history of networking and security
TRANSCRIPT
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah
Networking and SecurityNetworking and Security
Darwin GosalNational University of Singapore
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah OutlineOutline
� History of communication� History of telecommunication� Computer networking now and beyond� Information Security� Ancient cryptography� Overview of modern cryptography� Introduction to quantum cryptography.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CommunicationHistory of Communication
� Body Language
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CommunicationHistory of Communication
� Speech� 200,000 years ago (FOXP2 gene)� Unreliable storage: human memory
20Hz 300Hz
500Hz 3kHz
4kHz 14kHz 20kHz
speech
human voice
human hearing
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CommunicationHistory of Communication
� Symbol� Rock carving� Cave painting� Pictograms� Ideograms� Logographic� Alphabet
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah SymbolSymbol
� Cave Paintings� Rock Carving (Petroglyph)
Chauvet Cave (30,000 BC) Haljesta (10,000BC)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah SymbolSymbol
� Pictograms (9000 BC)� Ideograms� Logographic (4000BC)
Water, Rabbit, & Deer fromAztec Stone of the Sun
Ideograms from Mi’kmag hieroglyps
2600 BC Sumerian Cuneiform
Egyptian hieroglyph
Chinese Oracle Bone Script1600BC
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah SymbolSymbol
� Alphabet / AdjadA mapping of single symbols to single phonemes
� Nearly all alphabetical scripts used around the world derived from Proto-Sinaitic alphabet
“Ba’alat” meansLady (title for Hathor,feminime title for semitic god Baal)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CommunicationHistory of Communication
� Writing tools / medium� Papyrus (3000BC)� The first newspaper, Acta Diurna (59BC)� Paper (100AD)� Pens (1000AD)� Printing press, Gutenberg (1400AD)� Typewriter (1800s)� Computers (1960s)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of TelecommunicationHistory of Telecommunication
� Transportation� Foot soldier� Postal system� Sneaker-net
F-16 payload: 4600kg76,470pcs of 2.5” 160GB HDDCapacity: 12 Peta-BytesSpeed: Mach 2Range: 3200kmBandwidth: 2.6 TB/s
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of TelecommunicationHistory of Telecommunication
� Drums signal� Drum talking (i.e. Yoruba language)� Smoke signals
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of TelecommunicationHistory of Telecommunication
� Heliograph (Greek, 405BC)� Modern Heliograph
using Morse code (1810)� Semaphore (1972)
Distance: 20 milesBandwidth: 15 cpm
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of TelecommunicationHistory of Telecommunication
� Electric Telegraph� 1st commercial version (1937)
by Wheatstone & Cooke� 9 April 1839 – 21km� First transatlantic
telegraph cable (1866)� Telex (Teleprinter Exchange, 1932)
a switched telegraph service.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of TelecommunicationHistory of Telecommunication
� Telephone (1876)� Alexander Graham Bell� Elisha Grey� Antonio Meucci
� Bell Telephone Company (1877)American Telephone & Telegraph (1885)AT&T break-up (1984)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of TelecommunicationHistory of Telecommunication
� Radio / Wireless Telegraph (1890s)� Nikola Tesla (1893)� Guglielmo Marconi (1901)
1st wireless comm. between UK & USWon Nobel Prize in Physics (1909)
� Mobile Phone (Marty Cooper 1973)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah From Analog to DigitalFrom Analog to Digital
� Claude ShannonFather of Modern Information Theory
� Publish: A Mathematical Theory of Communication (1948)
� Won 1936 Nobel on: “A Symbolic Analysis of Relay and Switching Circuit”
� Notion of BITS = Binary digITS.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Computer NetworkingComputer Networking
� 1960/4 - Research on Packet Switching� 1968 - DARPA contracts with BBN to
create ARPAnet� 1970 - The first 5 nodes: BBN, Stanford,
UCLA, UC Santa Barbara, & U of Utah.� 1972 - TCP created by Vint Cerf� 1981 - ARPAnet have 213 nodes and
IPv4, TCP/UDP is used.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Computer NetworkingComputer Networking
� 1983 – TCP/IP compliant networkARPAnet + X.25 + UUCP + NSFnet
� 1989 – Tim Berners-Lee, CERN, invented HTML thus World-Wide-Web.
� 1993 – Mosaic, the 1st graphical browser
InternetInternet
5000
562
213100
1000
10000
100000
1981 1982 1983 1984 1985 1986 1987 1988 1989
Years
Hos
ts
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Computer NetworkingComputer Networking
� 1992 – Internet Society (ISOC) given formal oversight of the Internet Activities Board (IAB) and the Internet Engineering Task Force (IETF)
� 1995 – Fed Gov out from networking infrastructure business �eCommerce
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Networking now and beyondNetworking now and beyond
� Personal Area NetworkBluetooth, PDA-phone, Notebook
� Local Area NetworkGigabit, WiFi (802.11a/b/g/n)
� Wide Area NetworkFrame-Relay, ATM, GSM (EDGE, GPRS), CDMA (3G)
� MANFDDI, FSO, WiMax
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Networking now and beyondNetworking now and beyond
� IPv6 (232 � 2128), Internet 2� Peer to Peer (Usenet 1979)
Wireless Mesh network (802.11s)� Convergence � VoIP
Starhub cable: TV, Phone, Broadband� RFID (spychips?)� GPS
© NASA
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Networking now and beyondNetworking now and beyond
� The Future
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Information SecurityInformation Security
� Confidentiality (Authentication)Ensuring the information is accessible only to authorized personal (prevent unauthorized disclosure)
� Integrity (Non-repudiation)Safeguarding the accuracy and completeness of the information (prevent unauthorized modification)
� Availability (Reliability)Ensuring authorized user to have access to the information when required (prevent disruption of service and productivity)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Information SecurityInformation Security
�ConfidentialityPIN,Password, Passphrase, Biometrics, Tokens, Encryption
� IntegrityMD5, SHA1
�AvailabilityDenial of Service
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Information SecurityInformation Security
� Network SecurityFirewall, IDS, VPN
� Application SecuritySELinux, Secure coding
� Host (End-point) SecurityAnti-virus, Anti-spyware, ACL, Physical security, Social engineering
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Information SecurityInformation Security
Hacker activity
Worms & viruses
SPAM
Spyware
Phishing
Firewall
Intrusion Detection
SPAM filtering
Anti-Spyware
Phishing filtering
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Information SecurityInformation Security
� Trusted Computing (TPM)Palladium
� Digital Right Management (DRM)Play4Sure, DVD’s Content Scrambling System (CSS)Digital Millennium Copyright Act (DMCA)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Security ModelSecurity Model
� Threat avoidance (Military model)Security is absolute (either you’re secure or not)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Risk ManagementRisk Management
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Security ModelSecurity Model
� Risk Management (Business model)Security is relative (many risks and solutions)� Accept the risk� Mitigate the risk with technology� Mitigate the risk with procedures� Transfer the risk
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah CryptographyCryptography
� Claude ShannonFather of modern cryptography“Communication Theory of Secrecy Systems”
� Cryptology (scrambling)� Cryptography� Cryptanalysis
� Steganography (hiding)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah CryptographyCryptography
Alice Bob
Eavesdropper
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CryptographyHistory of Cryptography
� Atbash cipherHebrew (600BC)
� Permutation cipher (Greek)Scytale (6BC)
� Subtitution cipherCaesar Shift(1400s)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CryptographyHistory of Cryptography
� Queen Mary’s Cipher (Babington Plot)� Plot to free Queen Mary,
incite a rebellion, and murder Queen Elizabeth.
� The conspirators communicated with Queen Mary, who was being held prisoner by Elizabeth, via enciphered smuggled letters.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CryptographyHistory of Cryptography
� Nomenclator – 23 symbols representing letters, and 35 symbols representing words
� Cracked by Thomas Phelippesat the first Cipher school in Englandestablished in 1586 by Francis Walsingham, Elizabeth’s Secretary and head of security.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CryptographyHistory of Cryptography
� Mary replied to a letter from Babington using the compromised cipher.
� Phelippes added a forged postscript from Queen Mary asking Babington for the identities of the conspirators. He supplied them.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CryptographyHistory of Cryptography
� Mary was beheaded� Babington and the six conspirators were
emasculated, disemboweled, and then executed.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CryptographyHistory of Cryptography
� Al-Kindi (800AD)� Frequency Analysis� Lipograms
English: ETAOINSHR German: ENIRSATUD French: EAISTNRUL Spanish: EAOSNRILD Italian: EAIONLRTS
Finnish: AITNESLOK
That's right, this is a lipogram - a book, paragraph or similar thing in writing that fails to contain a symbol, particularly that symbol fifth in rank out of 26 (amidst 'd' and 'f') and which stands for a vocalic sound such as that in 'kiwi'. I won't bring it up right now, to avoid spoiling it..."
