history of networking and security

69
Quantum Information Technology Group – Quantumlah Networking and Security Networking and Security Darwin Gosal National University of Singapore

Upload: darwin-gosal

Post on 15-Jul-2015

3.142 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah

Networking and SecurityNetworking and Security

Darwin GosalNational University of Singapore

Page 2: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah OutlineOutline

� History of communication� History of telecommunication� Computer networking now and beyond� Information Security� Ancient cryptography� Overview of modern cryptography� Introduction to quantum cryptography.

Page 3: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CommunicationHistory of Communication

� Body Language

Page 4: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CommunicationHistory of Communication

� Speech� 200,000 years ago (FOXP2 gene)� Unreliable storage: human memory

20Hz 300Hz

500Hz 3kHz

4kHz 14kHz 20kHz

speech

human voice

human hearing

Page 5: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CommunicationHistory of Communication

� Symbol� Rock carving� Cave painting� Pictograms� Ideograms� Logographic� Alphabet

Page 6: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah SymbolSymbol

� Cave Paintings� Rock Carving (Petroglyph)

Chauvet Cave (30,000 BC) Haljesta (10,000BC)

Page 7: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah SymbolSymbol

� Pictograms (9000 BC)� Ideograms� Logographic (4000BC)

Water, Rabbit, & Deer fromAztec Stone of the Sun

Ideograms from Mi’kmag hieroglyps

2600 BC Sumerian Cuneiform

Egyptian hieroglyph

Chinese Oracle Bone Script1600BC

Page 8: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah SymbolSymbol

� Alphabet / AdjadA mapping of single symbols to single phonemes

� Nearly all alphabetical scripts used around the world derived from Proto-Sinaitic alphabet

“Ba’alat” meansLady (title for Hathor,feminime title for semitic god Baal)

Page 9: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CommunicationHistory of Communication

� Writing tools / medium� Papyrus (3000BC)� The first newspaper, Acta Diurna (59BC)� Paper (100AD)� Pens (1000AD)� Printing press, Gutenberg (1400AD)� Typewriter (1800s)� Computers (1960s)

Page 10: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of TelecommunicationHistory of Telecommunication

� Transportation� Foot soldier� Postal system� Sneaker-net

F-16 payload: 4600kg76,470pcs of 2.5” 160GB HDDCapacity: 12 Peta-BytesSpeed: Mach 2Range: 3200kmBandwidth: 2.6 TB/s

Page 11: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of TelecommunicationHistory of Telecommunication

� Drums signal� Drum talking (i.e. Yoruba language)� Smoke signals

Page 12: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of TelecommunicationHistory of Telecommunication

� Heliograph (Greek, 405BC)� Modern Heliograph

using Morse code (1810)� Semaphore (1972)

Distance: 20 milesBandwidth: 15 cpm

Page 13: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of TelecommunicationHistory of Telecommunication

� Electric Telegraph� 1st commercial version (1937)

by Wheatstone & Cooke� 9 April 1839 – 21km� First transatlantic

telegraph cable (1866)� Telex (Teleprinter Exchange, 1932)

a switched telegraph service.

Page 14: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of TelecommunicationHistory of Telecommunication

� Telephone (1876)� Alexander Graham Bell� Elisha Grey� Antonio Meucci

� Bell Telephone Company (1877)American Telephone & Telegraph (1885)AT&T break-up (1984)

Page 15: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of TelecommunicationHistory of Telecommunication

� Radio / Wireless Telegraph (1890s)� Nikola Tesla (1893)� Guglielmo Marconi (1901)

1st wireless comm. between UK & USWon Nobel Prize in Physics (1909)

� Mobile Phone (Marty Cooper 1973)

Page 16: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah From Analog to DigitalFrom Analog to Digital

� Claude ShannonFather of Modern Information Theory

� Publish: A Mathematical Theory of Communication (1948)

� Won 1936 Nobel on: “A Symbolic Analysis of Relay and Switching Circuit”

� Notion of BITS = Binary digITS.

Page 17: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Computer NetworkingComputer Networking

� 1960/4 - Research on Packet Switching� 1968 - DARPA contracts with BBN to

create ARPAnet� 1970 - The first 5 nodes: BBN, Stanford,

UCLA, UC Santa Barbara, & U of Utah.� 1972 - TCP created by Vint Cerf� 1981 - ARPAnet have 213 nodes and

IPv4, TCP/UDP is used.

Page 18: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Computer NetworkingComputer Networking

� 1983 – TCP/IP compliant networkARPAnet + X.25 + UUCP + NSFnet

� 1989 – Tim Berners-Lee, CERN, invented HTML thus World-Wide-Web.

� 1993 – Mosaic, the 1st graphical browser

InternetInternet

5000

562

213100

1000

10000

100000

1981 1982 1983 1984 1985 1986 1987 1988 1989

Years

Hos

ts

Page 19: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Computer NetworkingComputer Networking

� 1992 – Internet Society (ISOC) given formal oversight of the Internet Activities Board (IAB) and the Internet Engineering Task Force (IETF)

� 1995 – Fed Gov out from networking infrastructure business �eCommerce

Page 20: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Networking now and beyondNetworking now and beyond

� Personal Area NetworkBluetooth, PDA-phone, Notebook

� Local Area NetworkGigabit, WiFi (802.11a/b/g/n)

� Wide Area NetworkFrame-Relay, ATM, GSM (EDGE, GPRS), CDMA (3G)

� MANFDDI, FSO, WiMax

Page 21: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Networking now and beyondNetworking now and beyond

� IPv6 (232 � 2128), Internet 2� Peer to Peer (Usenet 1979)

Wireless Mesh network (802.11s)� Convergence � VoIP

Starhub cable: TV, Phone, Broadband� RFID (spychips?)� GPS

© NASA

Page 22: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Networking now and beyondNetworking now and beyond

� The Future

Page 23: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Information SecurityInformation Security

� Confidentiality (Authentication)Ensuring the information is accessible only to authorized personal (prevent unauthorized disclosure)

� Integrity (Non-repudiation)Safeguarding the accuracy and completeness of the information (prevent unauthorized modification)

� Availability (Reliability)Ensuring authorized user to have access to the information when required (prevent disruption of service and productivity)

Page 24: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Information SecurityInformation Security

�ConfidentialityPIN,Password, Passphrase, Biometrics, Tokens, Encryption

� IntegrityMD5, SHA1

�AvailabilityDenial of Service

Page 25: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Information SecurityInformation Security

� Network SecurityFirewall, IDS, VPN

� Application SecuritySELinux, Secure coding

� Host (End-point) SecurityAnti-virus, Anti-spyware, ACL, Physical security, Social engineering

Page 26: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Information SecurityInformation Security

Hacker activity

Worms & viruses

SPAM

Spyware

Phishing

Firewall

Intrusion Detection

SPAM filtering

Anti-Spyware

Phishing filtering

Page 27: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Information SecurityInformation Security

� Trusted Computing (TPM)Palladium

� Digital Right Management (DRM)Play4Sure, DVD’s Content Scrambling System (CSS)Digital Millennium Copyright Act (DMCA)

Page 28: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Security ModelSecurity Model

� Threat avoidance (Military model)Security is absolute (either you’re secure or not)

Page 29: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Risk ManagementRisk Management

Page 30: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Security ModelSecurity Model

� Risk Management (Business model)Security is relative (many risks and solutions)� Accept the risk� Mitigate the risk with technology� Mitigate the risk with procedures� Transfer the risk

Page 31: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah CryptographyCryptography

� Claude ShannonFather of modern cryptography“Communication Theory of Secrecy Systems”

� Cryptology (scrambling)� Cryptography� Cryptanalysis

� Steganography (hiding)

Page 32: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah CryptographyCryptography

Alice Bob

Eavesdropper

Page 33: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CryptographyHistory of Cryptography

� Atbash cipherHebrew (600BC)

� Permutation cipher (Greek)Scytale (6BC)

� Subtitution cipherCaesar Shift(1400s)

Page 34: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CryptographyHistory of Cryptography

� Queen Mary’s Cipher (Babington Plot)� Plot to free Queen Mary,

incite a rebellion, and murder Queen Elizabeth.

