Quantum Cryptography Mris Ozols University of Cambridge Overview - - PowerPoint PPT Presentation

quantum cryptography
SMART_READER_LITE
LIVE PREVIEW

Quantum Cryptography Mris Ozols University of Cambridge Overview - - PowerPoint PPT Presentation

Quantum Cryptography Mris Ozols University of Cambridge Overview What are quantum computers? What is quantum cryptography? - Shor's algorithm for factoring - Quantum key distribution - Device-independent quantum cryptography What


slide-1
SLIDE 1

Quantum Cryptography

Māris Ozols

University of Cambridge

slide-2
SLIDE 2

Overview

  • What are quantum computers?
  • What is quantum cryptography?
  • Shor's algorithm for factoring
  • Quantum key distribution
  • Device-independent quantum cryptography
slide-3
SLIDE 3

What is quantum computing?

Physics Computer Science Mathematics

Quantum Computing

slide-4
SLIDE 4

Quantum mechanics

slide-5
SLIDE 5

How to simulate quantum physics?

Simulating quantum systems on a regular computer is very hard... Wouldn't it be easier if the computer itself would

  • perate based on the laws
  • f quantum physics?

Richard Feynman

slide-6
SLIDE 6

What is a quantum computer?

Quantum mechanics Quantum computer is a device that processes information by using quantum phenomena

+

Computer

slide-7
SLIDE 7

What quantum computers are not...

slide-8
SLIDE 8

just

smaller

What quantum computers are not...

slide-9
SLIDE 9

just

smaller

What quantum computers are not...

just faster

slide-10
SLIDE 10

just

smaller

What quantum computers are not...

exponentially

faster just faster

slide-11
SLIDE 11

just

smaller

What quantum computers are not...

exponentially

faster just faster science fiction

slide-12
SLIDE 12

just

smaller

What quantum computers are not...

exponentially

faster just faster

available for $ale

science fiction

slide-13
SLIDE 13

Quantum cryptography

  • Quantum algorithms for breaking

existing cryptosystems

  • Shor's algorithm for factoring
slide-14
SLIDE 14

Quantum cryptography

  • Quantum algorithms for breaking

existing cryptosystems

  • Shor's algorithm for factoring
  • Enabling secure communication
  • Quantum key distribution
slide-15
SLIDE 15

Quantum cryptography

  • Quantum algorithms for breaking

existing cryptosystems

  • Shor's algorithm for factoring
  • Enabling secure communication
  • Quantum key distribution
  • Computation with untrusted devices
  • Device-independent quantum cryptography
slide-16
SLIDE 16

Multiplying vs factoring

3 × 5 = 15 11 × 13 = 143 28423087481 × 25162321141 = 715190855015658735821 Multiplying is easy...

slide-17
SLIDE 17

Multiplying vs factoring

3 × 5 = 15 11 × 13 = 143 28423087481 × 25162321141 = 715190855015658735821 Multiplying is easy...

slide-18
SLIDE 18

Multiplying vs factoring

12 = 3 × 4 377 = 13 × 29 57249035862524887649 = 2543563837 × 22507410677 3 × 5 = 15 11 × 13 = 143 28423087481 × 25162321141 = 715190855015658735821 Multiplying is easy... Factoring is not...

slide-19
SLIDE 19

Multiplying vs factoring

12 = 3 × 4 377 = 13 × 29 57249035862524887649 = 2543563837 × 22507410677 3 × 5 = 15 11 × 13 = 143 28423087481 × 25162321141 = 715190855015658735821 Multiplying is easy... Factoring is not...

slide-20
SLIDE 20

Public-key cryptography (RSA)

slide-21
SLIDE 21

Public-key cryptography (RSA)

Public key

57249035862524887649

Private key

2543563837 22507410677

slide-22
SLIDE 22

Public-key cryptography (RSA)

Public key

57249035862524887649

Private key

2543563837 22507410677

Message Encrypt

slide-23
SLIDE 23

Public-key cryptography (RSA)

Public key

57249035862524887649

Private key

2543563837 22507410677

Message Encrypt Decrypt Message

slide-24
SLIDE 24

Shor's algorithm breaks RSA

Peter Shor

  • Produces prime factors of a given integer
  • Runs in polynomial time

(best known classical algorithm runs in exponential time)

slide-25
SLIDE 25

Shor's algorithm breaks RSA

Peter Shor Fourier transform of Peter Shor

  • Produces prime factors of a given integer
  • Runs in polynomial time

(best known classical algorithm runs in exponential time)

  • Based on quantum Fourier transform
slide-26
SLIDE 26

Quantum key distribution

slide-27
SLIDE 27

Quantum key distribution

Uncertainty principle Quantum system cannot be

  • bserved without disturbing it
slide-28
SLIDE 28

Quantum key distribution

slide-29
SLIDE 29

Device-independent quantum cryptography

untrusted device

slide-30
SLIDE 30

Device-independent quantum cryptography

test test test test compute test test

untrusted device

Strategy 1: Self-testing

slide-31
SLIDE 31

Device-independent quantum cryptography

test test test test compute test test

untrusted device 2

test test test test compute test test

untrusted device 1

Strategy 2: Cross-checking

slide-32
SLIDE 32

Device-independent quantum cryptography

Device-independent quantum protocols exist for

  • quantum key distribution
  • randomness expansion
  • randomness amplification

test test test test compute test test

untrusted device 2

test test test test compute test test

untrusted device 1

slide-33
SLIDE 33

Long-term implications

Security vs Privacy

slide-34
SLIDE 34

Thank you!