Cryptography, quantum computing, and evolutionary computation
Thijs Laarhoven
mail@thijs.com http://www.thijs.com/
CFMAI 2019, Bangkok, Thailand
(December 13, 2019)
Cryptography, quantum computing, and evolutionary computation Thijs - - PowerPoint PPT Presentation
Cryptography, quantum computing, and evolutionary computation Thijs Laarhoven mail@thijs.com http://www.thijs.com/ CFMAI 2019, Bangkok, Thailand (December 13, 2019) Cryptography History Cryptography Classical cryptography Some operations
mail@thijs.com http://www.thijs.com/
(December 13, 2019)
History
Classical cryptography
Classical cryptography
Classical cryptography
Classical cryptography
Classical cryptography
Classical cryptography
Classical cryptography
Protocols
Protocols
Protocols
◮ This function is easy to compute but hard to invert without the prime factors
Overview
Applications to cryptography
Ongoing efforts
Candidates
Basics
Basics
Basics
Shortest Vector Problem (SVP)
Shortest Vector Problem (SVP)
Evolutionary approach to SVP
Evolutionary approach to SVP
Sample a list of random lattice vectors
Sample a list of random lattice vectors
Collect all short difference vectors
Collect all short difference vectors
Repeat same procedure with difference vectors
Repeat same procedure with difference vectors
Repeat same procedure with difference vectors
Repeat same procedure with difference vectors
Repeat same procedure with difference vectors
◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring
◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring
◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes
◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring
◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes
◮ Relies on different hard problems, such as lattice problems ◮ Transitions are gradually happening, standardization in progress
◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring
◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes
◮ Relies on different hard problems, such as lattice problems ◮ Transitions are gradually happening, standardization in progress
◮ Offers new powerful algorithmic tools and capabilities ◮ Evolutionary techniques improve state-of-the-art for lattice problems ◮ Only scratching the surface – more applications possible?