SlideShare ist ein Scribd-Unternehmen logo
1 von 25
QUANTUM
CRYPTOGRAPHY
Girisha Shankar
AGENDA
1.Introduction to Cryptography
2.Random numbers
3.Motivation for Quantum cryptography
4.Quantum mechanics and Quantum
Computing
5.Quantum Key distribution
6.Quantum Random Number Generation
7.Post Quantum Cryptography
ELEMENTS OF CRYPTOGRAPHY
• Plain text – the original message and Cipher text – the
disguised message.
• Key – A “number” used in encryption and decryption
algorithms.
• Encryption – using a key to change plaintext into ciphertext.
• Decryption – using a key to change cipher text back into
something readable.
• Simple example is mono-alphabetic substitution cipher method, in which
each letter in the alphabet is shifted by an integer value.
• The key is an integer value – typically very large
TWO TYPES OF CRYPTOGRAPHY
Symmetric key
cryptography
• Cryptographic algorithms use the
same keys for both encryption and
decryption.
• Keys may not be identical, but simple
transformation of each other
• E.g. Blowfish, AES, DES, 3DES
• Diffie-Helman key exchange algorithm can
be used for key distribution
Asymmetric key cryptography
• Each user has a public key and a private key.
• Information is encrypted using pubic key and
delivered
• Only intended recipient can decrypt the data
using the private key
• Exploits the fact that some mathematical
operations are easier to do in one direction.
• Based on simple number theoretic operations – modulo n arithmetic.
• a ≡ b mod N  (a – b) is divisible by N
• Modulo exponentiation, e.g. c ≡ me mod N
ASYMMETRIC KEY CRYPTOGRAPHY
• Generate a pair of large, random primes p and q.
• Compute the modulus n as n = pq.
• Select an odd public-key (e) between 3 and n-1 that is relative
prime of p-1 and q-1. I.e. 𝑒𝜖 𝐺( 𝑝 − 1)( 𝑞 − 1)
• Compute the private-key (d) from e, p and q.
• d being the multiplicative inverse of e (modulo n)
• Output (n, e) as the public key and (n, d) as the private key.
• cipher = encrypt (message) = (message)e mod n
• message = decrypt (cipher) = (cipher)d mod n
ASYMMETRIC KEY CRYPTOGRAPHY – A
SIMPLE EXAMPLE
Consider p = 5 and q = 11  n = 55
• p – 1 = 4 and q – 1 = 10
• Choose public-key e = 7 ( relative prime of 4 and 10)
• Choose private-key (d) such that 𝑑 × 𝑒 ≡ 1 𝑚𝑜𝑑[(𝑝 − 1 ×
𝑞 − 1 ]
• i.e. 7𝑑 ≡ 1𝑚𝑜𝑑40 d is 23.
• Output (55, 7) as the public key and (55, 23) as the private key.
Suppose message = 8
• cipher ≡ (message)e mod n ≡ 87 mod 55 = 2
• message ≡ (cipher)d mod n ≡ 223 mod 55 = 8
RANDOM NUMBER GENERATORS
• Desirable properties
• Unpredictability
• Backward security
• PRNG: Software based random number generators
• Rely on a good seed
• Higher throughput
• TRNG: system randomness used for generating random numbers
• Sources
• Thermal noise
• Voltage fluctuations
• Clock jitters
• Lower throughput
CRYPTOGRAPHY – BASIC PREMISE
• It is easy to generate random numbers
• Security reductions:
• Strength of crypto algorithm  known hard math problem
• Certain operations are easier to do one way, but reverse is hard
• Multiplication of two large numbers is easy, but factoring a large
number to its prime factors is hard
• Modular exponentiation is easy, but modular root extraction, is hard.
• Kerckhoffs’s principle
