Matthew Guidry. The Fundamentals of Cryptography  One of the fundamentals of cryptography is that keys selected for various protocols that are computationally.

Slides:



Advertisements
Similar presentations
Department of Computer Science & Engineering University of Washington
Advertisements

Quantum Computation and Quantum Information – Lecture 2
1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.
FUTURE TECHNOLOGIES Lecture 13.  In this lecture we will discuss some of the important technologies of the future  Autonomic Computing  Cloud Computing.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Quantum Packet Switching A. Yavuz Oruç Department of Electrical and Computer Engineering University of Maryland, College Park.
Quantum Computing. Introduction to Computing Is currently done on your laptop today Numbers as we commonly use them are in decimal (base 10) format. Computers.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Quantum Computation and Error Correction Ali Soleimani.
Quantum Computing Joseph Stelmach.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
By: Mike Neumiller & Brian Yarbrough
Autonomous Quantum Error Correction Joachim Cohen QUANTIC.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Quantum Computing MAS 725 Hartmut Klauck NTU
Quantum Algorithms for Neural Networks Daniel Shumow.
MATH 224 – Discrete Mathematics
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Quantum Computers. Overview Brief History Computing – (generations) Current technology Limitations Theory of Quantum Computing How it Works? Applications.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Limits and Horizon of Computing Post silicon computing.
Lecture note 8: Quantum Algorithms
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Based on Bruce Schneier Chapter 7: Key Length Dulal C. Kar.
Chapter 21 Public-Key Cryptography and Message Authentication.
CHEMISTRY 2000 Topics of Interest #2: Quantum Computers.
By Joseph Szatkowski and Cody Borgschulte. ● Uses phenomenon associated with quantum mechanics instead of electrical circuitry ● Quantum mechanics explains.
1 Lecture 16 Quantum computing Ubiquitous Internet Services The client server paradigm DNS Electronic Mail World Wide Web.
Quantum Computing Paola Cappellaro
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Computer 電機四 鄭仲鈞. Outline Quantum Computer Quantum Computing Implement of Quantum Computer Nowadays research of Quantum computer.
QUANTUM COMPUTING What is it ? Jean V. Bellissard Georgia Institute of Technology & Institut Universitaire de France.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Computing by Mathew Ross Jared Davis - Group L -
Build Your Own Quantum Computer for Fun and Profit!
Quantum Computers by Ran Li.
Nawaf M Albadia
Quantum Computing and Quantum Programming Language
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile (DCS3) Winter 2009.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
Introduction to Quantum Computing
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
IPQI-2010-Anu Venugopalan 1 qubits, quantum registers and gates Anu Venugopalan Guru Gobind Singh Indraprastha Univeristy Delhi _______________________________________________.
Quantum Computing: An Introduction Khalid Muhammad 1 History of Quantum Computing Bits and Qubits Problems with the Quantum Machine.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Norman Littlejohn COSC480.  Quantum Computing  History  How it works  Usage.
Quantum Computing: An Introduction
Beginner’s Guide to Quantum Computing Graduate Seminar Presentation Oct. 5, 2007.
Intro to Quantum Algorithms SUNY Polytechnic Institute Chen-Fu Chiang Fall 2015.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
QUANTUM COMPUTING By Sandeep Neeli.
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
QUANTUM COMPUTING: Quantum computing is an attempt to unite Quantum mechanics and information science together to achieve next generation computation.
COMPSCI 290.2: Computer Security
Poomipat Phusayangkul
Quantum Information Promises new insights Anthony J
Introduction to Quantum Computing Lecture 1 of 2
Limits and Horizon of Computing
Quantum Cryptography Alok.T.J EC 11.
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Quantum Computing Joseph Stelmach.
Quantum Cryptography Quantum Computing
Presentation transcript:

Matthew Guidry

The Fundamentals of Cryptography  One of the fundamentals of cryptography is that keys selected for various protocols that are computationally infeasible for an attacker to compute given the same public information.  Consider for example the RSA Assumption

The RSA Assumption  the RSA assumption states that given :  a large number n = p*q  p and q are primes  e such that GCD(e, Φ(n)) = 1  ciphertext C  It is computationally infeasible to compute the original message M such that C = M e mod N

Computational Infeasibility  Many cryptographic protocols rest on the assumption that secret keys are computationally infeasible to compute.  However, the Quantum Computer may be able to increase the power of current computing methods exponentially. This exponential increase would actually make these problems feasible.

The Effects of Moore’s Law  Computers have become more and more powerful following Moore’s Law, which states  Every 18 months the number of transistors which can be fit within one square inch doubles.  If this trend continues unabated, by 2015 transistors will roughly be the size of single atoms and molecules. At this size the laws of physics which governed classic computers give way to the laws of quantum mechanics.

The Basics of a Quantum Computer  A current computer has bits which represent 0 and 1 based on electrical signals.  In a Quantum Computer these could be replicated by atoms in the excited or grounded state. However, given the multiple properties of quantum mechanics it would allow that other states to be inferred at the same time.

The Qubit  The basic building block of a Quantum Computer is the qubit  “quantum” + “bit” = qubit  Classical bits and quantum bits share the same property, once measured they will only reveal one of two possible outcomes.

The Qubit  The difference between qubits and normal bits is not in the possible answers inferred from the states, it is in the possible number questions that can be asked of them  Qubits exhibit two very special properties of superposition and quantum entanglement

Superposition  Measuring a qubit which is in a superposition forces a collapse of the wave function thus putting the qubit back into a single state as a result of the measurement.  Before measuring that qubit it can be seen as being in many different states. The explanation is difficult to explain, but consider the qubit to contain many answers it just depends on which question is asked.

Superposition  A simple but fitting explanation of the qubit:  Consider the effect of polarization in sunglasses:

Superposition  Now imagine a combination of the two. Or perhaps 3-D?

Superposition  These different orientations can be observed based on the spin-up or spin-down, horizontal or vertical representation, and other properties that the ions would exhibit.  The important fact to the Computer Scientist: The representation.  The state of a qubit alone can be thought of as a unit vector in a two- dimensional vector space with ba.sis { |0>, |1> }. Here |0> and |1> are orthogonal vectors.

Superposition  More on the representation:  The qubit may be in a superposition x|0> + y|1> of the two states. The complex amplitudes x and y determine which state we will see if we make a measurement. When an observer measures a qubit in this superposition, the probability that the observer will see state |0> is |x| 2 and the probability of seeing |1> is |y| 2. Note that because x|0> + y|1> is a unit vector, the sum |x| 2 + |y| 2 must be equal to 1

Quantum Entanglement  The property of quantum entanglement is unique to qubits  Two qubits that are passed along in a system will have an effect on each other’s respective states  The state of this system is no longer a Cartesian product of the individual spaces, but now a Tensor Product of the spaces.

Quantum Entanglement  This implies that the number of dimensions in the combined space is the product rather than the sum of the numbers of dimensions in each of the component space.  The more qubits which are used within a system, the more states that system could have and the number of states possible would grow exponentially.

Superposition and Quantum Entanglement  It is mostly through the attractiveness of these two properties that quantum computers hold such promising prospect.  Further because a qubit or a system of qubits can be in a superposition of states, an operator applied to such a system can operate on all the states simultaneously

Quantum Computing vs Cryptography  Most cryptographic methods such as the Discrete Logarithm problem rely on the computation infeasibility of the problem  Consider Shor’s 1994 Algorithms:  Peter Shor created an algorithm to factoring n-digit numbers in bounded-probability polynomial time on a quantum computer and another to compute discreet logarithms quickly  This algorithm sparked most of the current interest in Quantum Computers in

Possible Cryptographic Defenses in the Age of the Quantum Computer  It is important to note that the full potential of quantum computers is not actually known! (at least not publically)  The possible methods that could be implemented with these fantastic machines will remain just that, “possible”

Possible Cryptographic Defenses in the Age of the Quantum Computer  Since the qubits are in a superposition of answers, a measure of the result will not always give the desired answer.  It is possible that the probability for getting the correct answer is much lower than imagined and Quantum Computers are little better than today’s computers.

Possible Cryptographic Defenses in the Age of the Quantum Computer  It is probable that most of the cryptographic functions used for security would have to be strengthened, at the very least.  Others may have to be completely abandoned.  However, with these new computing powers at their disposal it is also possible that cryptographers will develop new methods as the older ones are being broken.

The Current State of the Quantum Computer??  As for the current state of this future computer?’  The manipulation of the atoms would be done using an ion trap, and scientists have thus far been able to trap a single atom; however, the biggest challenge lies in being able to orchestrate the millions of atoms needed to run a quantum computer  Currently Scientists have been able to create a machine with a couple qubits inside of it, however, these are just a small scale of what is foreseen to come.

Questions??  These new computers offer many exciting possibilities and it will be interesting to see if they pan out to be as fruitful as has been promised…

Sources  [1] Quantum Information: Joining the Foundations of Physics and Computer Science  [2] Internet Article: tale-of-two-qubits-how-quantum-computers-work.ars. by Joseph B. Altepeter, 2010  [3] Marco A. Barreno. “The Future of Cryptography Under Quantum Computers”. Dartmouth College Computer Science Technical Report  [4] Ion trap in a Semiconductor Chip, D. Stick, W. K. Hensinger, S. Olmschenk, M. J. Madsen, K. Schwab and C. Monroe, Nature Physics advance online publication, 2005  [5] Peter W. Shor. “Algorithms for quantum computation: Discrete logarithms and factoring”. In Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, pages IEEE Computer Society Press,  [6] Eleanor Rie_el and Wolfgang Polak. “An Introduction to Quantum Computing for Non-Physicists”. arXiv:quant-ph/ , 1998.