Privacy in the era of quantum computers

Speck&Tech
Speck&TechSpeck&Tech
The privacy in the era of
quantum computers
Dr. Nicolò Leone
nicolo.leone@unitn.it
21/03/23
NanoScience
Laboratory
Quantum
computers are
great!!!
Solve different kinds of
classically unsolvable problems.
Any
downside?
The title of the presentation has
spoiled it…
Based on Public key cryptography system
Sharing of information
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography Public
Private
Connected by the
algorithm
Es: the public key =
product of the two
prime numbers
Alice Bob
Alice
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography
Encrypted with Alice Public key
Alice Bob
Based on
assumption
The considered problem is
hard to be solved by
classical computers
Public key
cryptography Alice decrypts the message using his private key.
Factorisation of large prime numbers.
Solved in exponential time
Alice Bob
Quantum
computing
Solve factorisation
problems
Quantum
Computers
Can solve other
crypto. problems?
Algorithm
Only a few
Future
Not enough qubit
Time
Polynomial
Security
Cannot simply take a
longer key
https://newsroom.ibm.com/media-quantum-innovation?keywords=quantum&l=100
Time is
passing.
The company are approaching the
number of necessary qubits.
https://newsroom.ibm.com/media-quantum-innovation?keywords=quantum&l=100
Post-quantum cryptography
Find problems that are still difficult to be
solved by quantum computers
Quantum cryptography
Using quantum physics to beat quantum
physics.
PRO
Post-quantum
cryptography
CONS
Security
Assumptions
Demanding
Dedicated hardware
Deployment
Software
Cost
Cheap
PRO
Quantum cryptography
Quantum key distribution
CONS
Deployment
Hardware
Cost
Expensive
Security
Quantum mechanics
Demanding
Dedicated hardware
https://www.qticompany.com/products/
BB84
First protocol proposed by
Bennett and Bressard in
1984
Quantum key
distribution
The key is not transmitted
Alice Bob
Quantum channel
Channel in which we inject
the quantum light
Quantum key
distribution
Alice Bob
Polarization
Direction of oscillation of
the electronic field
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Input randomness
It is necessary to randomly
select the base and the
digit to send
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Input randomness
Bob needs to select its
measurement basis also
randomly.
Quantum key
distribution
0 1
B1
B2
B1
B2
Alice Bob
Quantum collapse
Bob projects the
wavefunction of the
photon.
Quantum key
distribution
ℙ(V) = 1
Quantum collapse
Bob projects the
wavefunction of the
photon.
Quantum key
distribution
ℙ(V) = 1
ℙ(V) = 0.5
ℙ(H) = 0.5
Now let’s enter in
the protocol
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 0 X 1 X X 1 X 1 1 X
Alice Bob
Now let’s enter in
the protocol
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 0 X 1 X X 1 X 1 1 X
Alice Bob
Basis
announcement
They keep the runs in
which the basis are the
same.
Quantum key
distribution
Alice and Bob announce the basis
used.
Alice Bob
The key creation
Bob and Alice have
obtained the same key
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B1 B1 B2 B2
Alice Digit 0 1 1 1 1
Bob Base B1 B1 B1 B2 B2
Bob Result 0 1 1 1 1
Alice Bob
The appearance of
Eve
Now an Eavesdropper
appears and try to steal
the key.
Quantum key
distribution
Alice Bob
Eve
The appearance of
Eve
Now an Eavesdropper
appears and try to steal
the key.
Quantum key
distribution
Alice Bob
Eve
Eve performs an
intercept and
resend attack
Eve chooses the right
base.
Quantum key
distribution
Eve performs an
intercept and
resend attack
Eve chooses the wrong
base. Eve introduces
errors in the sequence.
Quantum key
distribution
Eve action
Errors are introduced in
the sequence.
Quantum key
distribution
#1 #2 #3 #4 #5 #6 #7 #8 #9 #10
Alice Base B1 B2 B1 B1 B2 B1 B1 B2 B2 B1
Alice Digit 0 1 1 0 0 1 0 1 1 0
Bob Base B1 B1 B1 B2 B1 B1 B2 B2 B2 B2
Bob Result 1 X 1 X X 1 X 0 0 X
Alice Bob
Error estimation
Alice and Bob share a
piece of their key.
Quantum key
distribution
Error estimation, by comparing a
piece of the key.
Alice Bob
Error estimation
All the errors are treated
as due to Eve.
Quantum key
distribution
Errors < Threshold_value
Alice Bob
One-time pad
A method that is 100%
secure.
Quantum key
distribution Encrypted message
B = 01000010
01000010 +
01100001 =
00100011
Key = 01100001
#
00100011 +
01100001 =
01000010
Key = 01100001
# = 00100011
B
Alice Bob
One-time pad
Never reuse the same key!
Quantum key
distribution
V
V
From: http://www.cryptosmith.com/archives/70
=
=
=
V
V
From: http://www.cryptosmith.com/archives/70
=
=
Secure forever!
It is theoretically the most secure approach that can be
implemented.
The attacks are unfeasible
It is better to try to compromise Alice or Bob
Cost reduction
A As the research proceeds the cost of the QKD will
decrease
Quantum-key
distribution
Actually testing a new prototype of bidirectional QKD system
Now
Find out more SPEQK Team info@speqk.com
|ψ⟩ =
1
2
(|Thank⟩ + |you⟩)
1 sur 37

Contenu connexe

Similaire à Privacy in the era of quantum computers

Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
25.3K vues22 diapositives
1_Protocols.pptx1_Protocols.pptx
1_Protocols.pptxAhmedAlRasheed18
13 vues175 diapositives
1313
13Toan Nguyen
307 vues17 diapositives
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
11.5K vues17 diapositives

Similaire à Privacy in the era of quantum computers(12)

Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu42725.3K vues
Chapter 8 - Security in Computer NetworksChapter 8 - Security in Computer Networks
Chapter 8 - Security in Computer Networks
Andy Juan Sarango Veliz99 vues
1_Protocols.pptx1_Protocols.pptx
1_Protocols.pptx
AhmedAlRasheed1813 vues
1313
13
Toan Nguyen307 vues
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
drewz lin11.5K vues
crypto.pptcrypto.ppt
crypto.ppt
Sourabh970544 vues
crypto.pptcrypto.ppt
crypto.ppt
YousafAli832 vues
Zksnarks in englishZksnarks in english
Zksnarks in english
Ronak Kogta901 vues

Dernier(20)

ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman152 vues
ThroughputThroughput
Throughput
Moisés Armani Ramírez28 vues
[2023] Putting the R! in R&D.pdf[2023] Putting the R! in R&D.pdf
[2023] Putting the R! in R&D.pdf
Eleanor McHugh34 vues

Privacy in the era of quantum computers