LLC ResearchPresentation

  • Upload
    fabien

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

  • 8/11/2019 LLC ResearchPresentation

    1/46

    1

    Quantum Spookinessand Your Database(s)

    Presentation by Lewis L Cawthorne

  • 8/11/2019 LLC ResearchPresentation

    2/46

    2

    QuantumMechanics

    1) Quantum mechanics is weird (weird==very non-intuitive)

    2) If I could leave it at that, I would... But we have some (FUN!) background to

    dive into

  • 8/11/2019 LLC ResearchPresentation

    3/46

    3

    Basis of Crypto

    1Heisenbergs Uncertainty Principle

    2 No-cloning Theorem

  • 8/11/2019 LLC ResearchPresentation

    4/46

    4

    Heisenberg Who?

  • 8/11/2019 LLC ResearchPresentation

    5/46

    5

    Heisenberg What?

    Uncertainty was apparent in the earliest mathematical equations ofquantum physics. Experiments confirmed that it was a feature of thephysical systems and not merely a trick of the math

    Uncertainty is a fact about nature inherent in all wave-like systems,and not merely an artifact of our limited measuring capabilities

    This and the Observer effect ensure that no one can measure aquantum system without disturbing it in a manner that other partiescan detect; which is awesome for cryptographic key distribution

  • 8/11/2019 LLC ResearchPresentation

    6/46

    6

    Schrdinger's Cat

    Image fromdantekgeek

    on Flickr

  • 8/11/2019 LLC ResearchPresentation

    7/467

    Super (position)kitty kitty kitty?

    http://www.informationphilosopher.com/solutions/experiments/schrodingerscat/

    | Cat > = ( 1/2) |Live > + ( 1/2) |Dead >

    http://www.informationphilosopher.com/solutions/experiments/schrodingerscat/http://www.informationphilosopher.com/solutions/experiments/schrodingerscat/
  • 8/11/2019 LLC ResearchPresentation

    8/468

    Superposition!

    A quantum particle exists partly in all of its theoretically possible states until wemeasure it. At that point, it takes on and remains in the state in which it wasmeasured.

    A cat state is an entangled system where your final measurement will result inall 0 or all 1 with a 50- 50 chance. Such a cat state with involving multiplequbits could be described as follows:

  • 8/11/2019 LLC ResearchPresentation

    9/469

    Qubits

  • 8/11/2019 LLC ResearchPresentation

    10/4610

    Bloch sphere

    More visually for|0>, |1> and

    standardcomplex

    coefficients, wehave all the

    possible states:

    A classic bitcould be though

    of as in the |0>or |1> state. Aqubit can beanywhere on

    the surface.

  • 8/11/2019 LLC ResearchPresentation

    11/4611

    The Superposition

    Pure State:

    Mixed State:We represent a mixed state as a 2x2 matrix

    A mixed state is a point inside the sphere

  • 8/11/2019 LLC ResearchPresentation

    12/4612

    Collapsing It

    One cannot completely determine an unknown quantum statewithout disturbing the quantum state

    Disturbing a quantum state irreversibly collapses the superposition Until you measure, the system can be thought of as a probability

    distribution

    After you measure, it is a pure value

  • 8/11/2019 LLC ResearchPresentation

    13/4613

    Hilbert Spaces

  • 8/11/2019 LLC ResearchPresentation

    14/4614

    Hilbert Info

    Putting things further into perspective with the earlier sphere.

    Pure states as rays in a Hilbert space Quantum physics is most commonly formulated in terms of linear algebra , as follows. Any given

    system is identified with some finite- or infinite-dimensional Hilbert space . The pure statescorrespond to vectors of norm 1. Thus the set of all pure states corresponds to the unit sphere inthe Hilbert space. -- straight out of the Wikipedia entry on quantum state(also why I dont have to worry about this stuff most of the time and can just play with matrices) (Note: I happen to like Wikipedias wording better than any of the three books I have in arms reach)

    https://en.wikipedia.org/wiki/Linear_algebrahttps://en.wikipedia.org/wiki/Hilbert_spacehttps://en.wikipedia.org/wiki/Norm_(mathematics)https://en.wikipedia.org/wiki/Unit_spherehttps://en.wikipedia.org/wiki/Unit_spherehttps://en.wikipedia.org/wiki/Norm_(mathematics)https://en.wikipedia.org/wiki/Hilbert_spacehttps://en.wikipedia.org/wiki/Linear_algebra
  • 8/11/2019 LLC ResearchPresentation

    15/4615

    Basis Selection

    Put simply, |0> and |1> with complex coefficients form an adequate basis forrepresentation of the three dimension space depicted by the Bloch sphere.

  • 8/11/2019 LLC ResearchPresentation

    16/4616

    No Cloning

    1) You cannot clone (make a copy of) a quantum state.

    2) Any attempt to copy a state will destroy the original state.

  • 8/11/2019 LLC ResearchPresentation

    17/4617

    Wow! What Else?

    Well, for todays topic we dont even need:

    1) Entanglement2) Quantum Teleportation

    3) Quantum Tunneling

    Although all three have their uses.Especially entanglement. Its the key to some cryptographic protocols and manyquantum algorithms. Entangled qubits are what make up a quantum register

  • 8/11/2019 LLC ResearchPresentation

    18/4618

    Why Do We Care?

    1) Quantum computers can properly simulate quantum systems

    2) Fourier Transforms

    3) Shredding many modern cryptographic techniquesBasically any based upon factoring or discrete log

    4) Faster search of unsorted data

    5) Quantum key distribution can occur without quantum computers!

  • 8/11/2019 LLC ResearchPresentation

    19/4619

    Cryptography

  • 8/11/2019 LLC ResearchPresentation

    20/4620

    QKD from Above

    http://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.html

    http://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.htmlhttp://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.html
  • 8/11/2019 LLC ResearchPresentation

    21/4621

    Better Picture

    A Multidisciplinary Introduction to Information Security, Stig Mjolsnes, Ch 5, November 9, 2011 by Chapman and Hall/CRC - 348 Pages

  • 8/11/2019 LLC ResearchPresentation

    22/4622

    Why QKD?

    Dr. Vadim Makarov cryptography is the only known method for transmitting a secretkey over distance that is secure in principle and based on the laws of physics. Currentmethods for communicating secret keys are all based on unproven mathematicalassumptions.-- Dr. Vadim Makarov

    http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762

    http://i.techrepublic.com.com/blogs/qkd4.jpghttp://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://m.techrepublic.com/blog/security/how-quantum-cryptography-works-and-by-the-way-its-breakable/7762http://i.techrepublic.com.com/blogs/qkd4.jpg
  • 8/11/2019 LLC ResearchPresentation

    23/4623

    Perfect? Crypto

    Quantum Cryptography, or more precisely Quantum Key Distribution (QKD), isbased upon the fundamental laws of quantum physics. Unlike factoring forwhich we have no known fast solutions but that could change tomorrow, forquantum cryptography to fall to direct attacks it would require a change in the

    laws of physics or at the very least prove that we have massively misunderstoodthem.

  • 8/11/2019 LLC ResearchPresentation

    24/4624

    Perfect? Haha..

    In theory there is no difference between theoryand practice. In practice there is.

    -- A fun quote often misattributed to whoever the attributersfavorite quotster might be...

    http://www.brainyquote.com/quotes/quotes/y/yogiberra141506.htmlhttp://www.brainyquote.com/quotes/quotes/y/yogiberra141506.htmlhttp://www.brainyquote.com/quotes/quotes/y/yogiberra141506.htmlhttp://www.brainyquote.com/quotes/quotes/y/yogiberra141506.html
  • 8/11/2019 LLC ResearchPresentation

    25/4625

    Modern Crypto IsSeldom the Breach

  • 8/11/2019 LLC ResearchPresentation

    26/4626

    Imperfect Devices

    Nothing is perfect. Most quantum cryptography today relies on photondetectors. The devices have been compromised by some rather ingenious side-channel attacks. It appears that it is possible to blind the devices, and whendone properly can cause them to not detect tampering. An interesting

    engineering hurdle to be overcome. Proof of concept fixes have already beendeveloped, and next generation devices should have other flaws (or hopefullynone) to contend with.

  • 8/11/2019 LLC ResearchPresentation

    27/4627

    Impractical

    Distance limitations really hamper it anyway. 60 km tops was the standard. Thearticle that led me to looking into this from the Homeland Security Wire had managedto up that to 90 km over shared optic lines concurrently transmitting other data (veryimpressive actually), but you could stick limited data in an armored briefcase and driveit that far. That is some awesome progress though, especially in lowering entry barriers via shared cable usage. Thats better but is it better enough to justify replacingexisting, more flexible systems.

