how quantum cryptography
play

How Quantum Cryptography Quantum . . . and Quantum Computing How - PowerPoint PPT Presentation

What Are Cyber- . . . For Cyber-Physical . . . How Cyber-Security Is . . . Quantum Challenge to . . . How Quantum Cryptography Quantum . . . and Quantum Computing How Quantum . . . How to Deal with This . . . Can Make Cyber-Physical


  1. What Are Cyber- . . . For Cyber-Physical . . . How Cyber-Security Is . . . Quantum Challenge to . . . How Quantum Cryptography Quantum . . . and Quantum Computing How Quantum . . . How to Deal with This . . . Can Make Cyber-Physical Quantum Computing . . . What About Optimization Systems More Secure Home Page Title Page Deepak Tosh, Oscar Galindo, Vladik Kreinovich, and Olga Kosheleva ◭◭ ◮◮ ◭ ◮ University of Texas at El Paso El Paso, Texas 79968, USA Page 1 of 43 dktosh@utep.edu, ogalindomo@utep.edu, vladik@utep.edu, olgak@utep.edu Go Back Full Screen Close Quit

  2. What Are Cyber- . . . For Cyber-Physical . . . 1. What Are Cyber-Physical Systems: A Brief How Cyber-Security Is . . . Reminder Quantum Challenge to . . . • Many modern complex systems include both computa- Quantum . . . tional parts and physical parts. How Quantum . . . How to Deal with This . . . • E.g., a power station includes: Quantum Computing . . . – actual electricity generators and transformers, as What About Optimization well as Home Page – computational devices that control the generators, Title Page transformers, and communications. ◭◭ ◮◮ • A city-wide system includes computers on all levels: ◭ ◮ – from microprocessors controlling individual devices Page 2 of 43 – to computers providing, e.g., city-wide optimiza- Go Back tion of transportation flows. Full Screen • Such systems are known as cyber-physical systems. Close Quit

  3. What Are Cyber- . . . For Cyber-Physical . . . 2. For Cyber-Physical Systems, Cyber-Security Is How Cyber-Security Is . . . Vital Quantum Challenge to . . . • Many computing system have been successfully attacked, Quantum . . . with information stolen or corrupted. How Quantum . . . How to Deal with This . . . • In general, cyber-security is an important problem. Quantum Computing . . . • This problem is especially vital for cyber-physical sys- What About Optimization tems, since: Home Page – by hacking into these systems, Title Page – an adversary can cause catastrophic damage: e.g., ◭◭ ◮◮ blow up a nuclear power station. ◭ ◮ Page 3 of 43 Go Back Full Screen Close Quit

  4. What Are Cyber- . . . For Cyber-Physical . . . 3. How Cyber-Security Is Provided Now How Cyber-Security Is . . . • In general, there are two main directions in providing Quantum Challenge to . . . cyber-security of the current cyber-physical systems. Quantum . . . How Quantum . . . • On the one hand: How to Deal with This . . . – there are consistent efforts to educate users, Quantum Computing . . . – so that adversaries will not use social engineering What About Optimization (as they do now) to penetrate systems. Home Page • For this purpose, users should create strong passwords, Title Page avoid disclosing them, never send them by email, etc. ◭◭ ◮◮ • On the technical side, cyber-security is (or at least ◭ ◮ should be) provided by making sure that: Page 4 of 43 – all communications between sensors and computers Go Back (and between computers themselves) – are encrypted. Full Screen • This encryption is usually based on the RSA algorithm. Close Quit

  5. What Are Cyber- . . . For Cyber-Physical . . . 4. Cyber-Security Now (cont-d) How Cyber-Security Is . . . • An agent selects two very large (up to 100 decimal Quantum Challenge to . . . digits long) prime numbers p and q . Quantum . . . How Quantum . . . • He sends their product n = p · q openly to everyone How to Deal with This . . . interested. Quantum Computing . . . • Once a recipient knows the value n , he/she can encrypt What About Optimization any message. Home Page • Any agent who knows the values p and q can decrypt Title Page this message. ◭◭ ◮◮ • However, without knowing p and q , decryption does ◭ ◮ not seem possible. Page 5 of 43 Go Back Full Screen Close Quit

  6. What Are Cyber- . . . For Cyber-Physical . . . 5. Cyber-Security Now (cont-d) How Cyber-Security Is . . . • This algorithm is secure since no efficient algorithm is Quantum Challenge to . . . known for factoring large integers: Quantum . . . How Quantum . . . – other than trying all possible prime factors from 1 to √ n , How to Deal with This . . . Quantum Computing . . . – but this would require about 10 50 computational What About Optimization steps, Home Page – this is more than the number of moments of time Title Page in the Universe. ◭◭ ◮◮ ◭ ◮ Page 6 of 43 Go Back Full Screen Close Quit

