SlideShare una empresa de Scribd logo
1 de 70
Descargar para leer sin conexión
Hacking Quantum
Cryptography
Dr. Marina von Steinkirch
~ Yelp Security
The speaker @1bt337
Ph.D. in Physics at
Worked on astro/nuclear stuff at
Now doing Security at
(We are hiring!)
Agenda
1. Quantum Mechanics in 10 mins
2. Quantum Computing in 11 mins
3. Quantum Key Exchange in 100 mins
(or more minutes)
Some disclaimers
● This is my personal views and do not
necessarily reflect views of my employer.
● This is a physicist point of view.
● For a more in-depth discussion on the privacy
issues in the post-quantum crypto paradigm,
check out Jennifer Katherine Fernick’s work.
What if we are all just a simulation?
“To simulate reality, in it lowest
level, you would need a
quantum computer” (Feynman, 1982)
What if we are all just a simulation?
“To simulate reality, in it lowest
level, you would need a
quantum computer” (Feynman, 1982)
The universe is a 13.8 billion
years-old quantum computer.
But first, let’s understand how
quantum mechanics changed the way
we see the world...
It was pretty boring in the 1800s...
"There is nothing new
to be discovered in
physics now. All that
remains is more and
more precise
measurement."
(Lord Kelvin, 1897 - before QM)
Then… the Ultraviolet Catastrophe
● Early 1800s: light as a wave
(Young’s double slit experiment, 1801)
Then… the Ultraviolet Catastrophe
● Early 1800s: light as a wave
(Young’s double slit experiment, 1801)
● Classical Thermodynamics:
<E> wavelength
(for some temperature)
Then… the Ultraviolet Catastrophe
What would happen if radiation was
emitted in infinite wavelengths?
?
Then… the Ultraviolet Catastrophe
What would happen if radiation was
emitted in infinite wavelengths?
Enter Quantum Mechanics
“What if Energy is released
on bundles instead?
Just dunno why :(”
(Max Planck, 1899)
Enter Quantum Mechanics
“What if Energy is released
on bundles instead?
Just dunno why :(”
(Max Planck, 1899)
Particle-Wave Duality
@Qu4ntumPl4nck No worries, dude!
#GotThis (Einstein, 1905)
Particle-Wave Duality
@Qu4ntumPl4nck No worries, dude!
#GotThis (Einstein, 1905)
How about the matter?
“Doh! Everything in
the quantum world is
both a particle and a
wave. #NobelMaterial”
(de Broglie, 1924)
Wavefunction
Matter is represented by a wavefunction, a
mathematical probability that represents the
quantum state of one or more particles.
Wavefunction
Squaring the amplitude gives the probability of that state
Matter is represented by a wavefunction, a
mathematical probability that represents the
quantum state of one or more particles.
Wavefunction
Matter is represented by a wavefunction, a
mathematical probability that represents the
quantum state of one or more particles.
Wavefunction
(btw, wavefunctions are solutions of
the Schrödinger Equation,
remember, from the half-dead cat?)
What if we take a peak?
Before we observe the state...
and
(dead and alive)
What if we take a peak?
Observation collapses the
probability to the observed state!
or
(dead or alive)
What if we take a peak?
Before we observe the state...
0 and 1
(dead and alive)
What if we take a peak?
After observing the state…
0 or 1
(dead or alive)
Let’s try an experiment
1. 3 Polaroid filters with horizontal, vertical
and 45° polarization
Let’s try an experiment
2. Shine light on the horizontal filter
Let’s try an experiment
2. Shine light on the horizontal filter → light
becomes horizontally polarized
Let’s try an experiment
3. Place the vertical filter after that
Let’s try an experiment
3. Place the vertical filter after that → no
light pass through it
Let’s try an experiment
4. Now place the 45° filter in between
Let’s try an experiment
4. Now place the 45° filter in between →
light starts to emerge from the vertical filter
Say waaaat?
● Think wavefunction & probabilities
Say waaaat?
● Think wavefunction & probabilities
● An arbitrary polarization can be represented by
Say waaaat?
● Think wavefunction & probabilities
● An arbitrary polarization can be represented by
● But we could change the basis:
Say waaaat?
● Think wavefunction & probabilities
● An arbitrary polarization can be represented by
● But we could change the basis:
● Probability that the photon passes through:
square of the amplitude, times 3
Enter Qubits (quantum bits)
Unit vector in a 2-dimensional
complex vector space:
Enter several quibits
● 2 qubits
Enter several qubits
● 2 qubits
● 3 qubits
http://astro.sunysb.edu/steinkirch/books/qi.pdf
Quantum mechanics give us spooky
particles that can encode (and do)
multiple things at once, just like a