• Any cryptographic system can be compromised and all the
details of the system are perfectly known to everyone
• Crypto systems are open
• Strength of cryptography rests on choice and safekeep of keys
UNCONDITIONAL SECURITY
• As the methods of security have evolved, so have the
methods of attacks
• Currently available cryptographic methods are vulnerable –
at least in principle
• Security relies on making things difficult to break – not
impossible
• Not future proof from advances in technology and Mathematics
• Search for security that is provable and unconditional
• Not exploitable even in principle
QUANTUM MECHANICS
• The Heisenberg uncertainty
principle
• Measurement of a quantum
system disturbs it irrevocably
• Quantum systems are in a state
of superposition of several
possibilities
• On measurement, the value of
observable is non deterministic
• Based on QM principles
• Radically different from
classical computing
• Qubits rather than bits
• Reversible gates
• Very few algorithms:
• Shor’s algorithm
• Grover’s algorithm
Quantum
Mechanics
Quantum
Computing
IMPACT OF QM ON
CRYPTOGRAPHY
Quantum system
measurement
Detect
eavesdropping
QKD: BB-84
protocols
Non-
deterministic
nature of QM
Inherent physical
level randomness
QRNG
Quantum
Computing:
Shor's algorithm
Threat for
Asymmetric
crypto and DH
key exchange
Post quantum
cryptography
• Classical cryptography techniques can not prevent the
key transmission to be passively monitored.
• Random numbers in use do not have enough entropy
• Use of repeated keys
• Deterministic computers generate deterministic random numbers
• Unpredictability due to lack of information is not same as
randomness
WHY QUANTUM CRYPTOGRAPHY?
• Uses principles of Quantum Mechanics to guarantee secure key
exchange
• Immediate detection of eves dropping
• Security relies on the nature of physical world – unlike complex
algorithms and computational complexity
• BB–84 protocol - developed by Charles Bennett and Gilles
Brassard in 1984
QUANTUM KEY DISTRIBUTION
QUANTUM KEY DISTRIBUTION
EXAMPLE – 1/4
• Vertical Polarization 
0
• Horizontal Polarization
 1
• 45o Polarization  0
• 135o Polarization  1
QUANTUM KEY DISTRIBUTION
EXAMPLE – 2/4
• For each transmission, Alice
randomly chooses one of the
polarization basis and sends
the photon to Bob
• Sends a long string of photons
• Bob chooses a polarization
basis randomly and measures
the photon
• Captures the entire string sent
by Alice
Alice BobPhotons
• Exchange information on the basis used for
transmission and reception
• Discard the non-matching photons/bits
• Remaining bits are same for both Alice and Bob
• Alice and Bob now share a secret.
QUANTUM KEY DISTRIBUTION
EXAMPLE – 3/4Alice's random bit 1 1 0 0 1 0 0 1 0
Alice's random sending basis
Photon polarization Alice
sends
Bob's random measuring
basis
Photon polarization Bob
measures
PUBLIC DISCUSSION OF BASIS
Shared secret key 1 1 1 1 0
Alice and Bob now share a secret 11110
• Alice and Bob compare a predetermined subset of their
transmitted bit strings.
• If a third party has gained any information about the photons'
polarization, this introduces errors in Bob's measurements.
• Other environmental conditions can cause errors in a similar