� The conspirators communicated with Queen Mary, who was being held prisoner by Elizabeth, via enciphered smuggled letters.

Page 35: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CryptographyHistory of Cryptography

� Nomenclator – 23 symbols representing letters, and 35 symbols representing words

� Cracked by Thomas Phelippesat the first Cipher school in Englandestablished in 1586 by Francis Walsingham, Elizabeth’s Secretary and head of security.

Page 36: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CryptographyHistory of Cryptography

� Mary replied to a letter from Babington using the compromised cipher.

� Phelippes added a forged postscript from Queen Mary asking Babington for the identities of the conspirators. He supplied them.

Page 37: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CryptographyHistory of Cryptography

� Mary was beheaded� Babington and the six conspirators were

emasculated, disemboweled, and then executed.

Page 38: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CryptographyHistory of Cryptography

� Al-Kindi (800AD)� Frequency Analysis� Lipograms

English: ETAOINSHR German: ENIRSATUD French: EAISTNRUL Spanish: EAOSNRILD Italian: EAIONLRTS

Finnish: AITNESLOK

That's right, this is a lipogram - a book, paragraph or similar thing in writing that fails to contain a symbol, particularly that symbol fifth in rank out of 26 (amidst 'd' and 'f') and which stands for a vocalic sound such as that in 'kiwi'. I won't bring it up right now, to avoid spoiling it..."

Page 39: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah LipogramsLipograms

The most famous lipogram: Georges Perec, La Dispar ition (1969) 85000 words without the letter e:

Tout avait l'air normal, mais tout s'affirmait faux. Tout avait l'airnormal, d'abord, puis surgissait l'inhumain, l'affolant. Il aurait voulu savoir oùs'articulait l'association qui l'unissait au roman : sur son tapis, assaillant à tout instant son imagination, …

English translator, Gilbert Adair, in A Void, succeeded in avoiding the letter e as well

Gottlob Burmann (1737-1805) R-LESS POETRY. An obsessive dislike for the letter r; wrote 130 poems without using that letter, he also omitted the letter r from his daily conversation for 17 years…

Page 40: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of CryptographyHistory of Cryptography

� Enigma (WW2)� Vernam Cipher

� 3DES� AES

Gilbert Vernam(AT&T) 1918

Claude Shannon of Bell Labs (ca. 1945) proved the one time pad guaranties perfect security as long as:

•The key is a truly random number•The key is as long as the message•The key is used only once

Page 41: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah DES CrackerDES Cracker

This board is part of the EFF DES cracker, which contained over 1800 custom chips and could brute force a DES key in a matter of days.

Page 42: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Key DistributionKey Distribution

� Public Key Cryptosystem� RSA (Factoring)� Others:

� McEliece� ElGamal� ECC

Page 43: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Modern CryptographyModern Cryptography

� Public-Key Cryptosystem (RSA, ECC)� Public Key Infrastructure� Authentication method� Diffie-Hellman key exchange� Session key created for symmetric

cryptography� Use AES or 3DES

Page 44: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Diffie-HellmanDiffie-Hellman

Page 45: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Diffie-HellmanDiffie-Hellman

Page 46: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Diffie-HellmanDiffie-Hellman

Page 47: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah

Copyright, 2000-2006 by NetIP, Inc. and Keith Palmgren, CISSP

Diffie-HellmanDiffie-Hellman

Page 48: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Computational ComplexityComputational Complexity

nL

L2

INPUT SIZE

Exe

cutio

n T

ime

P

NP

EXP

Page 49: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Quantum ComputerQuantum Computer

� Shor’s algorithm� Moore’s law

Page 50: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Quantum CryptographyQuantum Cryptography

� In April 2004, the EU decided to spend €11 million developing secure communication based on quantum cryptography — the SECOQC project — a system that would theoretically be unbreakable by ECHELON or any other espionage system. European governments have been leery of ECHELON since a December 3, 1995 story in the Baltimore Sun claiming that aerospace company Airbus lost a $6Billion contract with Saudi Arabia in 1994 after the NSA reported that Airbus officials had been bribing Saudi officials to secure the contract.

