SlideShare a Scribd company logo
1 of 56
Download to read offline
CNIT 141
Cryptography for Computer Networks
14. Quantum and Post-Quantum
Topics
• How Quantum Computers Work
• Quantum Speed-Up
• Whi Is It So Hard tp Build a Quantum
Computer?
• Post-Quantum Cryptographic Algorithms
• How Things Can Go Wrong
How Quantum Computers
Work
Digital Computing

Logic Gates
NOT
AND
XOR
• From Wikibooks (link Ch 14a)
Digital Adder
• From geeksforgeeks.com (link Ch 14b)
Analog to Digital
• Real devices are

analog
• Digital circuits 

minimize time 

spent in the 

"forbidden zone"
• Error correction is needed
• From Wikipedia (link Ch 14c)
Analog Computing
• The Antikythera
mechanism,
dating between
150 and 100 BC,
was an early
analog computer.
• From Wikipedia
(link Ch 14d)
Slide Rule
• How many bits does it process?
Flute
• Input: white noise
• Output: clear note
• Analog Fourier transform
• How many bits does it process?
Qubit

Bloch Sphere
• Certain states 

|0> and |1> 

are at the top and
bottom
• Uncertain or
superposition states
are in between
• Collapses to 1 or 0
when measured
Range of States
• Digital computing
• One byte has 8 bits of information
• 256 possible states
• 8 qubits
• Qubit might have any possible value
• 256 complex numbers required to specify
state
Range of States
• Digital computing
• n bits contains n bits of information
• n qubits
• Contain 2n complex floating-point values
Quantum Algorithm
Measurement
180° rotation about X axis: Bit-flip
Hadamard gate
180° rotation about X-Z axis: Bit-flip
Converts a certain state to a superposition
state
Quantum
Gates
Quantum Speed-Up
Searching a List
• Searching an unordered list of n items
• Classical computer
• n/2 operations
• Quantum computer:
• sqrt(n) operations
• Using Grover's algorithm
Simon's Problem
• Similar to hash collisions
• Given a function f()
• Find m such that
• For all x, y satisfying f(x) = f(y)
• Then
Simon's Problem
• Classical computer
• Takes 2n/2 operations
• Quantum computer
• Takes n operations

