Cryptography in a Quantum World Grgoire Ribordy ID Quantique May - - PowerPoint PPT Presentation

cryptography in a quantum world
SMART_READER_LITE
LIVE PREVIEW

Cryptography in a Quantum World Grgoire Ribordy ID Quantique May - - PowerPoint PPT Presentation

Cryptography in a Quantum World Grgoire Ribordy ID Quantique May 2016 ID Quantique PROPRIETARY Cybersecurity Cybertechnologies are becoming Cybersecurity is a growing and increasingly pervasive. fundamental part of safety and


slide-1
SLIDE 1

ID Quantique PROPRIETARY

May 2016

Cryptography in a Quantum World

Grégoire Ribordy ID Quantique

slide-2
SLIDE 2

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

Cybersecurity

▸ Cybertechnologies are becoming

increasingly pervasive.

▸ Cybersecurity is a growing and

fundamental part of safety and security of individuals,

  • rganizations and society

2

slide-3
SLIDE 3

ID Quantique PROPRIETARY

Cryptography…

3

… is a foundational pillar of cybersecurity

  • Cryptography allows us to achieve information security while

using untrusted communication systems.

  • Example: Do you use e-banking? Why do you trust the

system?

slide-4
SLIDE 4

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

Goals of Cryptography

Confid entialit y Integrity Authentication Non- Repudi ation

Information Security

slide-5
SLIDE 5

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

Eve Alice Bob

Message Message Scrambled Message Secret Key Secret Key

Cryptographic Primitives

Public Key Private Key

Eve Alice Bob

Message Message Scrambled Message

Asymmetric Symmetric Confidentiality + other similar primitives for other goals (digitial signatures, etc.)

slide-6
SLIDE 6

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

2’357 x 4’201 = ? A x B = 9’901’757

Eve Alice Bob

Message Message Scrambled Message Public Key Symmetric Cryptography Private Key Asymmetric Cryptography Secret Key Secret Key

Cryptographic Protocol

slide-7
SLIDE 7

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

Computational Security

7

Computer Science

Hard! Easy!

slide-8
SLIDE 8

ID Quantique PROPRIETARY

8

Classical and Quantum Physics

Quantum physics

After 1900

– Describes of the microscopic world – – Probabilistic – – Central role of the observer – – Not very intuitive –

Quantum physics Quantum Information Theory (QIT) Novel information processing possibilities

Classical physics

Before 1900

– Describes the macroscopic world – – Deterministic – – Intuitive –

slide-9
SLIDE 9

ID Quantique PROPRIETARY

9

– Computation is a physical process – – Bits → Qubits – – Major consequences in Information Security –

Post-Quantum Era? A World with Quantum Computers

Computer Science

Physics

slide-10
SLIDE 10

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

Cryptography in a World with Quantum Computers

1

Computer Science

Hard! Easy! Physics Easy!

slide-11
SLIDE 11

ID Quantique PROPRIETARY

11

Grover’s Algorithm

Lov Grover, 1996

Quantum algorithm to perform search in an unsorted database

O(n½) vs O(n)

Key halfed for symmetric cryptography AES-128 → 64 bits security AES-256 → 128 bits security

Quantum Algorithms & Impact on Today’s Cryptography

Can break RSA, Elliptic Curve & Diffie Hellman

Shor’s Algorithm

Peter Shor, 1994

Quantum algorithm for integer factorization

O((log N)3) vs. O(e1.9 (log N)1/3 (log log N)2/3)

slide-12
SLIDE 12

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

Eve Alice Bob

Message Message Scrambled Message Public Key Private Key Secret Key Secret Key

Cryptographic Primitives

Eve Alice Bob

Message Message Scrambled Message

Asymmetric Symmetric Confidentiality Symmetric crypto primitives: ok (if key long enough) Asymmetric crypto primitives: at risk

slide-13
SLIDE 13

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

IBM invests $3B in research initiative that includes quantum computing Microsoft starts Station Q at UC Santa Barbara ID Quantique established and starts R&D on quantum communication Chinese government plans major investment in quantum computing Lockheed Martin buys D-Wave Two1

2000 2005 2010 2015

UK Government invests £270M in quan-tum techno-logies in next 5 years EU invests €50-75 M in quantum technologies via FET program

  • ver next 7

years Canadian government invests €78M in quantum technologies

  • ver next 7

years Google ab- sorbs John Martinis’ research group

(UC Santa Barbara)

USA ARDA invests in Quantum Information Science and Technology Roadmap Intel invests $50M in QuTech NL Government invests €135M in QuTech Delft

  • ver next 10

years EU investment

Increasing Interest in Quantum IT

2013 July 2014 Sep 2014 2015 2005 2001 1999 2004 2010 Dec 2013 Jun 2015 2015 201x

slide-14
SLIDE 14

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

14

Quantum Computers in the News

slide-15
SLIDE 15

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

When Do We Need to Worry?

1 5

y x z

Time

How long do you need encryption to be secure? How much time will it take to re-tool the existing infrastructure with a quantum-safe solution? How long will it take for a large scale quantum computer to be built (or for any other relevant advance

x y z

Not possible to provide the required x years of security

x y zy z

+ > > System will collapse in z years with no easy fix

slide-16
SLIDE 16

ID Quantique PROPRIETARY

16

Why Is this Important? A Classical Risk Analysis

Probability

  • f threat

currently low but increasing

Risk Impact

  • f threat

Extremely high if no action taken

– Conduct Quantum-Risk Assessment – – Engineer Crypto Agility – – Enter in the Post-Quantum Era –

slide-17
SLIDE 17

ID Quantique PROPRIETARY ID Quantique PROPRIETARY

Quantum-Safe Transition

“We announce preliminary plans for transitioning to quantum resistant algorithms.”

  • Aug. 2015
slide-18
SLIDE 18

ID Quantique PROPRIETARY

18

Quantum Key Distribution

Hardware solution.

Typically no computational assumptions and thus known to be secure against future quantum attacks.

Recommended for encryption of high-value information with requirement for long-term confidentiality.

− E.g. Data center interconnect, government data

The Solution: Quantum-Safe Cryptographic Infrastructure

“Post-quantum” algorithms (aka quantum-resistant algorithms)

Classical codes deployable without quantum technologies.

  • Eg. Lattice, matrix -based algorithms

Believed to be secure against Shor’s algorithm but no guarantee that there will not be other quantum attacks.

Recommended for quantum-safe digital signatures & end point encryption.

Hugo Zbinden