fashion.
• If more than a certain threshold of bits differ they abort the
key and try again
QUANTUM KEY DISTRIBUTION
EXAMPLE – 4/4
IMPLEMENTATIONS OF QKD
• In 2007, Los Alamos National Laboratory/NIST achieved quantum key
distribution over a 148.7 km of optic fibre
• In August 2015 the longest distance for optical fiber (307 km) was
achieved by University of Geneva and Corning Inc.
• in June 2017, Chinese physicists achieved over a distance of 1203 km
between two ground stations.
• There are currently four companies offering commercial quantum key
distribution systems
• ID Quantique (Geneva),
• MagiQ Technologies, Inc. (New York),
• QuintessenceLabs (Australia)
• SeQureNet (Paris).
Source: https://en.wikipedia.org/wiki/Quantum_key_d
Stream of
1’s
Stream of
0’s
Mirro
r
Beam
splitt
er
Photo
n
sourc
e
Detecto
r
Detecto
r
QUANTUM RANDOM NUMBER
GENERATORS (QRNG)
• Makes use of quantum
phenomenon
• Inherent randomness of
quantum behavior used
• Not dependent on any
algorithm or classical physical
processes
• Practical implementations:
• Australian National University:
https://qrng.anu.edu.au
• ID Quantique
• NIST
0 1 1 0 1 0 0 1 1 0 0 1 0 1 1
SHOR’S ALGORITHM If computers that you build are quantum, Then spies
everywhere will all want ’em. Our codes will all fail,
And they’ll read our email,
Till we get crypto that’s quantum, and daunt ’em.
– Jennifer and Peter Shor
• An integer factorization algorithm
• “Given an integer N, find its prime factors”
• Designed for Quantum Computers
• Runs in polynomial time rather than exponential time
• Can be used to break keys used in asymmetric cryptography
• Practical implementations are not yet effective.
• So far, largest number factorized is 56153 (Ref: arXiv:1411.6758).
POST QUANTUM CRYPTOGRAPHY
• Latest area of research to guard against security threat of
quantum computers
• Public key algorithms are considered unsafe
• Quantum Computer safe algorithms
• Symmetric key based algorithms
• Hash based signatures
HASH BASED SIGNATURES
• Using Hashing mechanism to generate signatures
• Lamport’s method
• Uses fixed length hashing scheme
• Large key sizes: One full digest for each bit
• Good for using only one time
• Highly inefficient
•Merkle’s tree
• Uses a binary tree of hashes
• Quite efficient compared to Lamport’s method
• Used with Blockchains
LAMPORT’S ONE TIME SIGNATURE
• Consider a 8 bit string: 10110101 to be signed
• Generate 16 random numbers:
• S0
1–S0
8 and S1
1– S1
8
• Serves as private key
• Assign 0  S0
1 – S0
8 and 1  S1
1– S1
8
• Generate a hash for each number and share publicly
• H0
1-H0
8 & H1
1-H1
8 Public Key
• Send out the random number corresponding to each bit as
signature
• S1
1:S0
2:S1
3:S1
4:S0
5:S1
6:S0
7:S1
8
• Recipient can verify the signature by comparing the hashes for
each bit.
MERKLE’S TREE
Root
H1234
H12
H1
M1
H2
M2
H34
H3
M3
H4
M4
H5678
H56
H5
M5
H6
M6
H78
H7
M7
H8
M8
WHAT LIES AHEAD?
• Search for new public key crypto algorithms
• Post-Quantum Cryptography Standardization:
https://csrc.nist.gov/Projects/Post-Quantum-
Cryptography/Post-Quantum-Cryptography-Standardization
• Open Quantum Safe (OQS) project:
https://openquantumsafe.org
• Lattice based cryptography

Weitere ähnliche Inhalte

Was ist angesagt?

Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographysahilnarvekar
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographySwasat Dutta
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesisSamy Shehata
 
I mage encryption using rc5
I mage encryption using rc5I mage encryption using rc5
I mage encryption using rc5Suramrit Singh
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
Post Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersPost Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersGokul Alex
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographySamy Shehata
 

Was ist angesagt? (20)

Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
Quantum
QuantumQuantum
Quantum
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
 
I mage encryption using rc5
I mage encryption using rc5I mage encryption using rc5
I mage encryption using rc5
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
Post Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging FrontiersPost Quantum Cryptography - Emerging Frontiers
Post Quantum Cryptography - Emerging Frontiers
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 

Ähnlich wie Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodelpriyapavi96
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-finalTaymoor Nazmy
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptxssuserd5e356
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyCSNP
 
Information and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisInformation and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisVaibhav Khanna
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyMd. Shafiul Alam Sagor
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)Sam Bowne
 
CNIT 141: 3. Cryptographic Security
CNIT 141: 3. Cryptographic SecurityCNIT 141: 3. Cryptographic Security
CNIT 141: 3. Cryptographic SecuritySam Bowne
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptxAjaykumar967485
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)Sam Bowne
 

Ähnlich wie Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco (20)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Rsa
RsaRsa
Rsa
 
CRYPTOGRAPHY
CRYPTOGRAPHYCRYPTOGRAPHY
CRYPTOGRAPHY
 
CISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - CryptographyCISSP - Chapter 3 - Cryptography
CISSP - Chapter 3 - Cryptography
 
Symmetric ciphermodel
Symmetric ciphermodelSymmetric ciphermodel
Symmetric ciphermodel
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
Introduction to cryptography part1-final
Introduction to cryptography  part1-finalIntroduction to cryptography  part1-final
Introduction to cryptography part1-final
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
Information and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysisInformation and network security 11 cryptography and cryptanalysis
Information and network security 11 cryptography and cryptanalysis
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
 
CNIT 141: 3. Cryptographic Security
CNIT 141: 3. Cryptographic SecurityCNIT 141: 3. Cryptographic Security
CNIT 141: 3. Cryptographic Security
 
ch07.ppt
ch07.pptch07.ppt
ch07.ppt
 
RSA
RSARSA
RSA
 
Cryptography
Cryptography Cryptography
Cryptography
 
symmetric cipher model.pptx
symmetric cipher model.pptxsymmetric cipher model.pptx
symmetric cipher model.pptx
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
 
Ch03
Ch03Ch03
Ch03
 

Kürzlich hochgeladen

%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 

Kürzlich hochgeladen (20)

