Quantum Computing and Cryptography

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
Breaking RSA Encryption Nick Manners. History of Cryptography  Used to be strictly in the domain of governments… state secrets.  Particularly important.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
QUANTUM COMPUTING By Sandeep Neeli.
Web Applications Security Cryptography 1
Basics of Cryptography
Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council.
Encryption and Integrity
J. Miranda University of Ottawa 21 November 2003
Lesson 7: Public Key Cryptography Lesson 8: Rapid Research - Cybercrime Day 37.
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Quantum Cryptography Christian Schaffner ICT OPEN 2017
Cryptography Much of computer security is about keeping secrets
Cryptography Why Cryptography Symmetric Encryption
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Public Key Encryption and Digital Signatures
Public-key Cryptography
Quantum Cryptography Quantum Computing
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Possible Impact of quantum computing
By Jeff Hinson CS691, Summer 2009
Practical Aspects of Modern Cryptography
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Quantum Cryptography Alok.T.J EC 11.
Brandin L Claar CSE 597E 5 December 2001
Quantum Cryptography Scott Roberts CSE /01/2001.
Chapter -5 PUBLIC-KEY CRYPTOGRAPHY AND RSA
Fluency with Information Technology Lawrence Snyder
Quantum Cryptography Quantum Computing
Secure Diffie-Hellman Algorithm
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Lecture 36.
Lecture 36.
Presentation transcript:

Quantum Computing and Cryptography Vishal Bilagi Kennesaw State University

Modern Day Cryptography Relies on mathematical formula to secure data Easy to create cryptographic keys, but hard to randomly guess because of the integer factorization problem Pretty good at keeping data encrypted since classical computers can take forever to guess the encryption keys What can crack such cryptographic keys easily? Quantum computers are very efficient at doing this task Kennesaw State University

Quantum Computing Impact on Modern Day Cryptography Poses a threat to asymmetric key cryptographic systems Proven theory exists that a quantum computer can factorize integers that form an encryption key In 2001, Shor’s algorithm factorized 15 = 5 x 3 and in 2012, 21 = 3 x 7 A quantum computer with sufficient qbits can actually crack RSA encryption one day. Quantum computing is not a serious threat to symmetric key cryptographic systems Grover’s algorithm offered a quadratic speed up to crack a 128-bit encryption key in 264 iterations. Since there is no basis on where to begin guessing the key, it is harder to crack symmetric encryption keys Doubling the key size should still keep the currently used symmetric key encryption pretty unbreakable Building and maintaining a Quantum computer is very expensive and there is really low chance in the given years that it poses a serious threat to cryptosystems Kennesaw State University

Post Quantum Cryptography In the coming decades, when quantum computing advancements reach new level, only then will it be a threat to existing cryptosystems In order to tackle such a case, a new way to securely store and transmit data needs to be employed A transmission medium that quantum computers can securely communicate in Such a paradigm shift is termed as Post Quantum Cryptography New algorithms that harness the power of quantum mechanics to secure data Communication medium that works well between quantum computers Kennesaw State University

Post Quantum Cryptography Approach Lattice-based Cryptography Multivariate cryptography Hash-based cryptography Code-based cryptography Supersingular elliptic curve isogeny cryptography Symmetric key quantum resistance Kennesaw State University

Quantum Key Distribution A new medium of communication needs to be established and agreed upon the quantum computers that are in it For this new network medium, keys need to be shared with the authorized parties on the network Transmitting quantum data across this medium and making some sort of handshake involves a protocol called Quantum Key Distribution (QKD) Keys are randomly generated and agreed between two parties that want to communicate with each other One major advantage of quantum key exchange is that it allows the parties to detect intruders in the system by analyzing any anomaly caused by eavesdropping – this is based on the ‘No Cloning Theorem’ Kennesaw State University

Quantum Cryptography Algorithm – BB84 In 1984, Charles Bennett and Gilles Brassard published a paper, outlining a protocol for sharing/generating random secret keys on a quantum communication network Keys are random because both the parties are unaware of what the key will be until they have a discussion after transmission and reception bits In this protocol each bit is encoded using photons. Specifically in two polarization bases – Rectilinear or Diagonal For rectilinear bases bit 0 is polarized as 0 degrees, bit 1 is polarized as 90 degrees For diagonal bases bit 0 is polarized as 45 degrees, bit 1 is polarized as 135 degrees 90, bit 1 45, bit 0 135, bit 1 0, bit 0 Kennesaw State University

BB84 – How It Works Kennesaw State University

Thank you Kennesaw State University