The Future of Computing: Grand Challenges and the Next Killer Apps CMSC 100 Tuesday, December 1, 2011 Adapted from slides provided by Prof. Marie desJardins.

Slides:



Advertisements
Similar presentations
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Advertisements

RSA COSC 201 ST. MARY’S COLLEGE OF MARYLAND FALL 2012 RSA.
FUTURE TECHNOLOGIES Lecture 13.  In this lecture we will discuss some of the important technologies of the future  Autonomic Computing  Cloud Computing.
APPLICATIONS AND SOLUTIONS FOR COMPLEXITY Dr. Adam P. Anthony Lecture 27.
Data encryption with big prime numbers
The Future of Computing: Grand Challenges and the Next Killer Apps CMSC 100 Tuesday, December 1, 2009 Prof. Marie desJardins.
IEEE Computer Society Name Title, IEEE Computer Society The community for technology leaders.
Nanotechnology Fred Myrtle ITMG
Quantum Computing Ambarish Roy Presentation Flow.
Matthew Guidry. The Fundamentals of Cryptography  One of the fundamentals of cryptography is that keys selected for various protocols that are computationally.
Quantum Computing Joseph Stelmach.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
INTRODUCTION TO NANOTECHNOLOGY
By: Mike Neumiller & Brian Yarbrough
ELE 523E COMPUTATIONAL NANOELECTRONICS W2: Emerging Computing, 15/9/2014 FALL 2014 Mustafa Altun Electronics & Communication Engineering Istanbul Technical.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
RSA Encryption Caitlin O’Dwyer. What is an RSA Number? An RSA number n is a number s.t. n=pq Where p and q are distinct, large, prime integers.
“RSA”. RSA  by Rivest, Shamir & Adleman of MIT in 1977  best known & widely used public-key scheme  RSA is a block cipher, plain & cipher text are.
Lecture 6: Public Key Cryptography
Strong Password Protocols
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
The Google Cloud EDTEC 572. History & Overview Cloud Computing Grid Computing Parallel Computing Distributed Computing Ubiquitous Computing Mobil phon.
RSA Public Key Algorithm. RSA Algorithm history  Invented in 1977 at MIT  Named for Ron Rivest, Adi Shamir, and Len Adleman  Based on 2 keys, 1 public.
EHB 111E NANOELECTRONICS Nanoelectronics, 18/11/2014 FALL 2014 Mustafa Altun Electronics & Communication Engineering Istanbul Technical University Web:
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
Quantum Computing The Next Generation of Computing Devices? by Heiko Frost, Seth Herve and Daniel Matthews.
Quantum Computers. Overview Brief History Computing – (generations) Current technology Limitations Theory of Quantum Computing How it Works? Applications.
1 Applications of Number Theory CS 202 Epp section 10.4 Aaron Bloomfield.
Limits and Horizon of Computing Post silicon computing.
David Evans CS200: Computer Science University of Virginia Computer Science Class 36: Public-Key Cryptography If you want.
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Cryptography and Network Security (CS435) Part Eight (Key Management)
RSA Prepared by: SITI ZAINAH ADNAN
David Westenberger Lucas Zurek. What’s Happening Now? Silicon-based Computation – Moore’s Law Transistors Physical limitation Then what’s next?
Introduction to Complexity Science Engineered Complexity.
CMSC 100 The Future of Computing: Grand Challenges and the Next Killer Apps Professor Marie desJardins Thursday, November 29, 2012 Thu 11/29/12 1 Future.
CHEMISTRY 2000 Topics of Interest #2: Quantum Computers.
Facts about quantum computation & speculation about the human brain Tim Hugo Taminiau Kavli Institute of Nanoscience, Delft University Quantum superposition.
Biomolecular Computation in Virtual Test Tubes 7 th International Meeting on DNA Based Computers, p75-83, June 10-13, 2001 Max Garzon, Chris Oehmen Summarized.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Quantum Computer 電機四 鄭仲鈞. Outline Quantum Computer Quantum Computing Implement of Quantum Computer Nowadays research of Quantum computer.
Lecture 8 Overview. Analysis of Algorithms Algorithms – Time Complexity – Space Complexity An algorithm whose time complexity is bounded by a polynomial.
1 Chapter 1: Introduction ISYM 540 Current Topics in Information Systems Management.
Nanotechnology.
Quantum Computers by Ran Li.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Nawaf M Albadia
EHB 111E NANOELECTRONICS Nanoelectronics, 03/12/2013 FALL 2013 Mustafa Altun Electronics & Communication Engineering Istanbul Technical University Web:
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
Dannelly's Short History of Computing CSCI327 Social Implications of Computing.
1 Applications of Number Theory CS/APMA 202 Rosen section 2.6 Aaron Bloomfield.
IEEE Computer Society Nita Patel VP, Membership and Geographic Activities The community for technology leaders.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Multi - Site Collaboration Systems Senior Design & Development - Spring 2016 Dan Jarvinen.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Data encryption with big prime numbers DANIEL FREEMAN, SLU.
Quantum Computers By Ryan Orvosh.
Christopher Monroe Joint Quantum Institute and Department of Physics NIST and University of Maryland Quantum Computation and Simulation.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Quantum Computing: An Introduction
Quantum Computers: The hope of daily Life By: Ashutosh Rai.
Beginner’s Guide to Quantum Computing Graduate Seminar Presentation Oct. 5, 2007.
Limits and Horizon of Computing
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Quantum Computer Scientists
How Big is a Nanometer? IBM chip UMass Logo TI mirror array.
Quantum Computing and the Quest for Quantum Computational Supremacy
The Future of Computing: Grand Challenges and the Next Killer Apps
Quantum Computing Joseph Stelmach.
Presentation transcript:

The Future of Computing: Grand Challenges and the Next Killer Apps CMSC 100 Tuesday, December 1, 2011 Adapted from slides provided by Prof. Marie desJardins

The Future of Computing  What are the “grand challenges” of computing---our next generation of big problems to solve?  What are some technologies on the horizon that may be “game-changing”?  Quantum computing  Self-configuring robotics and “smart matter”  Nanotechnology  What is the next “killer app”?

Grand Challenges: CRA 2002  In 2002, the Computing Research Association held a conference to identify Grand Challenges for computing 1.Systems You Can Count On  Global, scalable, persistent, reliable, efficient networks 2.A Teacher for Every Learner  Scalable, learner-centered distance learning/collaboration 3.Ubiquitous Safety.net  Disaster prediction, prevention, mitigation, and response 4.Conquering System Complexity  Self-configuring, -optimizing, -maintaining, -healing systems 5.Build a Team of Your Own  Augmented cognition: human/machine “cognitive partnerships”

Grand Challenges: UKCRC 2009  The UK Computing Research Committee has identified eight Grand Challenges for computer science 1.In Vivo  In Silico (virtual organisms) 2.Science for Ubiquitous Global Computing 3.Memories for Life (storing/searching pictures, video, ,...) 4.Architecture of Brain and Mind 5.Dependable Systems Evolution 6.Journeys In Non-Classical Computing (biological/natural) 7.Learning for Life 8.Bringing the Past to Life for the Citizen

Quantum Computing  Bits can’t get any smaller  But electrons can be in multiple quantum states simultaneously (“superpositioning”)  qubit: can be in 2 states at once  2 qubits: 4 states at once  n qubits: 2 n states at once!   In effect, we can build massively parallel computers!  SciAm Special: How Do Quantum Computers Work?  Images: ams.org

12-6 Encrypting the Message  Recall:  n=pq, phi(n)=(p-1)(q-1), 1<e<phi(n), de = 1 (mod phi(n))  encrypted = message e mod n  message = encryped d mod n  Public keys: n = 91 and e = 5  Message:  two = 23 ten  23 e = 23 5 = 6,436,343  6,436,343 ÷ 91 has a remainder of 4  4 ten = 100 two  Thus, encrypted version of is 100.

12-7 Decrypting the Message 100  Recall: n=pq, phi(n)=(p-1)(q-1), 1<e<phi(n), de = 1 (mod phi(n))  Decrypting keys: d = 29, n = 91  100 two = 4 ten  4 d = 4 29 = 288,230,376,151,711,744  288,230,376,151,711,744 ÷ 91 has a remainder of 23  23 ten = two  Therefore, decrypted version of 100 is

Cracking RSA  Public key can be made freely available – does not need to be kept secret  RSA can only be classically “broken” in one of three ways:  Get the private key  Factor the very large number, n (typically bits) – computationally too hard  is about 1 with 300 zeros 2 512 potential factors/ test per second > 20 years  Solve the RSA problem (invert exponentiation and modulus) – also too hard  How would a quantum computer be used to crack RSA?  Shor’s Algorithm  

Shor’s Algorithm – factoring 15 Source: Create two registers big enough to factor N (15) Choose X that is than some value less than N Perform quantum calculation for each possible value of A (using X=2): AB AB Calculate the period of B (in this case, 4) and assign to f

Self-Configuring Systems  ckBot (University of Pennsylvania)   More nifty self-configuring robots:  Image: discovermagazine.com

 “Nano” refers to the scale of these systems:  1nm = meters = one billionth of a meter  Carbon-carbon bonds are about.15 nm  A DNA molecule has a diameter of about 2nm  The smallest cellular life form is about 200nm across  “Nanotechnology”: Devices that are smaller than ~100nm  First mention of nanotechnology (not by that name):  Richard Feynman, 1959 talk  First nanotechnology:  Fullerenes (discovered in 1985) – carbon molecules forming a hollow structure (sphere, ellipsoid, tube)  “Buckyball” – spherical fullerene (both named after Buckminster Fuller, inventor of the geodesic dome)  These are actually used today in manufacturing Nanotechnology Images: godunov.com, answers.com

Approaches to Nanotechnology  Self-assembly  Like the self-configuring systems we saw at the macro level!  Top-down design of “molecular machines”  We could theoretically program these nanomachines!  Nanorobotics  Programmable matter  Claytronics:  Applications: manufacturing, environmental remediation, medical treatment...

Killer App  A “killer app” is a paradigm-shifting technology application  Lots of things have been referred to as “killer apps”:  Spreadsheets   The Web  Google  Word processing Images: celecus.com, logic.stanford.edu, google.com

What’s the Newest Killer App?  A Google search on “Next Killer App” reveals the following “killer apps” from the last few years:  Technology Source 2003:  RSS (Rich Site Summary) – news feeds for the masses  Popular Mechanics 2005:  VoIP (Voice over Internet Protocol): Skype, etc.  WiMAX (next-generation WiFi: has a range of a couple of miles)  “Freecycling” (give away your junk online)  Desktop search  Business Week 2007  Paperless maps (GPS)

What’s the Next Killer App?  Here are some of the “next killer apps” as cited by 2009 sources:  Dave Winer (tech blogger):  A better twitter (more bloggy?)  TheNextWeb.com  Voice twitter  David Warlick (blogger):  eportfolios for students  Info Week reader poll:  Search/data retrieval  VoIP  Identity management

The Next Killer App: Google Earth?  [Google Earth demo]  Google Earth application: Security watch   Google Earth 5 – 3D Mars!   Google Earth Zooms Too Close video: 