%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 

Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco

  • 2. AGENDA 1.Introduction to Cryptography 2.Random numbers 3.Motivation for Quantum cryptography 4.Quantum mechanics and Quantum Computing 5.Quantum Key distribution 6.Quantum Random Number Generation 7.Post Quantum Cryptography
  • 3. ELEMENTS OF CRYPTOGRAPHY • Plain text – the original message and Cipher text – the disguised message. • Key – A “number” used in encryption and decryption algorithms. • Encryption – using a key to change plaintext into ciphertext. • Decryption – using a key to change cipher text back into something readable. • Simple example is mono-alphabetic substitution cipher method, in which each letter in the alphabet is shifted by an integer value. • The key is an integer value – typically very large
  • 4. TWO TYPES OF CRYPTOGRAPHY Symmetric key cryptography • Cryptographic algorithms use the same keys for both encryption and decryption. • Keys may not be identical, but simple transformation of each other • E.g. Blowfish, AES, DES, 3DES • Diffie-Helman key exchange algorithm can be used for key distribution Asymmetric key cryptography • Each user has a public key and a private key. • Information is encrypted using pubic key and delivered • Only intended recipient can decrypt the data using the private key • Exploits the fact that some mathematical operations are easier to do in one direction. • Based on simple number theoretic operations – modulo n arithmetic. • a ≡ b mod N  (a – b) is divisible by N • Modulo exponentiation, e.g. c ≡ me mod N
  • 5. ASYMMETRIC KEY CRYPTOGRAPHY • Generate a pair of large, random primes p and q. • Compute the modulus n as n = pq. • Select an odd public-key (e) between 3 and n-1 that is relative prime of p-1 and q-1. I.e. 𝑒𝜖 𝐺( 𝑝 − 1)( 𝑞 − 1) • Compute the private-key (d) from e, p and q. • d being the multiplicative inverse of e (modulo n) • Output (n, e) as the public key and (n, d) as the private key. • cipher = encrypt (message) = (message)e mod n • message = decrypt (cipher) = (cipher)d mod n
  • 6. ASYMMETRIC KEY CRYPTOGRAPHY – A SIMPLE EXAMPLE Consider p = 5 and q = 11  n = 55 • p – 1 = 4 and q – 1 = 10 • Choose public-key e = 7 ( relative prime of 4 and 10) • Choose private-key (d) such that 𝑑 × 𝑒 ≡ 1 𝑚𝑜𝑑[(𝑝 − 1 × 𝑞 − 1 ] • i.e. 7𝑑 ≡ 1𝑚𝑜𝑑40 d is 23. • Output (55, 7) as the public key and (55, 23) as the private key. Suppose message = 8 • cipher ≡ (message)e mod n ≡ 87 mod 55 = 2 • message ≡ (cipher)d mod n ≡ 223 mod 55 = 8
  • 7. RANDOM NUMBER GENERATORS • Desirable properties • Unpredictability • Backward security • PRNG: Software based random number generators • Rely on a good seed • Higher throughput • TRNG: system randomness used for generating random numbers • Sources • Thermal noise • Voltage fluctuations • Clock jitters • Lower throughput
  • 8. CRYPTOGRAPHY – BASIC PREMISE • It is easy to generate random numbers • Security reductions: • Strength of crypto algorithm  known hard math problem • Certain operations are easier to do one way, but reverse is hard • Multiplication of two large numbers is easy, but factoring a large number to its prime factors is hard • Modular exponentiation is easy, but modular root extraction, is hard. • Kerckhoffs’s principle • Any cryptographic system can be compromised and all the details of the system are perfectly known to everyone • Crypto systems are open • Strength of cryptography rests on choice and safekeep of keys
  • 9. UNCONDITIONAL SECURITY • As the methods of security have evolved, so have the methods of attacks • Currently available cryptographic methods are vulnerable – at least in principle • Security relies on making things difficult to break – not impossible • Not future proof from advances in technology and Mathematics • Search for security that is provable and unconditional • Not exploitable even in principle
  • 10. QUANTUM MECHANICS • The Heisenberg uncertainty principle • Measurement of a quantum system disturbs it irrevocably • Quantum systems are in a state of superposition of several possibilities • On measurement, the value of observable is non deterministic • Based on QM principles • Radically different from classical computing • Qubits rather than bits • Reversible gates • Very few algorithms: • Shor’s algorithm • Grover’s algorithm Quantum Mechanics Quantum Computing
  • 11. IMPACT OF QM ON CRYPTOGRAPHY Quantum system measurement Detect eavesdropping QKD: BB-84 protocols Non- deterministic nature of QM Inherent physical level randomness QRNG Quantum Computing: Shor's algorithm Threat for Asymmetric crypto and DH key exchange Post quantum cryptography
  • 12. • Classical cryptography techniques can not prevent the key transmission to be passively monitored. • Random numbers in use do not have enough entropy • Use of repeated keys • Deterministic computers generate deterministic random numbers • Unpredictability due to lack of information is not same as randomness WHY QUANTUM CRYPTOGRAPHY?