Shor's Algorithm
• Factors numbers into prime factors
• Solves Discrete Logarithm Problem (DLP)
• And the Elliptic Curve DLP
• Breaks RSA, Diffie-Hellman, ECC
• And all currently deployed public-key
algorithms
Shor's Algorithm
• 7 x 13 mod 15
• Link Ch 14e
Breaking AES
• Brute-force search
• Try all 2128 possible keys
• Classical: requires 2128/2 calculations
• Grover's algorithm
• Quantum: requires 264 calculations
Grover's Algorithm
• Can break symmetric encryption and reverse
hashes
• Requires 2n/2 calculations
Double Key Length
• Even with a quantum computer, breaking
AES-256 or SHA-256
• Requires 2128 calculations
Why Is It So Hard to Build
a Quantum Computer?
Noise
• Google and IBM form Qubits are formed from
superconducting circuits
• Must be cooled to extremely low
temperatures
• Only stable for a few milliseconds
• Another method uses ion traps
Post-Quantum
Cryptographic Algorithms
A Different Hard Problem
• Can't be based on the Discrete Logarithm
Problem
• Four types
• Code-Based
• Lattice-Based
• Multivariate
• Hash-Based
Code-Based
• Based on error-correcting codes
• First one: McEliece developed in 1978
• Still unbroken
• Can be used for encryption and signatures
• Public key is 100 KB in size
Error-Correcting Code
• You want to send a three-bit message 010
• Over a noisy channel
• One method: send every bit three times
• 000111000
• If a single bit is wrong, the other two will
outvote it
• But if two errors occur the system fails
Linear Codes
• Word contains n bits
• Treat it as a vector v
• Multiply the word by a matrix G
• To form code word w = vG
• Can correct multi-bit errors
McEleice Encryption
• G is a secret combination of three matrices
• G = ABC
• Encryption is w = vG + e
• e is a random error bit
• G is the pubic key
• A B C are the private keys
McEleice Encryption
• Relies on the hardness of decoding a linear
code with insufficient information
• Known to be NP-complete
• Beyond the reach of quantum computers
Lattice-Based
• A Lattice is a set of points with a periodic
structure
Closest Vector Problem
(CVP)
• Problem: Combine basis vectors to find the
lattice point closest to a point
Short Integer Solution
(SIS)
• A is a random matrix
• q is a prime number
• b is a vector
• Problem: Given A and b
• Find a secret vector s such that
b = As mod q
Learning With Errors
(LWE)
• Problem: Given A and b
• Find a secret vector s such that
b = As + e mod q
• e is a random vector of noise
Lattice-Based
Cryptography
• These three problems are somewhat
equivalent
• Believed to be hard for both classical and
quantum computers
• But perhaps only in the hardest cases
• And finding approximate solutions might be
easier
Multivariate
• Four unknowns, and four random quadratic
equations
• Solving this may be a hard problem
Multivariate Limitations
• Actual hardness depends on the parameters
• Number of equations
• Size and type of numbers
• Choosing secure parameters is hard
• More than one multivariate scheme has
been broken
Multivariate Limitations
• Not used in major apps
• Concerns about security
• Often slow or requires tons of memory
• Benefit: produces short signatures
Hash-Based
• Based on difficulty of finding hash collisions
• Quantum computers cannot break hash
functions
• Hash-based cryptographic schemes are
complex
Winternitz One-Time
Signature (WOTS)
• Private key can be used only once
• To sign one message
• Message M is a number from 0 to w - 1
• w is a parameter of the scheme
• K is the private key
• Signature is formed by hashing K with M rounds
Hash(Hash(Hash( ... Hash(K) ... ))
• Public key is formed by hashing K with w rounds
WOTS Limitations
• Signatures can be forged
• Hash the signature of M to create the
signature of M + 1
WOTS Limitations
• Only works for short messages
• If message has 8 bits, you must calculate
• 28 - 1 = 255 rounds of hashing
• If message has 128 bits
• 2128 - 1 rounds of hashing
• Must break long messages into several
smaller ones
WOTS Limitations
• Only works once
• If a private key is used twice
• Attacker can combine those signatures to
forge other messages
• There is no simple way to fix this problem
Hash-Based Schemes
• State-of-the-art schemes use more complex
versions of WOTS
• With tree data structures
• And sophisticated techniques to sign
different messages with different keys
• SPHINCS is a state-of-the-art scheme
• Signatures are dozens of KB long
How Things Can Go
Wrong
Unclear Security Level
• Security proofs are often asymptotic
• Only true for large values of parameters
• Such as the dimension of the lattice
• In practice, smaller values are used
• Difficult to quantify the level of security
• Attacks on new schemes, like lattices, are not
well understood
Too Late?
• Post-quantum encryption is more important
than post-quantum signatures
• Signatures can be revoked & replaced
• Old encrypted data can be archived and
broken years later
• In practice, Diffie-Hellman often uses more
than the shared secret to form the session key
• Safer against quantum computers
Implementation Issues
• Some post-quantum encryption
implementations have been optimized for
speed
• And are vulnerable to timing attacks
• Post-quantum algorithms will be less secure
than older algorithms at first
CNIT 141: 14. Quantum and Post-Quantum

More Related Content

What's hot

CNIT 141 6. Hash Functions
CNIT 141 6. Hash FunctionsCNIT 141 6. Hash Functions
CNIT 141 6. Hash FunctionsSam Bowne
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersSam Bowne
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersSam Bowne
 
CNIT 141: 10. RSA
CNIT 141: 10. RSACNIT 141: 10. RSA
CNIT 141: 10. RSASam Bowne
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
CNIT 126: 13: Data Encoding
CNIT 126: 13: Data EncodingCNIT 126: 13: Data Encoding
CNIT 126: 13: Data EncodingSam Bowne
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
CNIT 1417. Keyed Hashing
CNIT 1417. Keyed HashingCNIT 1417. Keyed Hashing
CNIT 1417. Keyed HashingSam Bowne
 
CNIT 141 10. RSA
CNIT 141 10. RSACNIT 141 10. RSA
CNIT 141 10. RSASam Bowne
 
CNIT 141 8. Authenticated Encryption
CNIT 141 8. Authenticated EncryptionCNIT 141 8. Authenticated Encryption
CNIT 141 8. Authenticated EncryptionSam Bowne
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsSam Bowne
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersSam Bowne
 
CNIT 141: 10. RSA
CNIT 141: 10. RSACNIT 141: 10. RSA
CNIT 141: 10. RSASam Bowne
 
CNIT 141: 3. Cryptographic Security
CNIT 141: 3. Cryptographic SecurityCNIT 141: 3. Cryptographic Security
CNIT 141: 3. Cryptographic SecuritySam Bowne
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLSSam Bowne
 
CNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersCNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersSam Bowne
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2Hamed Moghaddam
 
CNIT 141 7. Keyed Hashing
CNIT 141 7. Keyed HashingCNIT 141 7. Keyed Hashing
CNIT 141 7. Keyed HashingSam Bowne
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 

What's hot (20)

CNIT 141 6. Hash Functions
CNIT 141 6. Hash FunctionsCNIT 141 6. Hash Functions
CNIT 141 6. Hash Functions
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
CNIT 141: 10. RSA
CNIT 141: 10. RSACNIT 141: 10. RSA
CNIT 141: 10. RSA
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
CNIT 126: 13: Data Encoding
CNIT 126: 13: Data EncodingCNIT 126: 13: Data Encoding
CNIT 126: 13: Data Encoding
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
CNIT 1417. Keyed Hashing
CNIT 1417. Keyed HashingCNIT 1417. Keyed Hashing
CNIT 1417. Keyed Hashing
 
CNIT 141 10. RSA
CNIT 141 10. RSACNIT 141 10. RSA
CNIT 141 10. RSA
 
CNIT 141 8. Authenticated Encryption
CNIT 141 8. Authenticated EncryptionCNIT 141 8. Authenticated Encryption
CNIT 141 8. Authenticated Encryption
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
CNIT 141: 10. RSA
CNIT 141: 10. RSACNIT 141: 10. RSA
CNIT 141: 10. RSA
 
CNIT 141: 3. Cryptographic Security
CNIT 141: 3. Cryptographic SecurityCNIT 141: 3. Cryptographic Security
CNIT 141: 3. Cryptographic Security
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
CNIT 141 5. Stream Ciphers
CNIT 141 5. Stream CiphersCNIT 141 5. Stream Ciphers
CNIT 141 5. Stream Ciphers
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
CNIT 141 7. Keyed Hashing
CNIT 141 7. Keyed HashingCNIT 141 7. Keyed Hashing
CNIT 141 7. Keyed Hashing
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 

Similar to CNIT 141: 14. Quantum and Post-Quantum

Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyCSNP
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsSam Bowne
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersSam Bowne
 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: CryptographySam Bowne
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: CryptographySam Bowne
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)Sam Bowne
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers Sam Bowne
 
Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014Cloudflare
 
ITFT_Data Link Layer issues
ITFT_Data Link Layer  issuesITFT_Data Link Layer  issues
ITFT_Data Link Layer issuesSneh Prabha
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)Sam Bowne
 
Blockchain Technology Introduction and Basics
Blockchain Technology  Introduction and BasicsBlockchain Technology  Introduction and Basics
Blockchain Technology Introduction and Basicsjayasris2023
 
Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013Cloudflare
 
You always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloudYou always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloudEric Cattoir
 

Similar to CNIT 141: 14. Quantum and Post-Quantum (20)

Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
Ch 12: Cryptography
Ch 12: CryptographyCh 12: Cryptography
Ch 12: Cryptography
 
CNIT 123 12: Cryptography
CNIT 123 12: CryptographyCNIT 123 12: Cryptography
CNIT 123 12: Cryptography
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers
 
Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014Sullivan randomness-infiltrate 2014
Sullivan randomness-infiltrate 2014
 