  • 8/11/2019 LLC ResearchPresentation

    28/4628

    Weak Use Cases

    Ars Technica author Chris Lee summed it up beautifully:

    Quantum cryptography is one of those amazing tools that came along beforeanyone really asked for it. Somehow there are companies out there selling very

    high end, and "provably secure" cryptography gear, all based on fundamentalprinciples of quantum mechanics. Yet, despite being fundamentally unbreakable,there have been quite a few publications on more-or-less practical ways for Eveto eavesdrop on people whispering quantum sweet- nothings in darkened rooms.

    http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/

    http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/http://arstechnica.com/security/2012/09/quantum-cryptography-yesterday-today-and-tomorrow/
  • 8/11/2019 LLC ResearchPresentation

    29/4629

    Doesnt Matter

    Security is a chain; it's as strong as the weakest link. Mathematicalcryptography, as bad as it sometimes is, is the strongest link inmost security chains. Our symmetric and public-key algorithms are

    pretty good, even though they're not based on much rigorousmathematical theory. The real problems are elsewhere: computersecurity, network security, user interface and so on.-- Bruce Schneier

  • 8/11/2019 LLC ResearchPresentation

    30/4630

    But It Matters

    QKD is seeing use today in the financial market. Wall Street likes to trade a lotof secure info in a very geographically limited space. It could also have its uses(or already be used) in government facilities, especially those clustered aroundDC areas to send lots of info around securely.

    Currently available methods of QKD tend to involve both special (expensive)equipment and dedicated fiber optic lines for key distribution. You could morereasonably implement a share city-wide secure communication network forexample

  • 8/11/2019 LLC ResearchPresentation

    31/46

    31

    Major Changes?

    Quantum Computing

    Should we pass the hurdle of decoherence and get scalable systems, quantumcomputers will change certain things. From a non-scientist perspective, mainly

    by breaking many modern cryptographic systems.

    Of special interest in a database class though is how they can help search..

  • 8/11/2019 LLC ResearchPresentation

    32/46

    32

    Grovers Search

    We can normally average n/2 search of unsorteddata.

    Grover can do the same in sqrt(n).

    A definite improvement.Performance, performance, performance.

  • 8/11/2019 LLC ResearchPresentation

    33/46

    33

    Grovers Search

    Yes. Quadractic increase in search speed isnt as exciting as exponentialincrease in speed for factoring

    Yes. It requires a quantum computer

    Yes. Any speedup is still really awesome considering how much data is outthere and how unwieldy it can be keeping it sorted and to where you can locatewhat you need. (A fine reason for say, Google, to look into quantum computingshould it look as if it is about to become viable

  • 8/11/2019 LLC ResearchPresentation

    34/46

    34

    Grovers Search

    Not only was Grovers the first useful quantum search algorithm, its apparentlyas fast as we can expect (at least asymptotically) in the quantum computation

    model

  • 8/11/2019 LLC ResearchPresentation

    35/46

    35

    Grovers Search

    I could fill this slide up with equations, and the next, and the next. A fill a wholelecture explaining them. Just trust me that as far as we can tell, if we can get aquantum computer to run it on, we have a way to search unsorted records inO(sqrt(n))

  • 8/11/2019 LLC ResearchPresentation

    36/46

    36

    But...

    That if we get a quantum computer to run it on is quite the hold up

    We arent going to conquer decoherence, and we wont see scalable quantumcomputers. (Just a pessimistic guess on my part)

    Either way, theres more than enough reason for the engineers to continuetrying to build the things

  • 8/11/2019 LLC ResearchPresentation

    37/46

    37

    What Now?

    QKD exists. It is out there. Lets look at some examples!

  • 8/11/2019 LLC ResearchPresentation

    38/46

    38

    DARPA

    2003!?

    The DARPA Quantum Network In 2003, in collaboration with Boston University and Harvard

    University, Raytheon BBN Technologies deployed the world's firstquantum key distribution network in the metropolitan Boston areahttp://www.raytheon.com/newsroom/technology_today/2010_i1/ feature_9.html

    http://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.htmlhttp://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.htmlhttp://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.htmlhttp://www.raytheon.com/newsroom/technology_today/2010_i1/feature_9.html
  • 8/11/2019 LLC ResearchPresentation

    39/46

    39

    SECOQC

    http://www.secoqc.ne t/08.10.2008

    QKD Network Demonstration and conference

    The first live demonstration of a working quantum key distribution (QKD) network took place in Vienna on Oct 6, 2008 in the frameworkof the SECOQC Demonstration and International Conference . Eight QKD-links were combined in a novel quantum-back-bone network

    physically deployed within a typical metropolitan area network to connect different company sites from SIEMENS Austria. Typicalapplications for QKD, to secure data traffic from telephony and video conferencing, were included in the demonstration.