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah LipogramsLipograms
The most famous lipogram: Georges Perec, La Dispar ition (1969) 85000 words without the letter e:
Tout avait l'air normal, mais tout s'affirmait faux. Tout avait l'airnormal, d'abord, puis surgissait l'inhumain, l'affolant. Il aurait voulu savoir oùs'articulait l'association qui l'unissait au roman : sur son tapis, assaillant à tout instant son imagination, …
English translator, Gilbert Adair, in A Void, succeeded in avoiding the letter e as well
Gottlob Burmann (1737-1805) R-LESS POETRY. An obsessive dislike for the letter r; wrote 130 poems without using that letter, he also omitted the letter r from his daily conversation for 17 years…
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of CryptographyHistory of Cryptography
� Enigma (WW2)� Vernam Cipher
� 3DES� AES
Gilbert Vernam(AT&T) 1918
Claude Shannon of Bell Labs (ca. 1945) proved the one time pad guaranties perfect security as long as:
•The key is a truly random number•The key is as long as the message•The key is used only once
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah DES CrackerDES Cracker
This board is part of the EFF DES cracker, which contained over 1800 custom chips and could brute force a DES key in a matter of days.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Key DistributionKey Distribution
� Public Key Cryptosystem� RSA (Factoring)� Others:
� McEliece� ElGamal� ECC
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Modern CryptographyModern Cryptography
� Public-Key Cryptosystem (RSA, ECC)� Public Key Infrastructure� Authentication method� Diffie-Hellman key exchange� Session key created for symmetric
cryptography� Use AES or 3DES
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Diffie-HellmanDiffie-Hellman
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Diffie-HellmanDiffie-Hellman
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Diffie-HellmanDiffie-Hellman
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah
Copyright, 2000-2006 by NetIP, Inc. and Keith Palmgren, CISSP
Diffie-HellmanDiffie-Hellman
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Computational ComplexityComputational Complexity
nL
L2
INPUT SIZE
Exe
cutio
n T
ime
P
NP
EXP
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Quantum ComputerQuantum Computer
� Shor’s algorithm� Moore’s law
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Quantum CryptographyQuantum Cryptography
� In April 2004, the EU decided to spend €11 million developing secure communication based on quantum cryptography — the SECOQC project — a system that would theoretically be unbreakable by ECHELON or any other espionage system. European governments have been leery of ECHELON since a December 3, 1995 story in the Baltimore Sun claiming that aerospace company Airbus lost a $6Billion contract with Saudi Arabia in 1994 after the NSA reported that Airbus officials had been bribing Saudi officials to secure the contract.
Source: Wikipediahttp://news.bbc.co.uk/1/hi/world/europe/820758.stm
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Quantum CryptographyQuantum Cryptography
� Quantum Key Distribution� Bit = 0’s or 1’s� Qubit = 0’s, 1’s, or “0 and 1”.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah QubitQubit
Which path is taken?
BOTH
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah QubitQubit
What do you see?
measurement
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah QubitQubit
Ψ = +α β0 10 1
or
Ψ = + + ++ + + +
000 001 010 011
100 101 110 111
L qubits encode 2L numbers
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah
measuring polarisation states of photons
H
V
+45
-45
PBS (H/V) PBS (45/-45)
Heisenberg Uncertainty PrincipleHeisenberg Uncertainty Principle
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah BB84BB84
1 0 1 1 1 0 1 1 …
Key generation
+ + X + + + X X …
Base selection
V H -45 V V H -45 -45 …
Base selection
X + X + + X + X …Encoding
45 H -45 V V -45 H -45 …
0 0 1 1 1 0 0 1 …
Base discussionOver public channel
0 1 1 1 …
0 → H1 → V0 → 451 → -45
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah BB84BB84
No Cloning Theorem : It is not possible to copy an unknown quantum state with perfect fidelity.
Bound on copying fidelity is such that Eve will not succeed in tapping the channel even if using the best possible quantum copying machine.
Wootters and Zurek; Dieks 1982
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah BB84BB84
www.research.ibm.com/journal/rd/481/smolin.htm
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Entangled StateEntangled State
)(2
1)(
is
i
isHVeVH α−=Ψ −
Phys. Rev. Lett. 75, 4337-4341 (1995)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah EntanglementEntanglement
–“If, without in any way disturbing a system, we can predict with certainty… the value of a physical quantity, then there exists an element of physical reality corresponding to this physical quantity”
PERFECT EAVESDROPPING!
LOCAL REALISM
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Local RealismLocal Realism
� Local realism is refuted by quantum theory� Entangled photons do not have predetermined
values of polarization…� …so eavesdropper has nothing to measure� Quantum mechanics allows eavesdropper free
communication� Any post-quantum theory that refutes local
realism allows eavesdropper free communication.
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah Ekert 91Ekert 91
( )HVVH −=Ψ −
2
1)(
Perfect Security for error < 15%
( )454545452
1)( +−−−+=Ψ −
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah History of Q. CryptographyHistory of Q. Cryptography
C.H. Bennett & G. Brassard 1984
Prepare and Measure
Protocols
Entanglement Based
Protocols
A. Ekert 1991
S. Wiesner 1970
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah ExperimentsExperiments
� Alps (23.4 km)� Vienna
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah
10 Jan 2004Rise of the Quantum Island
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah GovernmentsGovernments
� US (US$ 100M = SG$ 166M)US Army, NSA, DARPA, NIST, etc
� Japan (SG$ 41.5M)ERATO, ICORP, PRESTO
� Europe (€ 15M = SG$ 30M)� Australia (AU$ 10M = SG$ 13M)� Singapore (SG$ 8M)
A*Star, DSTA, DSO
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah CommercialCommercial
� MagiQ (US)� BBN (US)� id-Quantique (Swiss)� QinetiQ (UK)� D-wave (Canada)� Elsag (Italy)� Fujitsu & Toshiba (UK + Japan) � Lockheed Martin (US)� Q-tool (Germany)
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah The FutureThe Future
� Hybrid System� Satellite� QKD network
Qua
ntum
Info
rmat
ion
Tec
hnol
ogy
Gro
up –
Qua
ntum
lah
Think like a physicists!