  • 13. • Uses principles of Quantum Mechanics to guarantee secure key exchange • Immediate detection of eves dropping • Security relies on the nature of physical world – unlike complex algorithms and computational complexity • BB–84 protocol - developed by Charles Bennett and Gilles Brassard in 1984 QUANTUM KEY DISTRIBUTION
  • 14. QUANTUM KEY DISTRIBUTION EXAMPLE – 1/4 • Vertical Polarization  0 • Horizontal Polarization  1 • 45o Polarization  0 • 135o Polarization  1
  • 15. QUANTUM KEY DISTRIBUTION EXAMPLE – 2/4 • For each transmission, Alice randomly chooses one of the polarization basis and sends the photon to Bob • Sends a long string of photons • Bob chooses a polarization basis randomly and measures the photon • Captures the entire string sent by Alice Alice BobPhotons • Exchange information on the basis used for transmission and reception • Discard the non-matching photons/bits • Remaining bits are same for both Alice and Bob • Alice and Bob now share a secret.
  • 16. QUANTUM KEY DISTRIBUTION EXAMPLE – 3/4Alice's random bit 1 1 0 0 1 0 0 1 0 Alice's random sending basis Photon polarization Alice sends Bob's random measuring basis Photon polarization Bob measures PUBLIC DISCUSSION OF BASIS Shared secret key 1 1 1 1 0 Alice and Bob now share a secret 11110
  • 17. • Alice and Bob compare a predetermined subset of their transmitted bit strings. • If a third party has gained any information about the photons' polarization, this introduces errors in Bob's measurements. • Other environmental conditions can cause errors in a similar fashion. • If more than a certain threshold of bits differ they abort the key and try again QUANTUM KEY DISTRIBUTION EXAMPLE – 4/4
  • 18. IMPLEMENTATIONS OF QKD • In 2007, Los Alamos National Laboratory/NIST achieved quantum key distribution over a 148.7 km of optic fibre • In August 2015 the longest distance for optical fiber (307 km) was achieved by University of Geneva and Corning Inc. • in June 2017, Chinese physicists achieved over a distance of 1203 km between two ground stations. • There are currently four companies offering commercial quantum key distribution systems • ID Quantique (Geneva), • MagiQ Technologies, Inc. (New York), • QuintessenceLabs (Australia) • SeQureNet (Paris). Source: https://en.wikipedia.org/wiki/Quantum_key_d
  • 19. Stream of 1’s Stream of 0’s Mirro r Beam splitt er Photo n sourc e Detecto r Detecto r QUANTUM RANDOM NUMBER GENERATORS (QRNG) • Makes use of quantum phenomenon • Inherent randomness of quantum behavior used • Not dependent on any algorithm or classical physical processes • Practical implementations: • Australian National University: https://qrng.anu.edu.au • ID Quantique • NIST 0 1 1 0 1 0 0 1 1 0 0 1 0 1 1
  • 20. SHOR’S ALGORITHM If computers that you build are quantum, Then spies everywhere will all want ’em. Our codes will all fail, And they’ll read our email, Till we get crypto that’s quantum, and daunt ’em. – Jennifer and Peter Shor • An integer factorization algorithm • “Given an integer N, find its prime factors” • Designed for Quantum Computers • Runs in polynomial time rather than exponential time • Can be used to break keys used in asymmetric cryptography • Practical implementations are not yet effective. • So far, largest number factorized is 56153 (Ref: arXiv:1411.6758).
  • 21. POST QUANTUM CRYPTOGRAPHY • Latest area of research to guard against security threat of quantum computers • Public key algorithms are considered unsafe • Quantum Computer safe algorithms • Symmetric key based algorithms • Hash based signatures
  • 22. HASH BASED SIGNATURES • Using Hashing mechanism to generate signatures • Lamport’s method • Uses fixed length hashing scheme • Large key sizes: One full digest for each bit • Good for using only one time • Highly inefficient •Merkle’s tree • Uses a binary tree of hashes • Quite efficient compared to Lamport’s method • Used with Blockchains
  • 23. LAMPORT’S ONE TIME SIGNATURE • Consider a 8 bit string: 10110101 to be signed • Generate 16 random numbers: • S0 1–S0 8 and S1 1– S1 8 • Serves as private key • Assign 0  S0 1 – S0 8 and 1  S1 1– S1 8 • Generate a hash for each number and share publicly • H0 1-H0 8 & H1 1-H1 8 Public Key • Send out the random number corresponding to each bit as signature • S1 1:S0 2:S1 3:S1 4:S0 5:S1 6:S0 7:S1 8 • Recipient can verify the signature by comparing the hashes for each bit.
  • 25. WHAT LIES AHEAD? • Search for new public key crypto algorithms • Post-Quantum Cryptography Standardization: https://csrc.nist.gov/Projects/Post-Quantum- Cryptography/Post-Quantum-Cryptography-Standardization • Open Quantum Safe (OQS) project: https://openquantumsafe.org • Lattice based cryptography