llc researchpresentation
TRANSCRIPT
-
8/11/2019 LLC ResearchPresentation
1/46
1
Quantum Spookinessand Your Database(s)
Presentation by Lewis L Cawthorne
-
8/11/2019 LLC ResearchPresentation
2/46
2
QuantumMechanics
1) Quantum mechanics is weird (weird==very non-intuitive)
2) If I could leave it at that, I would... But we have some (FUN!) background to
dive into
-
8/11/2019 LLC ResearchPresentation
3/46
3
Basis of Crypto
1Heisenbergs Uncertainty Principle
2 No-cloning Theorem
-
8/11/2019 LLC ResearchPresentation
4/46
4
Heisenberg Who?
-
8/11/2019 LLC ResearchPresentation
5/46
5
Heisenberg What?
Uncertainty was apparent in the earliest mathematical equations ofquantum physics. Experiments confirmed that it was a feature of thephysical systems and not merely a trick of the math
Uncertainty is a fact about nature inherent in all wave-like systems,and not merely an artifact of our limited measuring capabilities
This and the Observer effect ensure that no one can measure aquantum system without disturbing it in a manner that other partiescan detect; which is awesome for cryptographic key distribution
-
8/11/2019 LLC ResearchPresentation
6/46
6
Schrdinger's Cat
Image fromdantekgeek
on Flickr
-
8/11/2019 LLC ResearchPresentation
7/467
Super (position)kitty kitty kitty?
http://www.informationphilosopher.com/solutions/experiments/schrodingerscat/
| Cat > = ( 1/2) |Live > + ( 1/2) |Dead >
http://www.informationphilosopher.com/solutions/experiments/schrodingerscat/http://www.informationphilosopher.com/solutions/experiments/schrodingerscat/ -
8/11/2019 LLC ResearchPresentation
8/468
Superposition!
A quantum particle exists partly in all of its theoretically possible states until wemeasure it. At that point, it takes on and remains in the state in which it wasmeasured.
A cat state is an entangled system where your final measurement will result inall 0 or all 1 with a 50- 50 chance. Such a cat state with involving multiplequbits could be described as follows:
-
8/11/2019 LLC ResearchPresentation
9/469
Qubits
-
8/11/2019 LLC ResearchPresentation
10/4610
Bloch sphere
More visually for|0>, |1> and
standardcomplex
coefficients, wehave all the
possible states:
A classic bitcould be though
of as in the |0>or |1> state. Aqubit can beanywhere on
the surface.
-
8/11/2019 LLC ResearchPresentation
11/4611
The Superposition
Pure State:
Mixed State:We represent a mixed state as a 2x2 matrix
A mixed state is a point inside the sphere
-
8/11/2019 LLC ResearchPresentation
12/4612
Collapsing It
One cannot completely determine an unknown quantum statewithout disturbing the quantum state
Disturbing a quantum state irreversibly collapses the superposition Until you measure, the system can be thought of as a probability
distribution
After you measure, it is a pure value
-
8/11/2019 LLC ResearchPresentation
13/4613
Hilbert Spaces
-
8/11/2019 LLC ResearchPresentation
14/4614
Hilbert Info
Putting things further into perspective with the earlier sphere.
Pure states as rays in a Hilbert space Quantum physics is most commonly formulated in terms of linear algebra , as follows. Any given
system is identified with some finite- or infinite-dimensional Hilbert space . The pure statescorrespond to vectors of norm 1. Thus the set of all pure states corresponds to the unit sphere inthe Hilbert space. -- straight out of the Wikipedia entry on quantum state(also why I dont have to worry about this stuff most of the time and can just play with matrices) (Note: I happen to like Wikipedias wording better than any of the three books I have in arms reach)
https://en.wikipedia.org/wiki/Linear_algebrahttps://en.wikipedia.org/wiki/Hilbert_spacehttps://en.wikipedia.org/wiki/Norm_(mathematics)https://en.wikipedia.org/wiki/Unit_spherehttps://en.wikipedia.org/wiki/Unit_spherehttps://en.wikipedia.org/wiki/Norm_(mathematics)https://en.wikipedia.org/wiki/Hilbert_spacehttps://en.wikipedia.org/wiki/Linear_algebra -
8/11/2019 LLC ResearchPresentation
15/4615
Basis Selection
Put simply, |0> and |1> with complex coefficients form an adequate basis forrepresentation of the three dimension space depicted by the Bloch sphere.