Voldemort Nosql
Voldemort NosqlVoldemort Nosql
Voldemort Nosql
 
ITFT_Data Link Layer issues
ITFT_Data Link Layer  issuesITFT_Data Link Layer  issues
ITFT_Data Link Layer issues
 
CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)CISSP Prep: Ch 4. Security Engineering (Part 2)
CISSP Prep: Ch 4. Security Engineering (Part 2)
 
Blockchain Technology Introduction and Basics
Blockchain Technology  Introduction and BasicsBlockchain Technology  Introduction and Basics
Blockchain Technology Introduction and Basics
 
Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Modern Cryptography
Modern CryptographyModern Cryptography
Modern Cryptography
 
Cryptography-101
Cryptography-101Cryptography-101
Cryptography-101
 
Cryptography - 101
Cryptography - 101Cryptography - 101
Cryptography - 101
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
You always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloudYou always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloud
 

More from Sam Bowne

3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Recently uploaded

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 

Recently uploaded (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

CNIT 141: 14. Quantum and Post-Quantum

  • 1. CNIT 141 Cryptography for Computer Networks 14. Quantum and Post-Quantum
  • 2. Topics • How Quantum Computers Work • Quantum Speed-Up • Whi Is It So Hard tp Build a Quantum Computer? • Post-Quantum Cryptographic Algorithms • How Things Can Go Wrong
  • 5. Digital Adder • From geeksforgeeks.com (link Ch 14b)
  • 6. Analog to Digital • Real devices are
 analog • Digital circuits 
 minimize time 
 spent in the 
 "forbidden zone" • Error correction is needed • From Wikipedia (link Ch 14c)
  • 7. Analog Computing • The Antikythera mechanism, dating between 150 and 100 BC, was an early analog computer. • From Wikipedia (link Ch 14d)
  • 8. Slide Rule • How many bits does it process?
  • 9. Flute • Input: white noise • Output: clear note • Analog Fourier transform • How many bits does it process?
  • 10. Qubit
 Bloch Sphere • Certain states 
 |0> and |1> 
 are at the top and bottom • Uncertain or superposition states are in between • Collapses to 1 or 0 when measured
  • 11. Range of States • Digital computing • One byte has 8 bits of information • 256 possible states • 8 qubits • Qubit might have any possible value • 256 complex numbers required to specify state
  • 12. Range of States • Digital computing • n bits contains n bits of information • n qubits • Contain 2n complex floating-point values
  • 14. Measurement 180° rotation about X axis: Bit-flip Hadamard gate 180° rotation about X-Z axis: Bit-flip Converts a certain state to a superposition state Quantum Gates
  • 16. Searching a List • Searching an unordered list of n items • Classical computer • n/2 operations • Quantum computer: • sqrt(n) operations • Using Grover's algorithm
  • 17. Simon's Problem • Similar to hash collisions • Given a function f() • Find m such that • For all x, y satisfying f(x) = f(y) • Then
  • 18. Simon's Problem • Classical computer • Takes 2n/2 operations • Quantum computer • Takes n operations