    Note: Project disbanded in 2010

    http://www.secoqc.net/http://www.secoqc.net/http://www.secoqc.net/
  • 8/11/2019 LLC ResearchPresentation

    40/46

    40

    ID Quantique

    ID Quantique (IDQ) markets the Cerberis quantum key distribution server devicewhich works to handle the key distribution needs of their Centauris AESsolution. It requires an optical fiber, but other than that just handles thenecessary key exchanges to make the encrypted communication happen.

    http://www.idquantique.com/index.php?option=com_content&view=article&id=52

    http://www.idquantique.com/index.php?option=com_content&view=article&id=52http://www.idquantique.com/index.php?option=com_content&view=article&id=52
  • 8/11/2019 LLC ResearchPresentation

    41/46

    41

    ID Quantique

    ID Quantique is based out of Geneva, Switzerland

    They tend to cater to government and banking sectors in Europe, and theirquantum offerings are billed as best for those seeking uncompromised security

    ID Quantiques Cerberis product was used to protect the ballots in the 2007Swiss elections

  • 8/11/2019 LLC ResearchPresentation

    42/46

    42

    ID Quantique

    QKD is a new technology and it exploits quantum physics. It is certainly complex to deploy and operate, isntit?

    No, QKD is not complex to deploy. It has reached a level of maturity such that it only takes a typicalnetwork engineer a few minutes to install a QKD system. Moreover it can be managed using standardnetwork administration tools.

    http://www.idquantique.com/component/content/article.html?id=105

  • 8/11/2019 LLC ResearchPresentation

    43/46

    43

    SwissQuantum

    SWISS QUANTUMIn January 2011 Swissquantum successfully completed the longest running project fortesting Quantum Key Distribution (QKD) in a field environment. The main goal of theSwissQuantum network, installed in the Geneva metropolitan area in March 2009, was tovalidate the reliability and robustness of QKD in continuous operation in a network over along time period in a field environment. The quantum layer ran stably for nearly 2 years,

    confirming the viability of QKD as a commercial encryption technology intelecommunication networks.

    http://swissquantum.idquantique.com

  • 8/11/2019 LLC ResearchPresentation

    44/46

    44

    Rumor Has It

    It is believed by some that a dedicated line for QKD connects the White Houseto the Pentagon, along with several links to military sites nearby.

    Keep in mind, it has also been rumored that as of 2000 that the government was

    all in on developing teleportation devices and had made progress.

  • 8/11/2019 LLC ResearchPresentation

    45/46

    45

    References1. Alternative schemes for measurement-device- independent quantum key distribution, Ma, Xiongfeng; Razavi, Mohsen.

    PHYSICAL REVIEW A (1050-2947). DEC 19 2012.Vol.86,Iss.62. http://www.wired.com/politics/security/commentary/securitymatters/2008/10/securitymatters_1016

    It may be Wired.com, but it is also Bruce Schneier3. Quantum cryptography conquers noise problem, Zeeya Merali

    ture doi:10.1038/nature.2012.118494. http://www.idquantiue.com /5. http://www.raytheon.com /6. https://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.html 7. A Brief History of Quantum Computing

    http://www.doc.ic.ac.uk/~nd/surprise_97/journal/vol4/spb3/

    http://www.wired.com/politics/security/commentary/securitymatters/2008/10/securitymatters_1016http://www.idquantiue.com/http://www.raytheon.com/https://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttp://www.doc.ic.ac.uk/~nd/surprise_97/journal/vol4/spb3/http://www.doc.ic.ac.uk/~nd/surprise_97/journal/vol4/spb3/https://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttps://www.networkworld.com/news/2007/101007-quantum-cryptography-secure-ballots.htmlhttp://www.raytheon.com/http://www.idquantiue.com/http://www.wired.com/politics/security/commentary/securitymatters/2008/10/securitymatters_1016
  • 8/11/2019 LLC ResearchPresentation

    46/46

    Questions?

    http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of- lasers /

    http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/http://gajitz.com/the-quantum-cat-is-out-of-the-bag-made-of-lasers/