massively parallel machine
Shor’s Algorithm
● PK crypto relies on a classical computer’s
difficult at factoring large numbers (RSA, EC).
Shor’s Algorithm
● PK crypto relies on a classical computer’s
difficult at factoring large numbers (RSA, EC).
● In 1994, Peter Shor showed that a QC could
find the prime factors of a large number in
milliseconds.
Shor’s Algorithm
● PK crypto relies on a classical computer’s
difficult at factoring large numbers (RSA, EC).
● In 1994, Peter Shor showed that a QC could
find the prime factors of a large number in
milliseconds.
● In the moment when a QC is successfully built,
all the internet becomes insecure
(remember: no forward secrecy!)
Shor’s Algorithm
● For a 1000-bit number, all we need is ~1000
qubits (without error correction) for maybe just a
dozen seconds
Shor’s Algorithm
● For a 1000-bit number, all we need is ~1000
qubits (without error correction) for maybe just a
dozen seconds
○ The wavefunction will encode 2**1000
possibilities (states)
Shor’s Algorithm
● For a 1000-bit number, all we need is ~1000
qubits (without error correction) for maybe just a
dozen seconds
○ The wavefunction will encode state 2**1000
possibilities
Shor’s Algorithm: How?
● Quantum Fourier Transform to find the
periodicity of prime numbers
● Algorithm runs simultaneously every pair of
number: wavefunctions either constructly or
desconstructly interfer
● In the end, the right answer spike
(frequency/period/mod)
● But… what if Alice and Bob could use QM
to create and distribute a key?
Alice & Bob are kinda scared now...
● But… what if Alice and Bob could use QM
to create and distribute a key?
● Distribute qubits through a quantum
channel to establish a key that can be
used across a classical channel.
Alice & Bob are kinda scared now...
Alice, Bob and… Heisenberg
● QC security is based on the
Heisenberg Uncertainty
principle
Alice, Bob and… Heisenberg
● QC security is based on the
Heisenberg Uncertainty
principle
○ You cannot make a perfect
copy of a quantum state
without disturbing it,
introducing errors in the
communication.
Secure by Math Physics
● Alice and Bob can exchange (quantum
encoded) keys securely (e.g. photons via
fiber).
Secure by Math Physics
● Alice and Bob can exchange (quantum
encoded) keys securely (e.g. photons via
fiber).
● If Eve reads the state of photon →
probability collapses and Bob and Alice
will know!
1. Alice prepares a sequence of photons,
polarize each one in of the four possibilities
of polarization.
Quantum Key Distribution (BB84)
1. Alice prepares a sequence of photons,
polarize each one in of the four possibilities
of polarization.
2. Bob measures these photons in the 2 basis,
and keep bits values in secret.
Quantum Key Distribution (BB84)
1. Alice prepares a sequence of photons,
polarize each one in of the four possibilities
of polarization.
2. Bob measures these photons in random
basis, and take note of the bits values.
3. Alice and Bob compare their basis but not
the bit values, discarding the wrong
measurements.
Quantum Key Distribution (BB84)
Quantum Key Distribution (BB84)
Quantum Key Distribution (BB84)
Free-space QKD over 90 miles
Canary
Islands:
single
photons
prepared in
La Palma
and sent to
Tenerife
All this is super cool... But how long is
going to take for the first quantum
computer?
Challenges in building a QC
● QCs must maintain hundreds of qubits
together for some amount of time
Challenges in building a QC
● QCs must maintain hundreds of qubits
together for some amount of time
○ Decoherence: The universe is
observing all the time!
○ Particles are absorbed by the room
and vanished!
But progress is happening
Just 2-state quantum systems...
● Superconductor-based quantum computers
(SQUIDs)
● Trapped ion quantum computer
● Optical lattices
● Topological quantum computer
● Quantum dot on surface (e.g. Loss-
DiVincenzo)
● Nuclear magnetic resonance
● Cavity quantum electrodynamics (CQED)
● ...
Progress is happening
Progress is happening
Snowden: NSA seeks to build quantum
computer with a $79.7 million research
program (jan/2014)
For good or for bad
Final Remarks
● There are lots more:
○ quantum algorithms (Grover, Simons), quantum
gates/circuits, topological quantum computing,
Deutsch parallelism, entanglement, quantum
teleportation...
Final Remarks
● There are lots more:
○ quantum algorithms (Grover, Simons), quantum
gates/circuits, topological quantum computing,
Deutsch parallelism, Entanglement, quantum
teleportation...
● This is a background, now you decide.
It’s a brave new world...
Thank you.

Más contenido relacionado

La actualidad más candente

Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographySwasat Dutta
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyShyam Mohan
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum CryptographyAndrew Manoske
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoVishnu Pendyala
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum AbbasiIEEEP Karachi
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 

La actualidad más candente (20)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 

Destacado

Quantum Information
Quantum Information Quantum Information
Quantum Information Dario Scotto
 
Mehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics DilemmasMehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics Dilemmasknowdiff
 
Time & Quantum Mechanics
Time & Quantum MechanicsTime & Quantum Mechanics
Time & Quantum MechanicsJohn Ashmead
 
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...Vasil Penchev
 
Mathematical Formulation of Quantum Mechanics
Mathematical Formulation of Quantum Mechanics Mathematical Formulation of Quantum Mechanics
Mathematical Formulation of Quantum Mechanics rbmaitri123
 
Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...wtyru1989
 
Atoms, quanta,and qubits: Atomism in quantum mechanics and information
Atoms, quanta,and qubits: Atomism in quantum mechanics and informationAtoms, quanta,and qubits: Atomism in quantum mechanics and information
Atoms, quanta,and qubits: Atomism in quantum mechanics and informationVasil Penchev
 
Quantum Implications 07262011
Quantum Implications 07262011Quantum Implications 07262011
Quantum Implications 07262011Gary Stilwell
 
Charge Quantization and Magnetic Monopoles
Charge Quantization and Magnetic MonopolesCharge Quantization and Magnetic Monopoles
Charge Quantization and Magnetic MonopolesArpan Saha
 
Magnetic monopoles and group theory.
Magnetic monopoles and group theory.Magnetic monopoles and group theory.
Magnetic monopoles and group theory.Renata Queiroz
 
Dark matter &amp; dark energy
Dark matter &amp; dark energyDark matter &amp; dark energy
Dark matter &amp; dark energysurat murthy
 
Quantum Nanomagnetism
Quantum  NanomagnetismQuantum  Nanomagnetism
Quantum Nanomagnetismoriolespinal
 
Quantum Numbers
Quantum NumbersQuantum Numbers
Quantum Numbersyasjoy
 
Time travel (journey beyond time)
Time travel (journey beyond time)Time travel (journey beyond time)
Time travel (journey beyond time)Indrabhaskar Mishra
 
120519 ITS: Copenhagen interpretation in quantum mechanics
120519 ITS: Copenhagen interpretation in quantum mechanics120519 ITS: Copenhagen interpretation in quantum mechanics
120519 ITS: Copenhagen interpretation in quantum mechanicsHyunjung Kim
 
Tree of quantum_mechanics2
Tree of quantum_mechanics2Tree of quantum_mechanics2
Tree of quantum_mechanics2thambaji
 

Destacado (20)

Quantum Information
Quantum Information Quantum Information
Quantum Information
 
Mehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics DilemmasMehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics Dilemmas
 
Time & Quantum Mechanics
Time & Quantum MechanicsTime & Quantum Mechanics
Time & Quantum Mechanics
 
Faster Than Light
Faster Than LightFaster Than Light
Faster Than Light
 
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...
“No hidden variables!”: From Neumann’s to Kochen and Specker’s theorem in qua...
 
Quantum Logic
Quantum LogicQuantum Logic
Quantum Logic
 
Mathematical Formulation of Quantum Mechanics
Mathematical Formulation of Quantum Mechanics Mathematical Formulation of Quantum Mechanics
Mathematical Formulation of Quantum Mechanics
 
Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...
 
Atoms, quanta,and qubits: Atomism in quantum mechanics and information
Atoms, quanta,and qubits: Atomism in quantum mechanics and informationAtoms, quanta,and qubits: Atomism in quantum mechanics and information
Atoms, quanta,and qubits: Atomism in quantum mechanics and information
 
Thesis defence
Thesis defenceThesis defence
Thesis defence
 
Quantum Implications 07262011
Quantum Implications 07262011Quantum Implications 07262011
Quantum Implications 07262011
 
Charge Quantization and Magnetic Monopoles
Charge Quantization and Magnetic MonopolesCharge Quantization and Magnetic Monopoles
Charge Quantization and Magnetic Monopoles
 
Magnetic monopoles and group theory.
Magnetic monopoles and group theory.Magnetic monopoles and group theory.
Magnetic monopoles and group theory.
 
Dark matter &amp; dark energy
Dark matter &amp; dark energyDark matter &amp; dark energy
Dark matter &amp; dark energy
 
Quantum Nanomagnetism
Quantum  NanomagnetismQuantum  Nanomagnetism
Quantum Nanomagnetism
 
Quantum Numbers
Quantum NumbersQuantum Numbers
Quantum Numbers
 
EPR paradox
EPR paradoxEPR paradox
EPR paradox
 
Time travel (journey beyond time)
Time travel (journey beyond time)Time travel (journey beyond time)
Time travel (journey beyond time)
 
120519 ITS: Copenhagen interpretation in quantum mechanics
120519 ITS: Copenhagen interpretation in quantum mechanics120519 ITS: Copenhagen interpretation in quantum mechanics
120519 ITS: Copenhagen interpretation in quantum mechanics
 
Tree of quantum_mechanics2
Tree of quantum_mechanics2Tree of quantum_mechanics2
Tree of quantum_mechanics2
 

Similar a Hacking Quantum Cryptography

Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiProfessor Lili Saghafi
 
What is quantum computing?
What is quantum computing?What is quantum computing?
What is quantum computing?Alex Philipose
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?Mike Hogarth, MD, FACMI, FACP
 
What Every Dog Should Know About Quantum Physics
What Every Dog Should Know About Quantum PhysicsWhat Every Dog Should Know About Quantum Physics
What Every Dog Should Know About Quantum PhysicsChad Orzel
 
A brief presentation on qunatum computing system &amp; the material science r...
A brief presentation on qunatum computing system &amp; the material science r...A brief presentation on qunatum computing system &amp; the material science r...
A brief presentation on qunatum computing system &amp; the material science r...Sakibul Islam Sazzad
 
What Every Dog Should Know About Quantum Physics
What Every Dog Should Know About Quantum PhysicsWhat Every Dog Should Know About Quantum Physics
What Every Dog Should Know About Quantum PhysicsChad Orzel
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1Bruno Fedrici, PhD
 
Prof Jonathan Sievers (UKZN) NITheP Associate Workshop talk
Prof Jonathan Sievers (UKZN) NITheP Associate Workshop talk Prof Jonathan Sievers (UKZN) NITheP Associate Workshop talk
Prof Jonathan Sievers (UKZN) NITheP Associate Workshop talk Rene Kotze
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminarPankaj Kumar
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?Stefano Franco
 

Similar a Hacking Quantum Cryptography (20)

Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
What is quantum computing?
What is quantum computing?What is quantum computing?
What is quantum computing?
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
What Every Dog Should Know About Quantum Physics
What Every Dog Should Know About Quantum PhysicsWhat Every Dog Should Know About Quantum Physics
What Every Dog Should Know About Quantum Physics
 
A brief presentation on qunatum computing system &amp; the material science r...
A brief presentation on qunatum computing system &amp; the material science r...A brief presentation on qunatum computing system &amp; the material science r...
A brief presentation on qunatum computing system &amp; the material science r...
 
Fire.cit
Fire.citFire.cit
Fire.cit
 
What Every Dog Should Know About Quantum Physics
What Every Dog Should Know About Quantum PhysicsWhat Every Dog Should Know About Quantum Physics
What Every Dog Should Know About Quantum Physics
 
Ieee lecture
Ieee lectureIeee lecture
Ieee lecture
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
CA_final_paper
CA_final_paperCA_final_paper
CA_final_paper
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1
 
Prof Jonathan Sievers (UKZN) NITheP Associate Workshop talk
Prof Jonathan Sievers (UKZN) NITheP Associate Workshop talk Prof Jonathan Sievers (UKZN) NITheP Associate Workshop talk
Prof Jonathan Sievers (UKZN) NITheP Associate Workshop talk
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
 

Último

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Último (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

Hacking Quantum Cryptography

  • 1. Hacking Quantum Cryptography Dr. Marina von Steinkirch ~ Yelp Security
  • 2. The speaker @1bt337 Ph.D. in Physics at Worked on astro/nuclear stuff at Now doing Security at (We are hiring!)
  • 3. Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes)
  • 4. Some disclaimers ● This is my personal views and do not necessarily reflect views of my employer. ● This is a physicist point of view. ● For a more in-depth discussion on the privacy issues in the post-quantum crypto paradigm, check out Jennifer Katherine Fernick’s work.
  • 5. What if we are all just a simulation? “To simulate reality, in it lowest level, you would need a quantum computer” (Feynman, 1982)
  • 6. What if we are all just a simulation? “To simulate reality, in it lowest level, you would need a quantum computer” (Feynman, 1982) The universe is a 13.8 billion years-old quantum computer.
  • 7. But first, let’s understand how quantum mechanics changed the way we see the world...
  • 8. It was pretty boring in the 1800s... "There is nothing new to be discovered in physics now. All that remains is more and more precise measurement." (Lord Kelvin, 1897 - before QM)
  • 9. Then… the Ultraviolet Catastrophe ● Early 1800s: light as a wave (Young’s double slit experiment, 1801)
  • 10. Then… the Ultraviolet Catastrophe ● Early 1800s: light as a wave (Young’s double slit experiment, 1801) ● Classical Thermodynamics: <E> wavelength (for some temperature)
  • 11. Then… the Ultraviolet Catastrophe What would happen if radiation was emitted in infinite wavelengths? ?
  • 12. Then… the Ultraviolet Catastrophe What would happen if radiation was emitted in infinite wavelengths?
  • 13. Enter Quantum Mechanics “What if Energy is released on bundles instead? Just dunno why :(” (Max Planck, 1899)
  • 14. Enter Quantum Mechanics “What if Energy is released on bundles instead? Just dunno why :(” (Max Planck, 1899)
  • 15. Particle-Wave Duality @Qu4ntumPl4nck No worries, dude! #GotThis (Einstein, 1905)
  • 16. Particle-Wave Duality @Qu4ntumPl4nck No worries, dude! #GotThis (Einstein, 1905)
  • 17. How about the matter? “Doh! Everything in the quantum world is both a particle and a wave. #NobelMaterial” (de Broglie, 1924)
  • 18. Wavefunction Matter is represented by a wavefunction, a mathematical probability that represents the quantum state of one or more particles.
  • 19. Wavefunction Squaring the amplitude gives the probability of that state Matter is represented by a wavefunction, a mathematical probability that represents the quantum state of one or more particles.
  • 20. Wavefunction Matter is represented by a wavefunction, a mathematical probability that represents the quantum state of one or more particles.
  • 21. Wavefunction (btw, wavefunctions are solutions of the Schrödinger Equation, remember, from the half-dead cat?)
  • 22. What if we take a peak? Before we observe the state... and (dead and alive)
  • 23. What if we take a peak? Observation collapses the probability to the observed state! or (dead or alive)
  • 24. What if we take a peak? Before we observe the state... 0 and 1 (dead and alive)
  • 25. What if we take a peak? After observing the state… 0 or 1 (dead or alive)
  • 26. Let’s try an experiment 1. 3 Polaroid filters with horizontal, vertical and 45° polarization
  • 27. Let’s try an experiment 2. Shine light on the horizontal filter
  • 28. Let’s try an experiment 2. Shine light on the horizontal filter → light becomes horizontally polarized
  • 29. Let’s try an experiment 3. Place the vertical filter after that
  • 30. Let’s try an experiment 3. Place the vertical filter after that → no light pass through it
  • 31. Let’s try an experiment 4. Now place the 45° filter in between
  • 32. Let’s try an experiment 4. Now place the 45° filter in between → light starts to emerge from the vertical filter
  • 33. Say waaaat? ● Think wavefunction & probabilities
  • 34. Say waaaat? ● Think wavefunction & probabilities ● An arbitrary polarization can be represented by
  • 35. Say waaaat? ● Think wavefunction & probabilities ● An arbitrary polarization can be represented by ● But we could change the basis:
  • 36. Say waaaat? ● Think wavefunction & probabilities ● An arbitrary polarization can be represented by ● But we could change the basis: ● Probability that the photon passes through: square of the amplitude, times 3
  • 37. Enter Qubits (quantum bits) Unit vector in a 2-dimensional complex vector space:
  • 39. Enter several qubits ● 2 qubits ● 3 qubits http://astro.sunysb.edu/steinkirch/books/qi.pdf
  • 40. Quantum mechanics give us spooky particles that can encode (and do) multiple things at once, just like a massively parallel machine
  • 41. Shor’s Algorithm ● PK crypto relies on a classical computer’s difficult at factoring large numbers (RSA, EC).
  • 42. Shor’s Algorithm ● PK crypto relies on a classical computer’s difficult at factoring large numbers (RSA, EC). ● In 1994, Peter Shor showed that a QC could find the prime factors of a large number in milliseconds.
  • 43. Shor’s Algorithm ● PK crypto relies on a classical computer’s difficult at factoring large numbers (RSA, EC). ● In 1994, Peter Shor showed that a QC could find the prime factors of a large number in milliseconds. ● In the moment when a QC is successfully built, all the internet becomes insecure (remember: no forward secrecy!)
  • 44. Shor’s Algorithm ● For a 1000-bit number, all we need is ~1000 qubits (without error correction) for maybe just a dozen seconds
  • 45. Shor’s Algorithm ● For a 1000-bit number, all we need is ~1000 qubits (without error correction) for maybe just a dozen seconds ○ The wavefunction will encode 2**1000 possibilities (states)
  • 46. Shor’s Algorithm ● For a 1000-bit number, all we need is ~1000 qubits (without error correction) for maybe just a dozen seconds ○ The wavefunction will encode state 2**1000 possibilities
  • 47. Shor’s Algorithm: How? ● Quantum Fourier Transform to find the periodicity of prime numbers ● Algorithm runs simultaneously every pair of number: wavefunctions either constructly or desconstructly interfer ● In the end, the right answer spike (frequency/period/mod)
  • 48. ● But… what if Alice and Bob could use QM to create and distribute a key? Alice & Bob are kinda scared now...
  • 49. ● But… what if Alice and Bob could use QM to create and distribute a key? ● Distribute qubits through a quantum channel to establish a key that can be used across a classical channel. Alice & Bob are kinda scared now...
  • 50. Alice, Bob and… Heisenberg ● QC security is based on the Heisenberg Uncertainty principle
  • 51. Alice, Bob and… Heisenberg ● QC security is based on the Heisenberg Uncertainty principle ○ You cannot make a perfect copy of a quantum state without disturbing it, introducing errors in the communication.
  • 52. Secure by Math Physics ● Alice and Bob can exchange (quantum encoded) keys securely (e.g. photons via fiber).
  • 53. Secure by Math Physics ● Alice and Bob can exchange (quantum encoded) keys securely (e.g. photons via fiber). ● If Eve reads the state of photon → probability collapses and Bob and Alice will know!
  • 54. 1. Alice prepares a sequence of photons, polarize each one in of the four possibilities of polarization. Quantum Key Distribution (BB84)
  • 55. 1. Alice prepares a sequence of photons, polarize each one in of the four possibilities of polarization. 2. Bob measures these photons in the 2 basis, and keep bits values in secret. Quantum Key Distribution (BB84)
  • 56. 1. Alice prepares a sequence of photons, polarize each one in of the four possibilities of polarization. 2. Bob measures these photons in random basis, and take note of the bits values. 3. Alice and Bob compare their basis but not the bit values, discarding the wrong measurements. Quantum Key Distribution (BB84)
  • 59. Free-space QKD over 90 miles Canary Islands: single photons prepared in La Palma and sent to Tenerife
  • 60. All this is super cool... But how long is going to take for the first quantum computer?
  • 61. Challenges in building a QC ● QCs must maintain hundreds of qubits together for some amount of time
  • 62. Challenges in building a QC ● QCs must maintain hundreds of qubits together for some amount of time ○ Decoherence: The universe is observing all the time! ○ Particles are absorbed by the room and vanished!
  • 63. But progress is happening
  • 64. Just 2-state quantum systems... ● Superconductor-based quantum computers (SQUIDs) ● Trapped ion quantum computer ● Optical lattices ● Topological quantum computer ● Quantum dot on surface (e.g. Loss- DiVincenzo) ● Nuclear magnetic resonance ● Cavity quantum electrodynamics (CQED) ● ...
  • 67. Snowden: NSA seeks to build quantum computer with a $79.7 million research program (jan/2014) For good or for bad
  • 68. Final Remarks ● There are lots more: ○ quantum algorithms (Grover, Simons), quantum gates/circuits, topological quantum computing, Deutsch parallelism, entanglement, quantum teleportation...
  • 69. Final Remarks ● There are lots more: ○ quantum algorithms (Grover, Simons), quantum gates/circuits, topological quantum computing, Deutsch parallelism, Entanglement, quantum teleportation... ● This is a background, now you decide.
  • 70. It’s a brave new world... Thank you.