FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
[[ NET-CENTRIC CAPABILITIES TURBULENCE TECHNICAL OVERVIEW : AUGUST 2007 ]] MATH CAREERS AT NATIONAL SECURITY AGENCY Jill Calhoun May 2010.
Quantum Cryptography: Presented by Benson Gilbert and Jack Sloane May 2004 Information Protection for the Quantum Age.
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
By Nicholas Moradi CST 300L Fall In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Security Grant Hutchins CS Discussion Group Tuesday, October 22, 2002.
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
A Security Approach In The Cloud Rick Rodin Dwight Bygrave Evgeni Sadovski Maria Azua DPS Class of 2012 – Team 2 1.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Blake Morell Daniel Bowser Trenton Wood. Contents Background Experimental Design & Outcome Implications Future Applications.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
QUANTUM COMPUTING What is it ? Jean V. Bellissard Georgia Institute of Technology & Institut Universitaire de France.
Copyright © 2006 Keio University Applications of an Entangled Quantum Internet Conference on Future Internet Technologies Seoul, Korea June 20, 2008 Rodney.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Nawaf M Albadia
Is This the Dawn of the Quantum Information Age? Discovering Physics, Nov. 5, 2003.
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Uni-Heidelberg Physikalisches Insitut Jian-Wei Pan Multi-Particle Entanglement & It’s Application in Quantum Networks Jian-Wei Pan Lecture Note.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
Chaos, Communication and Consciousness Module PH19510 Lecture 13 Encryption in the Computer Age.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Breaking RSA Encryption Nick Manners. History of Cryptography  Used to be strictly in the domain of governments… state secrets.  Particularly important.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Computing
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Institute of Physics (IOP), Bhubaneswar
COMPSCI 290.2: Computer Security
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Group 7 Justin Jones Ashley Robinett Jonathan Bull
By Jeff Hinson CS691, Summer 2009
Quantum teleportation: from Chinese legends to Quantum Communication
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Quantum Cryptography Christian Schaffner
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important for understanding the environments in which the U.S. military operates. FMSO's work today is still aimed at publication in unclassified journals and its research findings are taught in both military and civilian venues in the United States and around the world. FMSO is organized in the U.S. Army Training and Doctrine Command under the TRADOC G-2. Foreign Military Studies Office

The views expressed in this presentation are those of the author and do not necessarily represent the official policy or position of the Department of the Army, Department of Defense, or the U.S. Government. Disclaimer

PLA University of Science & Technology “Dissidence and Human Rights in China” by “Ian Holton” Licensed under “CC-BY)

1.Quantum Physics versus Classical Physics 2.Quantum Computer 3.Quantum Encryption 4.China 5.Possible Implications Overview

“The world is in the midst of a second quantum revolution.” Jonathan P. Dowling & Gerard J. Milburn

1.The theoretical basis of modern physics that explains the nature and behavior of matter and energy on the atomic and subatomic level. 2.Quantum physics is qualitatively different than what we experience in our everyday lives. 3.The quantum world is at the very smallest scale of reality. 4.It is random and interconnected. 5.How can we take these tiny elements and blow up their capabilities? What is Quantum?

Quantum Entanglement

Spooky action from a distance.

The Quantum Computer

A nation’s success in military operations often rises and falls on the basis of how well it communicates. When a nation does not secure its communications effectively, its enemies intercept and read its communications and win thereby military and diplomatic advantages. Southeast Asia: Working Against the Tide National Security Agency 1970

Evolution of Cryptography

Diffie-Hellman (DH) algorithm 1976 Public Key Distribution Rivest, Shamir, Alderman (RSA) 1977 Evolution of Cryptography

Charles H. Bennett & Gilles Brassard BB84 Protocol Evolution of Cryptography The next step?

Guo Guangcan Est 2001

Pan Jianwei Thousand Talents Program

Alice Eve Bob Quantum Encryption

Quantum Encryption

Classical Channel Quantum Encryption

Process A 0 1 Machine A Quantum Encryption

Machine B Process B 0 ? Quantum Encryption

Machine BMachine A Quantum Encryption

75% Quantum Encryption

50% Right machine 50% Wrong machine Quantum Encryption

Quantum Encryption

Options 1.Fiber Optic Cable 2.Teleportation Transmitting the Data

Image source: Science Daily Fiber Optic Cable Transmitting the Data

Image source: Wired Teleportation Transmitting the Data

Image source: Wired Transmitting the Data “A functional satellite-based quantum communication system would give the Chinese military the ability to operate further afield without fear of message interception.” Matthew Luce Defense Group Inc. Center for Intelligence Research and analysis

2004: 125-km fiber point-to point QKD experiment 2005: Provided an “experimental demonstration of five-photon entanglement and open-destination teleportation. 2006: Quantum teleportation of a two-particle system. 2007: Creation of first quantum router. 2009: Built the world's first quantum encrypted government network. 2012: Teleportation of multiple photons 97 km. China

2012: China designated quantum information technology as one four key areas of scientific research in the next 15 years. 2016: To launch the first “Chinese Quantum Science Satellite.” China

South China Morning Post Nov 2014

Possible Implications Quantum computerQuantum encryption Can break modern day encryption systems Can solve complex questions Economic advantage Theoretically unbreakable Economic advantage Research and Development Research in quantum apps can expose weaknesses in a network should another nation win the race.