cryptography quantum computing and evolutionary
play

Cryptography, quantum computing, and evolutionary computation Thijs - PowerPoint PPT Presentation

Cryptography, quantum computing, and evolutionary computation Thijs Laarhoven mail@thijs.com http://www.thijs.com/ CFMAI 2019, Bangkok, Thailand (December 13, 2019) Cryptography History Cryptography Classical cryptography Some operations


  1. Cryptography, quantum computing, and evolutionary computation Thijs Laarhoven mail@thijs.com http://www.thijs.com/ CFMAI 2019, Bangkok, Thailand (December 13, 2019)

  2. Cryptography History

  3. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 714881 × 448843 =

  4. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 =

  5. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683,

  6. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 188629334237 =

  7. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 11 × 13, 188629334237 =

  8. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 11 × 13, 188629334237 = 214729 × 878453.

  9. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 11 × 13, 188629334237 = 214729 × 878453. The security of modern cryptography depends on the hardness of such problems.

  10. Cryptography Protocols Example : Suppose Bob wishes to send a private message to Alice across the world.

  11. Cryptography Protocols Example : Suppose Bob wishes to send a private message to Alice across the world. Insecure solution : • Bob sends Alice the message in the clear over the internet. • Problem: Others can see the contents of the message.

  12. Cryptography Protocols Example : Suppose Bob wishes to send a private message to Alice across the world. Insecure solution : • Bob sends Alice the message in the clear over the internet. • Problem: Others can see the contents of the message. More secure solution : • Alice sends Bob a product (323), for which only she knows the factors (17,19). • Bob computes some function of his message modulo 323 and sends it to Alice. ◮ This function is easy to compute but hard to invert without the prime factors • Alice, knowing the prime factors, can invert and recover Bob’s message.

  13. Quantum computing Overview

  14. Quantum computing Applications to cryptography

  15. Post-quantum cryptography Ongoing efforts

  16. Post-quantum cryptography Candidates

  17. Lattices Basics O

  18. Lattices Basics b 2 b 1 O

  19. Lattices Basics b 2 b 1 O

  20. Lattices Shortest Vector Problem (SVP) b 2 b 1 O

  21. Lattices Shortest Vector Problem (SVP) b 2 b 1 O

  22. Lattices Evolutionary approach to SVP b 2 Basic lattice tools b 1 • Given a lattice basis, sampling a (long) lattice vector v ∈ L ( B ) is easy • If v 1 and v 2 are lattice points, then so is w = v 1 − v 2 O

  23. Lattices Evolutionary approach to SVP b 2 Basic lattice tools b 1 • Given a lattice basis, sampling a (long) lattice vector v ∈ L ( B ) is easy • If v 1 and v 2 are lattice points, then so is w = v 1 − v 2 Evolutionary approach • Construct random initial population of lattice vectors O • Combine parent vectors v i , v j to produce offspring w • Select the fittest parents and children for the next generation • Repeat until the population contains a shortest non-zero lattice vector

  24. Lattices Sample a list of random lattice vectors O

  25. v 9 Lattices v 12 Sample a list of random lattice vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  26. v 9 Lattices v 12 Collect all short difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  27. v 9 Lattices v 12 Collect all short difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  28. v 9 Lattices v 12 Repeat same procedure with difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  29. v 9 Lattices v 12 Repeat same procedure with difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  30. v 9 Lattices v 12 Repeat same procedure with difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  31. v 9 Lattices v 12 Repeat same procedure with difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  32. v 9 Lattices v 12 Repeat same procedure with difference vectors v 2 v 15 v 8 w 5 v 4 v 14 w 7 w 4 w 6 v 1 w 8 v 6 w 1 v 5 v 3 O w 10 w 3 v 7 v 11 w 2 v 10 w 9 v 13

  33. Summary • Cryptography : ◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring

  34. Summary • Cryptography : ◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring • Quantum computing : ◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes

  35. Summary • Cryptography : ◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring • Quantum computing : ◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes • Post-quantum cryptography : ◮ Relies on different hard problems, such as lattice problems ◮ Transitions are gradually happening, standardization in progress

  36. Summary • Cryptography : ◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring • Quantum computing : ◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes • Post-quantum cryptography : ◮ Relies on different hard problems, such as lattice problems ◮ Transitions are gradually happening, standardization in progress • Artificial intelligence : ◮ Offers new powerful algorithmic tools and capabilities ◮ Evolutionary techniques improve state-of-the-art for lattice problems ◮ Only scratching the surface – more applications possible?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend