptography and Message Authentication.
1 Public-Key Cryptography and Message Authentication.
Computer and Network Security Rabie A. Ramadan Lecture 6.
By Joseph Szatkowski and Cody Borgschulte. ● Uses phenomenon associated with quantum mechanics instead of electrical circuitry ● Quantum mechanics explains.
Quantum Computer 電機四 鄭仲鈞. Outline Quantum Computer Quantum Computing Implement of Quantum Computer Nowadays research of Quantum computer.
Chapter 3 – Public Key Cryptography and RSA (A). Private-Key Cryptography traditional private/secret/single-key cryptography uses one key shared by both.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
CONTENT OBJECTIVE understand the electromagnetic spectrum and the mathematical relationships between energy, frequency, and wavelength of light. WHAT.
Introduction to Quantum Computing
FNI 1H Quantum Mechanics 1 Quantum Mechanics I don't like it, and I'm sorry I ever had anything to do with it. -- Erwin Schrodinger talking about Quantum.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Public Key Cryptography
Digital Signatures.
CS480 Cryptography and Information Security
Public Key Encryption Major topics The RSA scheme was devised in 1978
Public Key Encryption.
Public Key Cryptosystem
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Privacy & Security.
COMPSCI 290.2: Computer Security
Poomipat Phusayangkul
Public Key Encryption Systems
Atomic Models Scientist studying the atom quickly determined that protons and neutrons are found in the nucleus of an atom. The location and arrangement.
MA/CSSE 473 Day 10 Data Encryption RSA.
Public-key Cryptography
(Tuesday, 20 October, 7:30-9PM) Encryption-Decryption
Quantum Cryptography Quantum Computing
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Private-Key Cryptography
Chapter 22 - The Nature of Light
Chemistry – Mrs. Cameron
Quantum Cryptography Alok.T.J EC 11.
Rivest, Shamir and Adleman
Unit 11 – Modern Physics.
WHAT THE HECK DO I NEED TO BE ABLE TO DO?
The Application of Elliptic Curves Cryptography in Embedded Systems
Digital Signatures…!.
Appendix 5: Cryptography p
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Hard Problems Some problems are hard to solve.
Introduction to Cryptography
Quantum Computing Joseph Stelmach.
Quantum Theory Electrons!.
Public Key Encryption Systems
Bohr’s Atomic Model Suggested________________________________
The RSA Public-Key Encryption Algorithm
Presentation transcript:

Cryptography and Quantum Computing Brent Plump November 17, 2004

RSA Encryption Rivest, Shamir and Adelman Developed in 1977 Asymmetric Encryption Two keys: public and private Each key can encrypt a message that only the other key can decrypt

Keys Start with two large primes, P and Q N = PQ N is known to everyone Kp is a relative prime to (P-1)(Q-1) Ks is chosen where KpKs mod (P-1)(Q-1) = 1

Encoding/Decoding c = mKs mod N m = cKp mod N Decoding c verifies that the owner of Ks actually sent the message. Usually messages are encrypted twice First with senders private key Second with recipients public key Recipient decrypts with their private key, then with senders public key.

Breaking RSA Everyone has N and Kp but not P or Q Factoring N is hard! P and Q are key to determining relationship between Ks and Kp Factoring N is hard! Current record is a 576-bit prime. Bits Pentiums (1 year) Memory 430 1 ~ 760 2.1x105 4GB 1020 3.4x108 170GB 1620 1.6x1015 120TB

Hard Problems The only way to solve it is to guess answers repeatedly and check them There are n possible answers to check Every possible answer takes the same amount of time to check There are no clues about which answers might be better. Generating possibilities randomly is just as good as checking them in some special order

Quantum Physics 1900 - Max Planck postulates that energy, like matter, also comes in discrete quantities 1921 - Max Born suggests that the probability of finding an electron in a given region depends on the intensity of its wave function there.

Classical Physics Problems Classical physics states that you can predict what will happen in the future if you measure enough properties (ex. billiard ball) Mirror Problem: Classical physics: A mirror reflects 95% of light energy and absorbs 5% Quantum physics: 19 of every 20 photons is reflected What happens to each photon is genuinely unpredictable. There is no way to predict the outcome. Quantum physics states you only know the probabilities of the outcomes

Superposition Wave function describes the probabilities for different states in the future Superposition is a combination of all possible states and their probabilities Superposition exists (is coherent) until the item is observed When an item is observed, the wave function collapses and the item takes a single, classical state

Building a Quantum Computer Takes advantage of superposition and evolving wave functions to perform calculations Force the wave function to a desired result by decreasing the probability of incorrect results Decoherence is the enemy; nothing can observe the q-bit until you want the result

q-bits Collapses to either a logical 1 or 0 While superposition is coherent, may exist in both 1 and 0 states Calculate by changing the probability of getting a 1 or a 0 Early q-bit attempts isolated charged particles with magnetic fields

IBM’s Quantum Computer Uses NMR and chloroform q-bit: Spin of a Hydrogen nucleus relative to magnetic field Billions of tiny computers so complete avoidance of decoherence is not important “Program” is a series of radio frequency pulses

IBM’s Results Built a 7 q-bit quantum computer Able to use Shor’s algorithm to factor a 7-bit integer

References Encryption http://www.comp.nus.edu.sg/~cs3235/2004-semesterI/foils7.4.pdf http://www.rsasecurity.com/rsalabs/node.asp?id=2096 http://www.youdzone.com/rsa.html Quantum Physics http://www.newscientist.com/hottopics/quantum/inthebeginning.jsp http://arxiv.org/abs/quant-ph/0012069 Quantum Computers http://www.almaden.ibm.com/st/quantum_information/ http://alumni.imsa.edu/~matth/quant/299/paper/index.html http://en.wikipedia.org/wiki/Quantum_computer http://domino.research.ibm.com/comm/pr.nsf/pages/news.20011219_quantum.html http://www.media.mit.edu/physics/publications/papers/98.06.sciam/0698gershenfeld.html