Source: Wikipediahttp://news.bbc.co.uk/1/hi/world/europe/820758.stm

Page 51: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Quantum CryptographyQuantum Cryptography

� Quantum Key Distribution� Bit = 0’s or 1’s� Qubit = 0’s, 1’s, or “0 and 1”.

Page 52: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah QubitQubit

Which path is taken?

BOTH

Page 53: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah QubitQubit

What do you see?

measurement

Page 54: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah QubitQubit

Ψ = +α β0 10 1

or

Ψ = + + ++ + + +

000 001 010 011

100 101 110 111

L qubits encode 2L numbers

Page 55: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah

measuring polarisation states of photons

H

V

+45

-45

PBS (H/V) PBS (45/-45)

Heisenberg Uncertainty PrincipleHeisenberg Uncertainty Principle

Page 56: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah BB84BB84

1 0 1 1 1 0 1 1 …

Key generation

+ + X + + + X X …

Base selection

V H -45 V V H -45 -45 …

Base selection

X + X + + X + X …Encoding

45 H -45 V V -45 H -45 …

0 0 1 1 1 0 0 1 …

Base discussionOver public channel

0 1 1 1 …

0 → H1 → V0 → 451 → -45

Page 57: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah BB84BB84

No Cloning Theorem : It is not possible to copy an unknown quantum state with perfect fidelity.

Bound on copying fidelity is such that Eve will not succeed in tapping the channel even if using the best possible quantum copying machine.

Wootters and Zurek; Dieks 1982

Page 58: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah BB84BB84

www.research.ibm.com/journal/rd/481/smolin.htm

Page 59: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Entangled StateEntangled State

)(2

1)(

is

i

isHVeVH α−=Ψ −

Phys. Rev. Lett. 75, 4337-4341 (1995)

Page 60: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah EntanglementEntanglement

–“If, without in any way disturbing a system, we can predict with certainty… the value of a physical quantity, then there exists an element of physical reality corresponding to this physical quantity”

PERFECT EAVESDROPPING!

LOCAL REALISM

Page 61: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Local RealismLocal Realism

� Local realism is refuted by quantum theory� Entangled photons do not have predetermined

values of polarization…� …so eavesdropper has nothing to measure� Quantum mechanics allows eavesdropper free

communication� Any post-quantum theory that refutes local

realism allows eavesdropper free communication.

Page 62: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah Ekert 91Ekert 91

( )HVVH −=Ψ −

2

1)(

Perfect Security for error < 15%

( )454545452

1)( +−−−+=Ψ −

Page 63: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah History of Q. CryptographyHistory of Q. Cryptography

C.H. Bennett & G. Brassard 1984

Prepare and Measure

Protocols

Entanglement Based

Protocols

A. Ekert 1991

S. Wiesner 1970

Page 64: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah ExperimentsExperiments

� Alps (23.4 km)� Vienna

Page 65: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah

10 Jan 2004Rise of the Quantum Island

Page 66: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah GovernmentsGovernments

� US (US$ 100M = SG$ 166M)US Army, NSA, DARPA, NIST, etc

� Japan (SG$ 41.5M)ERATO, ICORP, PRESTO

� Europe (€ 15M = SG$ 30M)� Australia (AU$ 10M = SG$ 13M)� Singapore (SG$ 8M)

A*Star, DSTA, DSO

Page 67: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah CommercialCommercial

� MagiQ (US)� BBN (US)� id-Quantique (Swiss)� QinetiQ (UK)� D-wave (Canada)� Elsag (Italy)� Fujitsu & Toshiba (UK + Japan) � Lockheed Martin (US)� Q-tool (Germany)

Page 68: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah The FutureThe Future

� Hybrid System� Satellite� QKD network

Page 69: History of Networking and Security

Qua

ntum

Info

rmat

ion

Tec

hnol

ogy

Gro

up –

Qua

ntum

lah

Think like a physicists!