the quantum era & quantum key distribution

11
© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY The Quantum Era and Quantum Key Distribution

Upload: idquantique

Post on 21-Nov-2014

405 views

Category:

Technology


3 download

DESCRIPTION

An overview of the evolution of quantum computing and quantum key distribution (QKD).

TRANSCRIPT

Page 1: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

The Quantum Era and Quantum Key Distribution

Page 2: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

❑  Different from digital computers based on transistors ❑  Uses quantum properties, not binary code (qubits vs. bits) ❑  Will solve certain problems much more quickly ❑  Huge funding for development in US, China, etc. ❑  PKI (asymmetric keys) encryption will be dead ❑  Available in 5 to 10 years… or sooner? ❑  Big question on how to ensure long-term encryption of data ❑  Solution: Quantum Cryptography (Quantum Key Distribution)

The Quantum Era: Quantum Computing

What is quantum computing and how does it work?

Page 3: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

M H Devoret, and R J Schoelkopf Science 2013;339:1169-1174 (published by AAAS)

Fig. 1 Seven stages in the development of quantum information processing.

The road to quantum computing: Where are we now?

Page 4: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

When do we need to start worrying?

Time

Information Exchange

Information lifetime (based on legal, business or strategic constraints)

Vulnerability

Time for migration (from a few months to several years)

Page 5: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

❑  Classical encryption products with upgrade possibility •  ‘Quantum Era Ready’ platforms

❑  Quantum Random Number Generator •  True Random Number Generator exploiting quantum physics

❑  Quantum Key Distribution (QKD) •  Often referred to as ‘Quantum Cryptography’ •  Technology allows one to distribute sequence of random bit whose randomness

and secrecy are guaranteed by the laws of quantum physics. These sequences can then be used as secret keys with conventional cryptography techniques to guarantee the confidentiality of data transmissions

What Protection is Available Today?

Page 6: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

Long Term Data Protection

Quantum

2013

2014

2015

2016

Conventional

2019-2024 Quantum Computing Era

Page 7: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

Click to edit Master title style

QUANTUM KEY DISTRIBUTION

Page 8: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

Using Quantum Physics to Secure Information

❑  QKD uses the fundamental laws of nature - quantum mechanics- to guarantee highly-secure data communications •  Generation of highly-secure encryption keys (based on IDQ quantum RNG for

high entropy) •  Provably secure communication channel ➔ QKD reveals presence of

eavesdropping attempts •  Provable “forward secrecy” ➔ long-term data protection with no ability to decrypt

data through brute force attacks off-line

How does Quantum Key Distribution work?

Page 9: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

Classical Encryption Key Distribution

Message

AES 256 Symmetric Key

Encrypted Message Message

Encryption key (public)

Decryption key (private)

Public Key Cryptography

AES 256 Symmetric Key

❑  The symmetric AES 256 bit keys used to encrypt the data must be exchanged between the sender & receiver.

❑  This is the most vulnerable point of current encryption solutions ❑  Conventional encryption techniques (public key cryptography, like RSA) use

mathematical “one way” functions

Page 10: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

A quantum computer could break public key cryptography http://en.wikipedia.org/wiki/Shor%27s_algorithm

The Weakest Link Today: Key Distribution

Message

Key Key

Encrypted Message Message

Encryption key (public)

Decryption key (private)

Theoretical Progress Progress in fundamental mathematics and cryptanalysis renders classical (mathematical) public key cryptography less secure

Quantum Computing

Increase in Computing Power

Vulnerable to…

Public key cryptography can be cracked if sufficient computing power available. Hence increasing size of public key lengths. http://www.keylength.com

Public Key Cryptography

Page 11: The Quantum Era & Quantum Key Distribution

© 2014 ID Quantique SA, Switzerland | page ID Quantique PROPRIETARY

Quantum Key Distribution (QKD)

"0" "1" "1"

Classical communications

"0" Fragile !

Quantum communications

Message

Key

Message

Key

Encrypted Message

Future-proof security guaranteed by the laws of quantum physics: eavesdroppers can be detected (measurement introduces disturbance).

Classical communication is like a tennis game. For example, if you intercept a tennis ball, you can “read” the tennis ball. Quantum communications is replacing that tennis ball with a bubble. If you intercept a bubble, it pops and you can’t “read” it.