Cryptography, quantum computing, and evolutionary computation Thijs - - PowerPoint PPT Presentation

cryptography quantum computing and evolutionary
SMART_READER_LITE
LIVE PREVIEW

Cryptography, quantum computing, and evolutionary computation Thijs - - PowerPoint PPT Presentation

Cryptography, quantum computing, and evolutionary computation Thijs Laarhoven mail@thijs.com http://www.thijs.com/ CFMAI 2019, Bangkok, Thailand (December 13, 2019) Cryptography History Cryptography Classical cryptography Some operations


slide-1
SLIDE 1

Cryptography, quantum computing, and evolutionary computation

Thijs Laarhoven

mail@thijs.com http://www.thijs.com/

CFMAI 2019, Bangkok, Thailand

(December 13, 2019)

slide-2
SLIDE 2

Cryptography

History

slide-3
SLIDE 3

Cryptography

Classical cryptography

Some operations are easy to perform in one direction... 7 × 17 = 714881 × 448843 =

slide-4
SLIDE 4

Cryptography

Classical cryptography

Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 =

slide-5
SLIDE 5

Cryptography

Classical cryptography

Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683,

slide-6
SLIDE 6

Cryptography

Classical cryptography

Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 188629334237 =

slide-7
SLIDE 7

Cryptography

Classical cryptography

Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 11 × 13, 188629334237 =

slide-8
SLIDE 8

Cryptography

Classical cryptography

Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 11 × 13, 188629334237 = 214729 × 878453.

slide-9
SLIDE 9

Cryptography

Classical cryptography

Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 11 × 13, 188629334237 = 214729 × 878453. The security of modern cryptography depends on the hardness of such problems.

slide-10
SLIDE 10

Cryptography

Protocols

Example: Suppose Bob wishes to send a private message to Alice across the world.

slide-11
SLIDE 11

Cryptography

Protocols

Example: Suppose Bob wishes to send a private message to Alice across the world. Insecure solution:

  • Bob sends Alice the message in the clear over the internet.
  • Problem: Others can see the contents of the message.
slide-12
SLIDE 12

Cryptography

Protocols

Example: Suppose Bob wishes to send a private message to Alice across the world. Insecure solution:

  • Bob sends Alice the message in the clear over the internet.
  • Problem: Others can see the contents of the message.

More secure solution:

  • Alice sends Bob a product (323), for which only she knows the factors (17,19).
  • Bob computes some function of his message modulo 323 and sends it to Alice.

◮ This function is easy to compute but hard to invert without the prime factors

  • Alice, knowing the prime factors, can invert and recover Bob’s message.
slide-13
SLIDE 13

Quantum computing

Overview

slide-14
SLIDE 14

Quantum computing

Applications to cryptography

slide-15
SLIDE 15

Post-quantum cryptography

Ongoing efforts

slide-16
SLIDE 16

Post-quantum cryptography

Candidates

slide-17
SLIDE 17

O

Lattices

Basics

slide-18
SLIDE 18

b1 b2 O

Lattices

Basics

slide-19
SLIDE 19

b1 b2 O

Lattices

Basics

slide-20
SLIDE 20

b1 b2 O

Lattices

Shortest Vector Problem (SVP)

slide-21
SLIDE 21

b1 b2 O

Lattices

Shortest Vector Problem (SVP)

slide-22
SLIDE 22

b1 b2 O

Lattices

Evolutionary approach to SVP

Basic lattice tools

  • Given a lattice basis, sampling a (long) lattice vector v ∈ L(B) is easy
  • If v1 and v2 are lattice points, then so is w = v1 − v2
slide-23
SLIDE 23

b1 b2 O

Lattices

Evolutionary approach to SVP

Basic lattice tools

  • Given a lattice basis, sampling a (long) lattice vector v ∈ L(B) is easy
  • If v1 and v2 are lattice points, then so is w = v1 − v2

Evolutionary approach

  • Construct random initial population of lattice vectors
  • Combine parent vectors vi,vj to produce offspring w
  • Select the fittest parents and children for the next generation
  • Repeat until the population contains a shortest non-zero lattice vector
slide-24
SLIDE 24

O

Lattices

Sample a list of random lattice vectors

slide-25
SLIDE 25

v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 O

Lattices

Sample a list of random lattice vectors

slide-26
SLIDE 26

v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 O

Lattices

Collect all short difference vectors

slide-27
SLIDE 27

v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 O

Lattices

Collect all short difference vectors

slide-28
SLIDE 28

v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 O

Lattices

Repeat same procedure with difference vectors

slide-29
SLIDE 29

v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 O

Lattices

Repeat same procedure with difference vectors

slide-30
SLIDE 30

v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 O

Lattices

Repeat same procedure with difference vectors

slide-31
SLIDE 31

v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 O

Lattices

Repeat same procedure with difference vectors

slide-32
SLIDE 32

v1 v2 v3 v4 v5 v6 v7 v8 v9 v10 v11 v12 v13 v14 v15 w1 w2 w3 w4 w5 w6 w7 w8 w9 w10 O

Lattices

Repeat same procedure with difference vectors

slide-33
SLIDE 33

Summary

  • Cryptography:

◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring

slide-34
SLIDE 34

Summary

  • Cryptography:

◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring

  • Quantum computing:

◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes

slide-35
SLIDE 35

Summary

  • Cryptography:

◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring

  • Quantum computing:

◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes

  • Post-quantum cryptography:

◮ Relies on different hard problems, such as lattice problems ◮ Transitions are gradually happening, standardization in progress

slide-36
SLIDE 36

Summary

  • Cryptography:

◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring

  • Quantum computing:

◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes

  • Post-quantum cryptography:

◮ Relies on different hard problems, such as lattice problems ◮ Transitions are gradually happening, standardization in progress

  • Artificial intelligence:

◮ Offers new powerful algorithmic tools and capabilities ◮ Evolutionary techniques improve state-of-the-art for lattice problems ◮ Only scratching the surface – more applications possible?