-
8/11/2019 LLC ResearchPresentation
16/4616
No Cloning
1) You cannot clone (make a copy of) a quantum state.
2) Any attempt to copy a state will destroy the original state.
-
8/11/2019 LLC ResearchPresentation
17/4617
Wow! What Else?
Well, for todays topic we dont even need:
1) Entanglement2) Quantum Teleportation
3) Quantum Tunneling
Although all three have their uses.Especially entanglement. Its the key to some cryptographic protocols and manyquantum algorithms. Entangled qubits are what make up a quantum register
-
8/11/2019 LLC ResearchPresentation
18/4618
Why Do We Care?
1) Quantum computers can properly simulate quantum systems
2) Fourier Transforms
3) Shredding many modern cryptographic techniquesBasically any based upon factoring or discrete log
4) Faster search of unsorted data
5) Quantum key distribution can occur without quantum computers!
-
8/11/2019 LLC ResearchPresentation
19/4619
Cryptography
-
8/11/2019 LLC ResearchPresentation
20/4620
QKD from Above
http://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.html
http://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.htmlhttp://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.html -
8/11/2019 LLC ResearchPresentation
21/4621
Better Picture
A Multidisciplinary Introduction to Information Security, Stig Mjolsnes, Ch 5, November 9, 2011 by Chapman and Hall/CRC - 348 Pages
-
8/11/2019 LLC ResearchPresentation
22/4622
Why QKD?
Dr. Vadim Makarov cryptography is the only known method for transmitting a secretkey over distance that is secure in principle and based on the laws of physics. Currentmethods for communicating secret keys are all based on unproven mathematicalassumptions.-- Dr. Vadim Makarov
http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762
http://i.techrepublic.com.com/blogs/qkd4.jpghttp://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://i.techrepublic.com.com/blogs/qkd4.jpg -
8/11/2019 LLC ResearchPresentation
23/4623
Perfect? Crypto
Quantum Cryptography, or more precisely Quantum Key Distribution (QKD), isbased upon the fundamental laws of quantum physics. Unlike factoring forwhich we have no known fast solutions but that could change tomorrow, forquantum cryptography to fall to direct attacks it would require a change in the
laws of physics or at the very least prove that we have massively misunderstoodthem.
-
8/11/2019 LLC ResearchPresentation
24/4624
Perfect? Haha..
In theory there is no difference between theoryand practice. In practice there is.
-- A fun quote often misattributed to whoever the attributersfavorite quotster might be...
http://www.brainyquote.com/quotes/quotes/y/yogiberra141506.htmlhttp://www.brainyquote.com/quotes/quotes/y/yogiberra141506.htmlhttp://www.brainyquote.com/quotes/quotes/y/yogiberra141506.htmlhttp://www.brainyquote.com/quotes/quotes/y/yogiberra141506.html -
8/11/2019 LLC ResearchPresentation
25/4625
Modern Crypto IsSeldom the Breach
-
8/11/2019 LLC ResearchPresentation
26/4626
Imperfect Devices
Nothing is perfect. Most quantum cryptography today relies on photondetectors. The devices have been compromised by some rather ingenious side-channel attacks. It appears that it is possible to blind the devices, and whendone properly can cause them to not detect tampering. An interesting
engineering hurdle to be overcome. Proof of concept fixes have already beendeveloped, and next generation devices should have other flaws (or hopefullynone) to contend with.
-
8/11/2019 LLC ResearchPresentation
27/4627
Impractical
Distance limitations really hamper it anyway. 60 km tops was the standard. Thearticle that led me to looking into this from the Homeland Security Wire had managedto up that to 90 km over shared optic lines concurrently transmitting other data (veryimpressive actually), but you could stick limited data in an armored briefcase and driveit that far. That is some awesome progress though, especially in lowering entry barriers via shared cable usage. Thats better but is it better enough to justify replacingexisting, more flexible systems.
-
8/11/2019 LLC ResearchPresentation
28/4628
Weak Use Cases
Ars Technica author Chris Lee summed it up beautifully:
Quantum cryptography is one of those amazing tools that came along beforeanyone really asked for it. Somehow there are companies out there selling very
high end, and "provably secure" cryptography gear, all based on fundamentalprinciples of quantum mechanics. Yet, despite being fundamentally unbreakable,there have been quite a few publications on more-or-less practical ways for Eveto eavesdrop on people whispering quantum sweet- nothings in darkened rooms.
http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/
http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/ -
8/11/2019 LLC ResearchPresentation
29/4629
Doesnt Matter
Security is a chain; it's as strong as the weakest link. Mathematicalcryptography, as bad as it sometimes is, is the strongest link inmost security chains. Our symmetric and public-key algorithms are
pretty good, even though they're not based on much rigorousmathematical theory. The real problems are elsewhere: computersecurity, network security, user interface and so on.-- Bruce Schneier
-
8/11/2019 LLC ResearchPresentation
30/4630
But It Matters
QKD is seeing use today in the financial market. Wall Street likes to trade a lotof secure info in a very geographically limited space. It could also have its uses(or already be used) in government facilities, especially those clustered aroundDC areas to send lots of info around securely.
Currently available methods of QKD tend to involve both special (expensive)equipment and dedicated fiber optic lines for key distribution. You could morereasonably implement a share city-wide secure communication network forexample
-
8/11/2019 LLC ResearchPresentation
31/46
31
Major Changes?
Quantum Computing
Should we pass the hurdle of decoherence and get scalable systems, quantumcomputers will change certain things. From a non-scientist perspective, mainly
by breaking many modern cryptographic systems.
Of special interest in a database class though is how they can help search..
-
8/11/2019 LLC ResearchPresentation
32/46
32
Grovers Search
We can normally average n/2 search of unsorteddata.
Grover can do the same in sqrt(n).
A definite improvement.Performance, performance, performance.
-
8/11/2019 LLC ResearchPresentation
33/46
33
Grovers Search
Yes. Quadractic increase in search speed isnt as exciting as exponentialincrease in speed for factoring
Yes. It requires a quantum computer
Yes. Any speedup is still really awesome considering how much data is outthere and how unwieldy it can be keeping it sorted and to where you can locatewhat you need. (A fine reason for say, Google, to look into quantum computingshould it look as if it is about to become viable
-
8/11/2019 LLC ResearchPresentation
34/46
34
Grovers Search
Not only was Grovers the first useful quantum search algorithm, its apparentlyas fast as we can expect (at least asymptotically) in the quantum computation
model
-
8/11/2019 LLC ResearchPresentation
35/46
35
Grovers Search
I could fill this slide up with equations, and the next, and the next. A fill a wholelecture explaining them. Just trust me that as far as we can tell, if we can get aquantum computer to run it on, we have a way to search unsorted records inO(sqrt(n))
-
8/11/2019 LLC ResearchPresentation
36/46
36
But...
That if we get a quantum computer to run it on is quite the hold up
We arent going to conquer decoherence, and we wont see scalable quantumcomputers. (Just a pessimistic guess on my part)
Either way, theres more than enough reason for the engineers to continuetrying to build the things
-
8/11/2019 LLC ResearchPresentation
37/46
37
What Now?
QKD exists. It is out there. Lets look at some examples!
-
8/11/2019 LLC ResearchPresentation
38/46
38
DARPA
2003!?
The DARPA Quantum Network In 2003, in collaboration with Boston University and Harvard
University, Raytheon BBN Technologies deployed the world's firstquantum key distribution network in the metropolitan Boston areahttp://www.raytheon.com/newsroom/technology_today/2010_i1/ feature_9.html
http://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.htmlhttp://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.htmlhttp://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.htmlhttp://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.html -
8/11/2019 LLC ResearchPresentation
39/46
39
SECOQC
http://www.secoqc.ne t/08.10.2008
QKD Network Demonstration and conference
The first live demonstration of a working quantum key distribution (QKD) network took place in Vienna on Oct 6, 2008 in the frameworkof the SECOQC Demonstration and International Conference . Eight QKD-links were combined in a novel quantum-back-bone network
physically deployed within a typical metropolitan area network to connect different company sites from SIEMENS Austria. Typicalapplications for QKD, to secure data traffic from telephony and video conferencing, were included in the demonstration.
Note: Project disbanded in 2010
http://www.secoqc.net/http://www.secoqc.net/http://www.secoqc.net/ -
8/11/2019 LLC ResearchPresentation
40/46
40
ID Quantique
ID Quantique (IDQ) markets the Cerberis quantum key distribution server devicewhich works to handle the key distribution needs of their Centauris AESsolution. It requires an optical fiber, but other than that just handles thenecessary key exchanges to make the encrypted communication happen.
http://www.idquantique.com/index.php?option=com_content&view=article&id=52
http://www.idquantique.com/index.php?option=com_content&view=article&id=52http://www.idquantique.com/index.php?option=com_content&view=article&id=52 -
8/11/2019 LLC ResearchPresentation
41/46
41
ID Quantique
ID Quantique is based out of Geneva, Switzerland
They tend to cater to government and banking sectors in Europe, and theirquantum offerings are billed as best for those seeking uncompromised security
ID Quantiques Cerberis product was used to protect the ballots in the 2007Swiss elections
-
8/11/2019 LLC ResearchPresentation
42/46
42
ID Quantique
QKD is a new technology and it exploits quantum physics. It is certainly complex to deploy and operate, isntit?
No, QKD is not complex to deploy. It has reached a level of maturity such that it only takes a typicalnetwork engineer a few minutes to install a QKD system. Moreover it can be managed using standardnetwork administration tools.
http://www.idquantique.com/component/content/article.html?id=105
-
8/11/2019 LLC ResearchPresentation
43/46
43
SwissQuantum
SWISS QUANTUMIn January 2011 Swissquantum successfully completed the longest running project fortesting Quantum Key Distribution (QKD) in a field environment. The main goal of theSwissQuantum network, installed in the Geneva metropolitan area in March 2009, was tovalidate the reliability and robustness of QKD in continuous operation in a network over along time period in a field environment. The quantum layer ran stably for nearly 2 years,
confirming the viability of QKD as a commercial encryption technology intelecommunication networks.
http://swissquantum.idquantique.com
-
8/11/2019 LLC ResearchPresentation
44/46
44
Rumor Has It
It is believed by some that a dedicated line for QKD connects the White Houseto the Pentagon, along with several links to military sites nearby.
Keep in mind, it has also been rumored that as of 2000 that the government was
all in on developing teleportation devices and had made progress.
-
8/11/2019 LLC ResearchPresentation
45/46
45
References1. Alternative schemes for measurement-device- independent quantum key distribution, Ma, Xiongfeng; Razavi, Mohsen.
PHYSICAL REVIEW A (1050-2947). DEC 19 2012.Vol.86,Iss.62. http://www.wired.com/politics/security/commentary/securitymatters/2008/10/securitymatters_1016
It may be Wired.com, but it is also Bruce Schneier3. Quantum cryptography conquers noise problem, Zeeya Merali
ture doi:10.1038/nature.2012.118494. http://www.idquantiue.com /5. http://www.raytheon.com /6. https://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.html 7. A Brief History of Quantum Computing
http://www.doc.ic.ac.uk/~nd/surprise_97/journal/vol4/spb3/
http://www.wired.com/politics/security/commentary/securitymatters/2008/10/securitymatters_1016http://www.idquantiue.com/http://www.raytheon.com/https://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttp://www.doc.ic.ac.uk/~nd/surprise_97/journal/vol4/spb3/http://www.doc.ic.ac.uk/~nd/surprise_97/journal/vol4/spb3/https://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttp://www.raytheon.com/http://www.idquantiue.com/http://www.wired.com/politics/security/commentary/securitymatters/2008/10/securitymatters_1016 -
8/11/2019 LLC ResearchPresentation
46/46
Questions?
http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of- lasers /
http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/