  7. What Are Cyber- . . . For Cyber-Physical . . . 6. Quantum Challenge to Cyber-Security How Cyber-Security Is . . . • A quantum algorithm designed by Peter Shor enables Quantum Challenge to . . . us to factor large integers in feasible time. Quantum . . . How Quantum . . . • Thus, it can break the RSA encryption. How to Deal with This . . . • Similar algorithms can break all similar encryptions Quantum Computing . . . algorithms. What About Optimization Home Page • This result practically guaranteed that this challenge has to be taken seriously. Title Page • Before this result, quantum computing was mostly an ◭◭ ◮◮ academic topic close to science fiction; but: ◭ ◮ – once it turned out that a quantum computer will Page 7 of 43 enable to us to read all the messages sent so far, Go Back – all the governments and all big companies have in- Full Screen vested billions of dollars into quantum computing. Close Quit

  8. What Are Cyber- . . . For Cyber-Physical . . . 7. Quantum Challenge (cont-d) How Cyber-Security Is . . . • Whoever gets there first will be the first to read all the Quantum Challenge to . . . information. Quantum . . . How Quantum . . . • Thus, this person will gain a tremendous advantage How to Deal with This . . . over others. Quantum Computing . . . • Thousands of researchers and practitioners all over the What About Optimization world are working on designing a quantum computer. Home Page • This practically guarantees that it will be eventually Title Page built. ◭◭ ◮◮ • It may take 5 years, it may take 20 years, but it will ◭ ◮ be built. Page 8 of 43 • And so, we must be ready for this challenge. Go Back Full Screen Close Quit

  9. What Are Cyber- . . . For Cyber-Physical . . . 8. Quantum Cryptography: A Secure Alternative How Cyber-Security Is . . . to RSA Encoding Quantum Challenge to . . . • The situation with cyber-security is not as gloomy as Quantum . . . it may seem at first glance. How Quantum . . . How to Deal with This . . . • Yes, quantum algorithms make RSA vulnerable. Quantum Computing . . . • However, quantum algorithms also provide an unbreak- What About Optimization able (so far) alternative to RSA. Home Page • It is called quantum cryptography . Title Page • Another good news is that: ◭◭ ◮◮ – while general quantum computing algorithms can- ◭ ◮ not yet be practically implemented Page 9 of 43 – quantum cryptography is perfectly practical, and it Go Back has been implemented. Full Screen • There is a quantum computing-protected communica- tion line between the White House and the Pentagon. Close Quit

  10. What Are Cyber- . . . For Cyber-Physical . . . 9. Quantum Cryptography (cont-d) How Cyber-Security Is . . . • China used quantum cryptography it to communicat- Quantum Challenge to . . . ing with a satellite. Quantum . . . How Quantum . . . • Yet another good news is that: How to Deal with This . . . – not only the current quantum cryptography algo- Quantum Computing . . . rithm unbreakable; What About Optimization – this algorithm is also, in some reasonable sense, the Home Page best possible. Title Page • Not only it is the best possible for two-agent commu- ◭◭ ◮◮ nication. ◭ ◮ • It is also clear how to use it in the most efficient way Page 10 of 43 for multi-agent communications. Go Back Full Screen Close Quit

  11. What Are Cyber- . . . For Cyber-Physical . . . 10. What We Do in This Talk How Cyber-Security Is . . . • First, we provide a brief description of quantum cryp- Quantum Challenge to . . . tography. Quantum . . . How Quantum . . . • Our main objective is to use quantum cryptography How to Deal with This . . . for making cyber-physical systems more secure. Quantum Computing . . . • We will also analyze how quantum computing can help What About Optimization in the design of cyber-physical systems. Home Page Title Page ◭◭ ◮◮ ◭ ◮ Page 11 of 43 Go Back Full Screen Close Quit

  12. What Are Cyber- . . . For Cyber-Physical . . . 11. Basic Facts From Quantum Mechanics: A Brief How Cyber-Security Is . . . Reminder Quantum Challenge to . . . • In quantum mechanics: Quantum . . . How Quantum . . . – in addition to the usual classical states s 1 , . . . , s n , How to Deal with This . . . – we also have superpositions , i.e., states of the type Quantum Computing . . . s = c 1 · | s 1 � + . . . + c n · | s n � . What About Optimization Home Page • Here c 1 , . . . , c n are complex numbers for which Title Page | c 1 | 2 + . . . + | c n | 2 = 1 . ◭◭ ◮◮ • These states can be viewed as vectors ( c 1 , . . . , c n ) in ◭ ◮ the n -dimensional complex-valued vector space C n . Page 12 of 43 • In particular, each of the original states s i corresponds Go Back to a vector (0 , . . . , 0 , 1 , 0 , . . . , 0) with 1 in the i -th place. Full Screen Close Quit

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend