Top Banner
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Quantum computers attack Branislav Majerník @oracle.com 18.5.2015 Oracle Security day Bratislava
34

Quantum computers attack

Apr 15, 2017

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Quantum computers attack

Branislav Majerní[email protected]

18.5.2015 Oracle Security day Bratislava

Page 2: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

TopicsCryptography today

Introduction to Quantum computing today

Post quantum cryptography

Q & A

1

2

3

4

Page 3: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Cryptography todayRSA, ElGamal, Elliptic curves systems, Lattice systems

Page 4: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Based on hard to compute problems(polynomial vs. exponential)

(N-1)!/2O(n) O(2n)

Search telephone number in DB

Traveling salesman problem

Page 5: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Hard to compute (polynomial vs. exponential)

n (amount of data)

Number of

Operations

O(2n)

O(1)

O(n log n)

O(log n)

O(n2)

O(n)

Page 6: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Hard to compute (sub)exponential IFP problem

Page 7: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Hard to compute (sub)exponential DLP problem

Page 8: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Is IFP and DLP same?

Given a group G, a subgroup H ≤ G, and a set X, we say a function f : G → X hides the subgroup H if for all g1, g2 G, f(g1) = f(g2) if and only if g1H = g2H for the cosets of H. Equivalently, the function f is constant on the ∈cosets of H, while it is different between the different cosets of H.Hidden subgroup problem: Let G be a group, X a finite set, and f : G → X a function that hides a subgroup H ≤ G. The function f is given via an oracle, which uses O(log |G|+log|X|) bits. Using information gained from evaluations of f via its oracle, determine a generating set for H.A special case is when X is a group and f is a group homomorphism in which case H corresponds to the kernel of f.

Both problems are special cases of the hidden subgroup problem over an abelian group.

http://www.eecs.berkeley.edu/Pubs/TechRpts/1984/CSD-84-186.pdf

Eric Bach: Discrete logarithms and factoring

Page 9: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

ECDLP ? Hard to compute exponential

Public key, ABPrivate key, abA=aPB=bP

Message from B2AM= aB = abP = bA = baP

DL

Page 10: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

http://www.design-reuse.com/articles/7409/ecc-holds-key-to-next-gen-cryptography.html

Underlying mathematical problem & run times of public-key systems

Page 11: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

http://www.design-reuse.com/articles/7409/ecc-holds-key-to-next-gen-cryptography.html

Public-key sizes with equivalent security levels

Page 12: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Why Oracle ? :)

http://theory.stanford.edu/~dfreeman/cs259c-f11/finalpapers/CDHandDLP.pdf

Page 13: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle cryptographics engine ECDH (SunEC)

Page 14: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Introduction to QC today

Page 15: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Future of computers (physical limits)

Page 16: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

0,1 nm a0 is size of atom, QM rules

-

Exponential problems become polynomial

Page 17: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Quantum computing

Page 18: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Realization of Qubit – single electron transistor

University of New South Wales (UNSW)

Page 19: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Realization of Qubit – photon with semiconductor quantum dots

Joint Quantum Institute

Page 20: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Realization of Qubit - superconducting

IFN-CNR, Rome

Page 21: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Realization of Qubit – superconducting, quantum annealing???

http://www.wired.com/2013/06/d-wave-quantum-computer-usc/

Page 22: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Realization of Qubits – problems: decoherence, noise errors

Page 23: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Realization of Qubits – Topological QC

Page 24: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Realization of Qubits – Topological QC

Page 25: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Possible representations of Qubits – summary

Page 26: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Abelian hidden subgroup problem ( IFP, DLP...) solution

1. Transform problem to problem find a period of function – can be done on classical computer

Shor's algorithm

Page 27: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Abelian hidden subgroup problem ( IFP, DLP...) solution

2. Find period with quantum Fourier transformation - can be done on quantum computer

Shor's algorithm

Page 28: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Information set discovery problem (database search, inversion function, McEliece cryptography) solution

Via iteration find the eigenvalues = 1 for projection s to ω, f(ω) = 1

http://cr.yp.to/codes/grovercode-20091123.pdf

Grover's algorithm

Page 29: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Quantum cryptography

Page 30: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Secure distribution of secret key BB84 protocol

Page 31: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Private amplification

Page 32: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Secure distribution of secret key E91 protocol

Page 33: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Post scriptum

Page 34: Quantum computers attack

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Q & A