quantum computing in cryptography
play

Quantum Computing in Cryptography MATH318/CPSC418 April 15, 2020 - PowerPoint PPT Presentation

Quantum Computing in Cryptography MATH318/CPSC418 April 15, 2020 Topics: 1. Qubits: why quantum? 2. Shors algorithm and the DLP 3. Quantum Key Distribution and BB84 4. More directions in quantum cryptography 5. Resources: more directions


  1. Quantum Computing in Cryptography MATH318/CPSC418 April 15, 2020

  2. Topics: 1. Qubits: why quantum? 2. Shor’s algorithm and the DLP 3. Quantum Key Distribution and BB84 4. More directions in quantum cryptography 5. Resources: more directions for you!

  3. Part 1: Basics

  4. What is a bit? • Essentially, a system that stores a binary value (0 or 1) • Implemented by capacitors that store charge

  5. What is a qubit? • Represented by a complex unit vector • (modulo global phase) • • - Measurement can only distinguish with certainty between opposite points on the Bloch sphere

  6. Basis measurements

  7. Really, what is a qubit? So far, there are several possible ways to build one: • NMR (nuclear magnetic resonance) devices • NV (nitrogen vacancy) centers • Superconductors • Photons • Trapped ions

  8. Properties of qubits • Superposition • Interference • Entanglement

  9. More weird stuff • Measurement postulate • No cloning theorem

  10. More weird stuff • Measurement postulate • No cloning theorem • Can make some tasks difficult, but great for crypto!

  11. Part 2: Shor’s algorithm

  12. Question: how to agree on a key? • Agree in person, in advance • Send via a trusted courier • Use a public channel, relying on the protocol for secrecy • e.g. Diffie-Hellman, RSA, El Gamal

  13. Question: how to agree on a key? • Agree in person, in advance • Send via a trusted courier • Use a public channel, relying on the protocol for secrecy • e.g. Diffie-Hellman, RSA, El Gamal • All of these rely on computationally difficult problems

  14. Shor’s algorithm • Both DLP and factoring can be solved by a quantum computer in polynomial time, using Shor’s algorithm • Both problems are examples of the HSP (hidden subgroup problem) • HSP is still open in general, but solved for finite abelian groups • No good classical algorithm exists

  15. Classical reduction • Given 𝑂 = 𝑞𝑟 with 𝑞, 𝑟 prime, find 𝑞 or 𝑟 • Assume 𝑞, 𝑟 ≠ 2, 𝑞 ≠ 𝑟 • Quantum computers can compute periods in polynomial time: • Given 𝑏 and 𝑂 , find the smallest exponent 𝑠 > 0 such that 𝑏 𝑠 = 𝑏 0 = 1 (mod 𝑂 ) • Based on superposition and interference • Special case of DLP!

  16. Algorithm: 1. Pick 𝑏 < 𝑂 and check that gcd 𝑏, 𝑂 = 1 2. Find 𝑠 , the period of 𝑏 mod 𝑂 3. If 𝑠 is odd, go back to step 1 4. If 𝑠 is even: If 𝑏 𝑠/2 = −1 (mod 𝑂 ), go back to step 1 1. Else, one of gcd(𝑏 𝑠/2 + 1, 𝑂) or gcd(𝑏 𝑠/2 − 1, 𝑂) is a factor of 𝑂 2.

  17. Consequences • Diffie-Hellman, RSA, El Gamal, etc. are no longer considered safe • Record for largest number factored is 1,005,973 as of 2019 • Post-quantum cryptography relies on computational difficulty of problems that are (assumed to be) difficult for both classical and quantum computers • e.g. lattices, multivariable equations, etc.

  18. Part 3: QKD

  19. Question: how to agree on a key? • Agree in person, in advance • Send via a trusted courier • Use a public channel, relying on the protocol for secrecy • e.g. Diffie-Hellman, RSA, El Gamal • All of these rely on computationally difficult problems! One solution: quantum key distribution (QKD)

  20. A protocol: BB84

  21. What about Eve?

  22. Is it secure? • In theory, BB84 allows Alice to send a key to Bob over public channels • If someone is listening, they will be caught with high probability • This security makes no assumptions about Eve’s computational power

  23. …really ? • BB84 is very susceptible to physical attacks • If Eve can figure out Alice’s basis string, then security is completely lost https://nis-summer-school.enisa.europa.eu/2018/cources/PQC/7-preneel_qkd_enisa_v2.pdf

  24. Current challenges • Qubit decoherence – qubits can “measure themselves” in transit • Appears to be a listener, even if there isn’t • Key rate is very low • Less than half of the bits transmitted can be used for the key in the ideal scenario • The more decoherence, the lower the key rate • Eve can easily prevent Alice and Bob from ever establishing a key

  25. Modern QKD: Ideas • Now in use by major banks, governments, etc. • Still developing new protocols to improve the key rate, simplify measurements, etc. • Satellite QKD is looking the most promising • Difficult for Eve to interfere with a signal in freespace • More immune to tampering with actual device • Device-independent QKD • What if Alice and Bob don’t trust their QKD devices? • Tied to non-local games

  26. Part 4: Quantum cryptography

  27. Quantum coin-flipping • Suppose Alice and Bob want to flip a coin and communicate the result over a public channel • Both want to win the toss, and neither trusts the other (or the channel) • This can be done using a quantum coin-flipping protocol • Similar idea to BB84

  28. Three-step quantum cryptography • QKD can only be used to establish secure keys, not for sending data • Encryption/decryption is still Classical • Kak’s three-step protocol is a form of quantum encryption • Related to quantum commitment schemes • Alice and Bob each have the ability to “lock” their data, such that only they can later unlock it

  29. Position-based verification • Message can only be decrypted by a user at a specific geographic location • Works in theory, but not practical in the foreseeable future • Requires a large amount of entanglement

  30. Part 5: Resources And some other stuff

  31. D-Wave • https://www.dwavesys.com/ • Adiabatic quantum computation, useful for machine learning and optimization problems • Not a universal form of computation, so hasn’t attracted as much attention as Google or IBM • Company based on selling cloud access to their computers • Currently holds record for largest number factored: 1,005,973 https://link.springer.com/article/10.1007/s11433-018-9307-1

  32. IBM Qiskit • https://qiskit.org/ • Superconducting quantum computers with 5, 20 or 50 qubits, for research and teaching purposes • Anyone can run programs on their smaller computers via internet • Sometimes there is a queue, though, and there is regular maintenance • There are a lot of beginner tutorials on their website, so it is worth looking at if you’re interested

  33. And finally… You should take CPSC519 (offered fall 2020)! • But be prepared for a lot of linear algebra

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend