QUANTUM COMPUTING CRYPTOGRAPHY AT LSUphys.lsu.edu/~jdowling/talks/SURF09.pdf · QUANTUM...

Preview:

Citation preview

QUANTUM COMPUTING&

CRYPTOGRAPHY AT LSU

Jonathan P. Dowling

Quantum Science & Technologies GroupHearne Institute for Theoretical PhysicsDepartment of Physics and Astronomy

Louisiana State UniversityBaton Rouge, Louisiana 70803

http://quantum.phys.lsu.edu

PUBLIC KEY SECRET CODES ON THE INTERNET

These secret codes protect your credit card information!

MAKING PUBLIC KEY SECRET CODES

Making a Secret Code is as Easy as Multiplication: 15,485,863 • 32,452,843 = 502,560,280,658,509

BREAKING PUBLIC KEY SECRET CODES

Breaking a Secret Code is as Hard as Factoring: 502,560,280,658,509 =  15,485,863 • 32,452,843

FACTORING BIG NUMBERS IS VERY HARD!

If every particle in the Universe was a classicalcomputer running at full speed for the entire life ofthe Universe (about 12 billion years) that would bestill insufficient to factor a 2,000 digit number.

Your Credit Card Number Is Safe!

Or Is It???

Current Internet Encryption Uses 1,000 Digit Numbers.

CRACKING THE CODE: LIFE IMITATES ART

1992

Peter Shor, MIT

1994

Quantum Computer CanFactor a 2,000 Digit Number

In Less Than a Second!

HOW DOES A QUANTUM COMPUTER WORK?

3 1 4 1 5 9

A Car’s Odometer is Like aClassical Computer Register:It Shows Only One Six-Digit

Number at a Time.

0 0 0 0 0 0

A Quantum Odometer Can Store999,999 Six-Digit Numbers at One Time!

0 0 0 0 0 1

9 9 9 9 9 8

9 9 9 9 9 9

REALITY: National Institute of Standards and Technology

SMALL QUANTUM COMPUTER RUNS AN ATOMIC CLOCK

AT LSU WE DESIGN QUANTUM COMPUTER CHIPS

QUANTUM CRYPTOGRAPHY

When Quantum Computers Come Online What WillKeep Our Credit Cards Safe on the Internet?

Quantum Cryptography!

ONE-TIME PAD PRIVATE SECRET KEY SYSTEM

Secret Code Invented by G.S.Vernan — An Army TelegraphOfficer During the Civil War.

Proven Unbreakable byClaude Shannon at BellLabs in the 1940’s.

Unbreakable by Even AQuantum Computer!

ALICE SENDS A COPY OF THE KEY TO BOB

ALICE BOBEVE

Problem: Eavesdropper Can Always Make a Copy of the Pad!

ALICE SENDS A COPY OF THE KEY TO BOB

ALICE BOBEVE

Problem: Eavesdropper Can Always Make a Copy of the Pad!

EVE CAN’T COPY A QUANTUM PAD!

HOW DOES A QUANTUM CRYPTO WORK?

In Classical Fiber OpticsNetworks Eve Can Always Steala Little of the Light and Makea Copy of the Key.

EVE CAN’T COPY A QUANTUM PHOTONWITHOUT DESTROYING THE INFORMATION

YOU CAN BUY A QUANTUM CRYPTO SYSTEM!

THE QUANTUM INTERNET IS HERE!

Canary Islands

Boston

Switzerland

We could tell youwhat it is about.

But then, ofcourse, we wouldhave to kill you.

THE QUANTUM SKYNET IS HERE!

In 2008 — Austrian ScientistsTransmitted Single Photons to aJapanese Communications Satelliteand Back.

Americans Have a Similar Project —Which is TOP SECRET! The Goal isTo Provide SECRET CODES for USSpy Satellites.

LSU DESIGNS ROUTERS FOR THE QUANTUMINTERNET AND MODELS ATMOSPHERIC

TRANSMISSION FOR SKYNET

THE FUTURE IS CLOSER THAN YOU THINK!

QuantumLink

Quantum Link

Recommended