Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Security Frameworks Robert M. Slade, MSc, CISSP
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Quantum Computing and Qbit Cryptography
CSCI920 (Week 13) Revision (II) Guilin Wang SCSSE Nov
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Embedding Logical Qubits into the D-Wave Hardware Graph Keith Britt February 26 th, 2014.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Four Police Technology Networks.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
Chien Hsing James Wu David Gottesman Andrew Landahl.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Quantum Computing Ambarish Roy Presentation Flow.
Embedded Systems Laboratory Informatics Institute Federal University of Rio Grande do Sul Porto Alegre – RS – Brazil SRC TechCon 2005 Portland, Oregon,
Quantum Entanglement David Badger Danah Albaum. Some thoughts on entanglement... “Spooky action at a distance.” -Albert Einstein “It is a problem that.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
2IS80 Fundamentals of Informatics Spring 2014 Lecture 15: Conclusion Lecturer: Tom Verhoeff.
Quantum Information Processing
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Chapter 12 Cryptography Explained. Search Problems Specified by an algorithm C Two inputs ◦ I is the instance. ◦ S is the solution. ◦ Must complete in.
From Bits to Qubits Wayne Viers and Josh Lamkins
Data Fusion & Multi-Sensors in Power Grids Rabinder N. Madan FIEEE Program Manager, Systems Theory Office of Naval Research.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Limits and Horizon of Computing Post silicon computing.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Simulation Of A Cooperative Protocol For Common Control Channel Implementation Prepared by: Aishah Thaher Shymaa Khalaf Supervisor: Dr.Ahmed Al-Masri.
Security in the Clouds 1 Professor Sadie Creese London Hopper 2010 May 2010.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Blake Morell Daniel Bowser Trenton Wood. Contents Background Experimental Design & Outcome Implications Future Applications.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Physics of Computing and the Promise and Limitations of Quantum Computing Charles H. Bennett IBM Research Yorktown Santa Cruz, 24 Oct 2005.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
1 Content IP-SECOQC – Consortium, Funding What is Quantum Cryptography? Project Goals / Project Structure Standard Related Issues: –In Quantum Key Distribution.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
Quantum Computers By Andreas Stanescu Jay Shaffstall.
Quantum Processing Simulation
Nawaf M Albadia
Quantum Steering in the Gaussian World Ioannis Kogias, A. Lee, S. Ragy and G. Adesso University of Nottingham To appear on arXiv: [quant-ph]
Introduction to Quantum Computing
Quantum cryptography How could you transmit information safety? Thanks to codes.
As if computers weren’t fast enough already…
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Lecture 20 CSE 331 July 30, Longest path problem Given G, does there exist a simple path of length n-1 ?
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Quantum Computers By Ryan Orvosh.
Quantum Computing: An Introduction
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Entangled Electrons.
COMPUTING BTEC LEVEL /17.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Limits and Horizon of Computing
Design and Analysis of Computer Algorithm (CS575-01)
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Quantum Computing Andrew Krumbach Carolyn Camara
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP

Do we understand quantum computing? This isn't right. It isn't even wrong. - Wolfgang Pauli, on a paper submitted by a physicist colleague

Quantum introduction ( very small ) Concepts Superposition Entanglement observer effect Qubit If someone says that he can think or talk about quantum physics without becoming dizzy, that shows only that he has not understood anything whatever about it. Niels Bohr

Quantum Computing (1) Quantum computer quantum tech, traditional operation smaller, faster quantum size range Turing universal computer irreversible computations

Quantum Computing (2) Quantum cryptography photon polarization angular polarization detector angle public exchange of angle but not value photon entanglement eavesdropping detection

Quantum Computing (3) Quantum computing computing device or processor analogue computer not digital?

Analogue Computers Spaghetti computing parallel sorting special purpose/application Slide rule exact computation imprecise reading Adiabatic quantum computer least energy = best answer least path, best comparison, simulation D-Wave Orion

Applications and Implications by domain general functions least path Traveling Salesman Problem scheduling, efficiency studies, multiple requirements NP-complete, non-convergent, Ising model simulation climate models pattern recognition people are good, computers are bad data reduction and representation

Security management risk management (shortest path) what if - cost vs benefit information classification (pattern matching) risk assessment required investing, or not, in quantum computing

Security architecture new architectures, new vulnerabilities simulation of vulnerabilities and protections quantum devices and noise D-Wave Orion voting, error checking quantum error correction (recent) fault tolerant computing

Access control biometrics (pattern matching) information flow and covert channel analysis (least path/simulation) intrusion detection (pattern matching)

Cryptography quantum communications/encryption/key negotiation/eavesdropping detection parallel decryption new algorithms tractable by neither classical nor quantum quantum devices and generation of randomness analysis of implementation problems (simulation)

Physical noise, RFI/EMI interference temperature room temp 100x > interstellar space interstellar space 1000x > Orion device special costs, protections for devices physical access control (biometrics)

BCP Business Impact Analysis (least path) testing of BC plans (simulation) disaster management direction of resources to maximum effect continuity of operations for special devices damage if power/cooling fails

Applications security testing (simulation) database analysis (pattern matching) cost (privacy) vs benefit (safety) database aggregation problem analysis (pattern matching and simulation) learning (pattern matching) neural net augmented, check against neural net superstitious learning check against expected impossible to compute by classical methods malware/botnet detection, (pattern matching) operation/control/ownership completely new paradigms in programming

Operations security combinations of classical and quantum devices and operations complexity, troubleshooting troubleshooting (simulation) insider attack detection (pattern matching)

Telecommunications and networking Intrusion Detection Systems Botnet detection and assessment Command & Control ownership fast flux Network attack analysis quantum encryption special channels quantum devices likely remote access

Telecommunications and networking Spam limitations even in Bayesian analysis

Telecommunications and networking quantum encryption requires special channels quantum devices likely to be remote access

Law and investigation new forensic analysis tools (pattern matching/simulation) presentation/acceptance in court problematic

Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP