quantum security - cysecure.orgcysecure.org/.../indiproject/indi18nealeshragoodial_quan…  · web...

21

Click here to load reader

Upload: truongngoc

Post on 04-Sep-2018

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Quantum Security

Nealesh Ragoodial

Security Capstone

Page 2: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

ContentsAbstract:....................................................................................................................2

Introduction...............................................................................................................2

What is Quantum?.....................................................................................................3

Quantum Cryptography.............................................................................................5

Why do we need Quantum?......................................................................................6

The Problem..............................................................................................................9

Solution....................................................................................................................10

Conclusion...............................................................................................................12

References...............................................................................................................13

1

Page 3: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

Abstract

Quantum Computing is not that of fiction and sci-fi. It is a topic that will become more

and more discussed as time goes by. With regards to speed, Quantum Computing has a lot of

perks to it, more pros than cons in all honesty. However, in discussion of cons, there are some

fallbacks when it come to the use of quantum computers. The most obvious of drawbacks is that

we as a society do not have the necessary technology to create a quantum computer, this

however is not the biggest problem. The biggest problem is within the security itself. By theory,

a quantum computer can decode an encryption within half the time of a normal digital computer.

With supremacy like that how can other businesses or even countries defend against a quantum

attack? Luckily something called post-quantum cryptography has a solution to this concern.

Keywords: Cryptography, post-quantum, quantum computing

Introduction

Quantum Computing is both theoretical and a topic that will be seen within the upcoming

years. But what is quantum computing exactly? To put it simple, it is a computer that has the

capability to completely translate the full motion of electrons into computing power. By doing

so, you exceed traditional computers by a noticeable amount. This type of advancement will not

only affect the processing powers of computers but it will change the way encryption and

decryption is looked upon. Once quantum is widespread and normal among the market, the way

we look at security will be changed. New rules will have to be established and different

procedures will need to be in place to account for the new technology.

2

Page 4: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

Although there is a lot of perks to quantum computing, with every new technologic

advancement there has to be some downsides to it. The main downside is how one will be able to

develop such a thing. Understanding how it works is one progress but actually developing it is a

whole different story. The technology we have right now as a society cannot develop computers

with quantum capabilities just as yet. However, that does not mean it is impossible or it will

never happen. Just as a broad representation, adapting to quantum computing itself is a hurdle as

well. If and when quantum technology becomes available, advanced encryptions we know today

will take only days to break. Quantum computing is inevitable in our future, but what is it and

how exactly will it push us forward.

What is Quantum?

To understand how quantum computing works, we must understand how a classical

digital computer works. A classical computer is based off molecules, an electron is an example.

When that particular molecule jumps up, that is equal to one. When that molecule jumps down

that is equal zero. This is the simplest of ways is how we get ones and zeros, also known as

binary which is the language of computers. However, Molecules do now just move up and down.

They go left, right, forward, back, in all axis of x, y and z. If only there was a way to translate

this into a computer language. This is where quantum computing comes into play.

3

Page 5: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

Classical computers are based on bits of data. Quantum runs on quantum bits also known

qubits. “Quantum computers, on the other hand, are based on qubits, which operate according to

two key principles of quantum physics: superposition and entanglement. Superposition means

that each qubit can represent both a 1 and a 0 at the same time. Entanglement means that qubits

in a superposition can be correlated with each other; that is, the state of one (whether it is a 1 or a

0) can depend on the state of another”1. How can superposition and entanglement help with

computing? A classical computer uses transistors to perform jobs. They are the building blocks

of the CPU and create the binary code used by the computer to communicate. As of 2016, the

largest commercially available processor uses 7.2 billion transistors. Now let’s compare that to

qubits. With one quantum bit you are in two possible states at the same time. With another you

can be in four possible states at the same time. “With every added quantum bit, you double the

computing computational power. With a 30-qubit quantum computer you will faster than the

world’s most powerful supercomputer that ever existed and with 300 qubits that would be more

powerful than all of the computer in the world connected together”2. 300 qubits compared to 7.2

billion transistors. That is the difference.

1 https://www.research.ibm.com/ibm-q/learn/what-is-quantum-computing/2 https://www.youtube.com/watch?v=cugu4iW4W54

4

Page 6: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

Quantum Cryptography

There are tons of cryptographic algorithms out there. Just to name a few, there is AES,

MD5, SHA and RSA. Every algorithm is more complex and harder to decrypt than the other.

Recently, the most popular ones are AES and RSA. You cannot have a quantum computer

without discussing quantum cryptography. This would be an algorithm used to break modern day

encryptions with ease. “The Quantum Key Distribution (QKD) is a set of protocols, systems and

procedures by which is possible to create and distribute Secret Keys”3. Unlike other algorithms it

is not used to encrypt and protect information or transfer encrypted data, and is not used to store

data in a secure manner. Instead, “QKD can be used to generate and distribute secret keys which

can then be used together with classical algorithms and protocols to encrypt and transfer in a

secure way information (data) between two distant correspondents”4.

To understand how exactly quantum encryption is completed, one must first understand

how classical encryption works. With a modern-day computer, you will need a random number

of proper length. This random number is usually supplied by a pseudo random generator. This

generator is a program that generates a sequence of numbers until it deems the numbers are

completely random. On a modern computer it is impossible to completely generate a random

number, so this program has to be used. Encryption today uses public and private keys. Public to

encrypt and the private to decrypt the data. To use algorithms to encrypt large amount of data, it

is usually slow and very resource heavy.

Quantum Encryption works a little bit different however. The Quantum key distribution

relies on photons, which are the smallest particles compressed by light. It is usually transferred

3 http://www.ucci.it/docs/QC-Pros+Cons-0.4.pdf4 http://www.ucci.it/docs/QC-Pros+Cons-0.4.pdf

5

Page 7: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

through an optical fiber cable. If an individual wanted to send a message using a secret key, the

two devices would be exchanging photons through this cable. Once connected, the two devices

trying to talk, would create a key in a sequence of zero and one which would be completely

random. By doing this it not only allows but it guarantees that this key cannot be copied or

intercepted. This type of encryption is highly secure but extremely expensive.

Why do we need Quantum?

In the past 20-30 years computers have been getting faster and smaller by the year. The

number at which technology is growing was increasing exponentially. However, recently this

number has slowed down. Moor’s law dictates that the number of transistors per square inch on

integrated circuits would double every year since the integrated circuit was invented. In lament

terms, the size and processing speed of computers would double every year. Which has been true

throughout the years. According to theoretical physicist Michio Kaku, “"In about ten years or so,

we will see the collapse of Moore's law. In fact, we see a slowing down of Moore's law.

Computer power simply cannot maintain its rapid exponential rise using standard silicon

technology". Intel Corporation has admitted this. Kaku says that when Moore's law finally

collapses by the end of the next decade, we will simply tweak it a bit with chip-like computers in

three dimensions. He then says "we may have to go to molecular computers and perhaps late in

the 21st century quantum computers"5.

5 http://www.umsl.edu/~siegelj/information_theory/projects/Bajramovic/www.umsl.edu/_abdcf/Cs4890/link1.html

6

Page 8: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

We go from a classical age of computing to the quantum age. But what perks does

quantum computation have in stored for us? Why is it important to research and develop such a

technology? The major role quantum computers would be to factor extremely large number

easily. For example, the traveling salesman problem. If have a salesman who wants to travel to

multiple cities, you would want to calculate the fastest and the number of possible routes he or

she can take. If you have to go to 14 cities, there are already 10 to the power of 11 possible roots

that the salesperson can take. If you take a classical computer running at 10 to the 9th operations

per second, it can work out the solution in about 100 seconds. If you were to increase the number

to 22 cities there are 10 to the 19th possible roots. With that same computer it would take about

1600 years to find a solution. It is hard to believe but this is the problem classical computers run

into. Solving hard mathematical problems are important when it comes to quantum computers.

These mathematical computations would be used for predictions and to more into

chemistry. Regarding predictions, having a quantum computer we can accurately calculate

intense weather patterns therefore reducing weather-related deaths. We can also predict the

location of distant planets by analyzing all the data collected from telescopes simultaneously. In

7

Page 9: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

regards to chemistry, we can collect more relatable and useful data for human civilization.

According to Dr. Kaku, a theoretic physicist, “Chemistry is built on quantum mechanics: the

mechanics of atoms and atomic physics. But we do not know how to model them — they are too

complicated. For example, photosynthesis. If this sounds too esoteric, perhaps something

relatable will make you appreciate quantum computing more — Alzheimer’s disease. Currently,

no computer is powerful enough to model the elements or processes that cause people to develop

Alzheimer’s disease What I’m talking about is doing chemistry from the first principle.

Chemistry reduced to software, so we don’t have to play with thousands of different kinds of

antibiotics, thousands of different kinds of plastics, thousands of different kinds of chemicals.

We can do it using software on a quantum computer”6.

Of course, quantum computing has tons of perks within the biological realm, but it also

has its take on security. Breaking modern day security encryptions become relatively easy and

quick. One can break an encryption within days compared to years. This is where the problem

arises

The Problem

With every ground-breaking piece of technology, there are always some downfalls. In

this case it’s not much of a downfall but more as preparation. As explained, the potential of

quantum computing is almost limitless. From advances in chemical research to advancements in

interstellar research, there seems to be nothing but positives coming through from this

6 https://e27.co/quantum-computing-help-us-tackle-alzheimers-disease-michio-kaku-20171108/

8

Page 10: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

development. The secrets to all this knowledge can be revealed, but so can that of hidden

information from you as an individual. Or even more drastic, that of a nation. From financial

information to classified government intelligence, under the modern-day encryption algorithms,

nothing is protected.

Here is a scenario. It is a few years down into the future and quantum computing is now

that of reality. Similar to the Space Race from 1957 – 1975, major countries are pushing to

develop quantum devices. A country that is first to develop this technology will not only have

renown but also be considered a supreme power. “The impact of quantum on our national

defense will be tremendous. The question is whether the United States and its allies will be

ready”7. Let’s say that Russia, for example, accomplished quantum computing before the United

States and its allies, military information and classified government documents will be breached

and therefore open to the public. People have seen the damage one hacker can do to a

corporation. How about a country intercepting encrypted files from across the world? Definitely

frightening to think about but sadly, this may be our reality. “From academics to the National

Security Agency, there is widespread agreement that quantum computers will rock current

security protocols that protect global financial markets and the inner workings of government”8.

Solution

With quantum computing so advanced and so powerful how could anyone protect or

prepare against such an advancement? “It is now clear that current Internet security measures and

the cryptography behind them will not withstand the new computational capabilities that

7 https://www.wired.com/story/quantum-computing-is-the-next-big-security-risk/8 https://www.wired.com/story/quantum-computing-is-the-next-big-security-risk/

9

Page 11: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

quantum computers will bring,”9. There happens to be one and it is within the realm of

cryptography.

The main reason why quantum computers are so powerful is because of where they gain

power. A quantum computer, again, can read the full motion of electron and their superposition.

One way to combat a quantum attack is to use quantum in defense. Using the quantum key

distribution algorithm, one can prepare oneself for a quantum attack. As explained earlier a QKD

uses photons to transfer data between two endpoints. Using Quantum Mechanics, the two

connected devices generate and exchange single photons. By doing this the secret key as a

sequence in zero and one is completely random and having it random is the key to beating the

attack. Also having it done in this manner makes sure that no one can intercept or copy the key.

This is superior to network communication which happens to be the weakest point in security.

QKD is highly expensive though and usually needed in a military grade system. We can hope by

the time quantum computers are established the price of such a system would decrease and

extensive research on QKD would be completed.

After further research there is one other way to protect or even stop a quantum attack.

This happens to be a special code known as the Generalized Knapsack Code. Quantum

computers operate on the subatomic level so theoretically one would need to devise a solution

that can go way beyond conventional computers. Developed by Nathan Hamlin, the Generalized

Knapsack Code works by disguising data with number strings more complex than the zero and

one’s modern computers use to operate. The knapsack code offers a viable security method for

defending against quantum computer attacks. "The Generalized Knapsack Code expands upon

the binary representations today's computers use to operate by using a variety of representations

9 https://www.wired.com/2015/09/tricky-encryption-stump-quantum-computers/

10

Page 12: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

other than 0s and 1," Hamlin said. "This lets it block a greater array of cyberattacks, including

those using basis reduction, one of the decoding methods used to break the original knapsack

code”10.

These two techniques are just some of ideas that can protect us from a full-on quantum

attack. The best practice would be to use both QKD and the Generalized Knapsack Code in

parallel as protection. It is recommended in the Quantum Key Distribution that more than one

layer of protection should be used. This layered protection is nothing new. We have this today

and with the upcoming quantum computers showing up we need to keep old habits but develop

stronger tools.

Conclusion

Quantum computers is not that of science fiction. This is a blessing and a curse that will

be arriving within the next twenty to thirty years. Definitely within our lifetimes, we will see this

advancement. These computers use quantum mechanics to function and in doing so establish

speed and security. We are coming to a point in human civilization where problems are

becoming harder to solve and the exponential rise of computers have slowed down drastically.

These hard problems will propel us to answer the harder questions and create advancements that

will benefit human civilization for the better. Quantum computing is that answer, however, we

must not take new technology lightly. Every positive advancement can be misused. This is why

the proper security must be set into place to prevent for example, data breaches and nationwide

10 https://www.sciencedaily.com/releases/2017/02/170228185341.htm

11

Page 13: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

panic from occurring. Quantum computing is a topic that must not be taken lightly and with it

there must be path where Quantum Security is not only needed but required.

References

“Mathematician breaks down how to defend against quantum computing attacks.” ScienceDaily,

ScienceDaily, 28 Feb. 2017, www.sciencedaily.com/releases/2017/02/170228185341.htm.

“Disadvantages.” Quantum Computing: The Future Computers, 4 Dec. 2013,

danielsharlow.wordpress.com/disadvantages/.

“Exponential Growth In Linear Time: The End Of Moore's Law.” Hackaday, 29 Apr. 2016,

hackaday.com/2015/09/09/exponential-growth-in-linear-time-the-end-of-moores-law/.

Hurd, Will. “Rep. Will Hurd of Texas Argues that Quantum Computing Is the Next Big Security

Risk.” Wired, Conde Nast, 6 Dec. 2017, www.wired.com/story/quantum-computing-is-the-next-

big-security-risk/.

12

Page 14: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

“Moore's Law.” University of Missouri-St. Louis,

www.umsl.edu/~siegelj/information_theory/projects/Bajramovic/www.umsl.edu/_abdcf/

Cs4890/link1.html.

Publishing, Scientific Research. “Number in Mathematical Cryptography.” Open Journal of

Discrete Mathematics, Scientific Research Publishing, 23 Jan. 2017, file.scirp.org/Html/3-

1200310_73743.htm.

TEDxTalks. “Quantum computation | Michelle Simmons | TEDxSydney.” YouTube, YouTube, 22

June 2012, www.youtube.com/watch?v=cugu4iW4W54.

“Quantum computing 101.” Institute for Quantum Computing, 11 Nov. 2013, uwaterloo.ca/institute-

for-quantum-computing/quantum-computing-101.

“Quantum computing could help us tackle Alzheimer's disease: Dr Michio Kaku.” e27,

e27.co/quantum-computing-help-us-tackle-alzheimers-disease-michio-kaku-20171108/.

“Quantum computing: John Prekill.”

http://www.theory.caltech.edu/~preskill/pubs/preskill-1998-pro-con.pdf

“Quantum Cryptography Pros & Cons: Andrea Pasquinucci.”

http://www.ucci.it/docs/QC-Pros+Cons-0.4.pdf

Skuse, Benjamin. “The trouble with quantum computing.” RSS, 8 Nov. 2016,

eandt.theiet.org/content/articles/2016/11/the-trouble-with-quantum-computing/.

Wolchover, Natalie. “The Tricky Encryption That Could Stump Quantum Computers.” Wired,

Conde Nast, 29 June 2017, www.wired.com/2015/09/tricky-encryption-stump-quantum-

computers/.

13

Page 15: Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan…  · Web viewWith a 30-qubit quantum computer you will faster than the world’s most

Nealesh Ragoodial Quantum Security

14