the quantum era & quantum key distribution
DESCRIPTION
An overview of the evolution of quantum computing and quantum key distribution (QKD).TRANSCRIPT
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
The Quantum Era and Quantum Key Distribution
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
❑ Different from digital computers based on transistors ❑ Uses quantum properties, not binary code (qubits vs. bits) ❑ Will solve certain problems much more quickly ❑ Huge funding for development in US, China, etc. ❑ PKI (asymmetric keys) encryption will be dead ❑ Available in 5 to 10 years… or sooner? ❑ Big question on how to ensure long-term encryption of data ❑ Solution: Quantum Cryptography (Quantum Key Distribution)
The Quantum Era: Quantum Computing
What is quantum computing and how does it work?
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
M H Devoret, and R J Schoelkopf Science 2013;339:1169-1174 (published by AAAS)
Fig. 1 Seven stages in the development of quantum information processing.
The road to quantum computing: Where are we now?
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
When do we need to start worrying?
Time
Information Exchange
Information lifetime (based on legal, business or strategic constraints)
Vulnerability
Time for migration (from a few months to several years)
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
❑ Classical encryption products with upgrade possibility • ‘Quantum Era Ready’ platforms
❑ Quantum Random Number Generator • True Random Number Generator exploiting quantum physics
❑ Quantum Key Distribution (QKD) • Often referred to as ‘Quantum Cryptography’ • Technology allows one to distribute sequence of random bit whose randomness
and secrecy are guaranteed by the laws of quantum physics. These sequences can then be used as secret keys with conventional cryptography techniques to guarantee the confidentiality of data transmissions
What Protection is Available Today?
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
Long Term Data Protection
Quantum
2013
2014
2015
2016
Conventional
2019-2024 Quantum Computing Era
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
Click to edit Master title style
QUANTUM KEY DISTRIBUTION
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
Using Quantum Physics to Secure Information
❑ QKD uses the fundamental laws of nature - quantum mechanics- to guarantee highly-secure data communications • Generation of highly-secure encryption keys (based on IDQ quantum RNG for
high entropy) • Provably secure communication channel ➔ QKD reveals presence of
eavesdropping attempts • Provable “forward secrecy” ➔ long-term data protection with no ability to decrypt
data through brute force attacks off-line
How does Quantum Key Distribution work?
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
Classical Encryption Key Distribution
Message
AES 256 Symmetric Key
Encrypted Message Message
Encryption key (public)
Decryption key (private)
Public Key Cryptography
AES 256 Symmetric Key
❑ The symmetric AES 256 bit keys used to encrypt the data must be exchanged between the sender & receiver.
❑ This is the most vulnerable point of current encryption solutions ❑ Conventional encryption techniques (public key cryptography, like RSA) use
mathematical “one way” functions
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
A quantum computer could break public key cryptography http://en.wikipedia.org/wiki/Shor%27s_algorithm
The Weakest Link Today: Key Distribution
Message
Key Key
Encrypted Message Message
Encryption key (public)
Decryption key (private)
Theoretical Progress Progress in fundamental mathematics and cryptanalysis renders classical (mathematical) public key cryptography less secure
Quantum Computing
Increase in Computing Power
Vulnerable to…
Public key cryptography can be cracked if sufficient computing power available. Hence increasing size of public key lengths. http://www.keylength.com
Public Key Cryptography
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY
Quantum Key Distribution (QKD)
"0" "1" "1"
Classical communications
"0" Fragile !
Quantum communications
Message
Key
Message
Key
Encrypted Message
Future-proof security guaranteed by the laws of quantum physics: eavesdroppers can be detected (measurement introduces disturbance).
Classical communication is like a tennis game. For example, if you intercept a tennis ball, you can “read” the tennis ball. Quantum communications is replacing that tennis ball with a bubble. If you intercept a bubble, it pops and you can’t “read” it.