  • 19.
  • 20. Shor's Algorithm • Factors numbers into prime factors • Solves Discrete Logarithm Problem (DLP) • And the Elliptic Curve DLP • Breaks RSA, Diffie-Hellman, ECC • And all currently deployed public-key algorithms
  • 21. Shor's Algorithm • 7 x 13 mod 15 • Link Ch 14e
  • 22. Breaking AES • Brute-force search • Try all 2128 possible keys • Classical: requires 2128/2 calculations • Grover's algorithm • Quantum: requires 264 calculations
  • 23. Grover's Algorithm • Can break symmetric encryption and reverse hashes • Requires 2n/2 calculations
  • 24. Double Key Length • Even with a quantum computer, breaking AES-256 or SHA-256 • Requires 2128 calculations
  • 25. Why Is It So Hard to Build a Quantum Computer?
  • 26. Noise • Google and IBM form Qubits are formed from superconducting circuits • Must be cooled to extremely low temperatures • Only stable for a few milliseconds • Another method uses ion traps
  • 27.
  • 28.
  • 29.
  • 30.
  • 32. A Different Hard Problem • Can't be based on the Discrete Logarithm Problem • Four types • Code-Based • Lattice-Based • Multivariate • Hash-Based
  • 33. Code-Based • Based on error-correcting codes • First one: McEliece developed in 1978 • Still unbroken • Can be used for encryption and signatures • Public key is 100 KB in size
  • 34. Error-Correcting Code • You want to send a three-bit message 010 • Over a noisy channel • One method: send every bit three times • 000111000 • If a single bit is wrong, the other two will outvote it • But if two errors occur the system fails
  • 35. Linear Codes • Word contains n bits • Treat it as a vector v • Multiply the word by a matrix G • To form code word w = vG • Can correct multi-bit errors
  • 36. McEleice Encryption • G is a secret combination of three matrices • G = ABC • Encryption is w = vG + e • e is a random error bit • G is the pubic key • A B C are the private keys
  • 37. McEleice Encryption • Relies on the hardness of decoding a linear code with insufficient information • Known to be NP-complete • Beyond the reach of quantum computers
  • 38. Lattice-Based • A Lattice is a set of points with a periodic structure
  • 39. Closest Vector Problem (CVP) • Problem: Combine basis vectors to find the lattice point closest to a point
  • 40. Short Integer Solution (SIS) • A is a random matrix • q is a prime number • b is a vector • Problem: Given A and b • Find a secret vector s such that b = As mod q
  • 41. Learning With Errors (LWE) • Problem: Given A and b • Find a secret vector s such that b = As + e mod q • e is a random vector of noise
  • 42. Lattice-Based Cryptography • These three problems are somewhat equivalent • Believed to be hard for both classical and quantum computers • But perhaps only in the hardest cases • And finding approximate solutions might be easier
  • 43. Multivariate • Four unknowns, and four random quadratic equations • Solving this may be a hard problem
  • 44. Multivariate Limitations • Actual hardness depends on the parameters • Number of equations • Size and type of numbers • Choosing secure parameters is hard • More than one multivariate scheme has been broken
  • 45. Multivariate Limitations • Not used in major apps • Concerns about security • Often slow or requires tons of memory • Benefit: produces short signatures
  • 46. Hash-Based • Based on difficulty of finding hash collisions • Quantum computers cannot break hash functions • Hash-based cryptographic schemes are complex
  • 47. Winternitz One-Time Signature (WOTS) • Private key can be used only once • To sign one message • Message M is a number from 0 to w - 1 • w is a parameter of the scheme • K is the private key • Signature is formed by hashing K with M rounds Hash(Hash(Hash( ... Hash(K) ... )) • Public key is formed by hashing K with w rounds
  • 48. WOTS Limitations • Signatures can be forged • Hash the signature of M to create the signature of M + 1
  • 49. WOTS Limitations • Only works for short messages • If message has 8 bits, you must calculate • 28 - 1 = 255 rounds of hashing • If message has 128 bits • 2128 - 1 rounds of hashing • Must break long messages into several smaller ones
  • 50. WOTS Limitations • Only works once • If a private key is used twice • Attacker can combine those signatures to forge other messages • There is no simple way to fix this problem
  • 51. Hash-Based Schemes • State-of-the-art schemes use more complex versions of WOTS • With tree data structures • And sophisticated techniques to sign different messages with different keys • SPHINCS is a state-of-the-art scheme • Signatures are dozens of KB long
  • 52. How Things Can Go Wrong
  • 53. Unclear Security Level • Security proofs are often asymptotic • Only true for large values of parameters • Such as the dimension of the lattice • In practice, smaller values are used • Difficult to quantify the level of security • Attacks on new schemes, like lattices, are not well understood
  • 54. Too Late? • Post-quantum encryption is more important than post-quantum signatures • Signatures can be revoked & replaced • Old encrypted data can be archived and broken years later • In practice, Diffie-Hellman often uses more than the shared secret to form the session key • Safer against quantum computers
  • 55. Implementation Issues • Some post-quantum encryption implementations have been optimized for speed • And are vulnerable to timing attacks • Post-quantum algorithms will be less secure than older algorithms at first