Robert M. Slade
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

Quantum Computing : Security Implications PowerPoint PPT Presentation


  • 150 Views
  • Uploaded on
  • Presentation posted in: General

Robert M. Slade , MSc, CISSP [email protected], [email protected], [email protected] http://victoria.tc.ca/techrev/rms.htm. Quantum Computing : Security Implications. This isn't right. It isn't even wrong. - Wolfgang Pauli, on a paper submitted by a physicist colleague.

Download Presentation

Quantum Computing : Security Implications

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Quantum computing security implications

Robert M. Slade, MSc, CISSP

[email protected], [email protected], [email protected]

http://victoria.tc.ca/techrev/rms.htm

Quantum Computing: Security Implications


This isn t right it isn t even wrong wolfgang pauli on a paper submitted by a physicist colleague

This isn't right. It isn't even wrong.

- Wolfgang Pauli, on a paper submitted by a physicist colleague

Do we understand quantum computing?


Quantum introduction very small

Quantum introduction (very small)

  • Concepts

    • Superposition

    • Entanglement

      • observer effect

    • Qubit

  • “If someone says that he can think or talk about quantum physics without becoming dizzy, that shows only that he has not understood anything whatever about it.”

    • Niels Bohr


Quantum computing 1

Quantum Computing (1)

  • Quantum computer

    • quantum tech, traditional operation

    • smaller, faster

      • quantum size range

    • Turing

      • universal computer

      • irreversible computations


Quantum computing 2

Quantum Computing (2)

  • Quantum cryptography

    • photon polarization

      • angular polarization

      • detector angle

      • public exchange of angle but not value

    • photon entanglement

      • eavesdropping detection


Quantum computing 3

Quantum Computing (3)

  • Quantum computing

    • computing device or processor

    • analogue computer

      • not digital?


Analogue computers

Analogue Computers

  • Spaghetti computing

    • parallel sorting

    • special purpose/application

  • Slide rule

    • exact computation

      • imprecise reading

  • Adiabatic quantum computer

    • least energy = best answer

      • least path, best comparison, simulation

    • D-Wave Orion


Applications and implications

Applications and Implications

  • by domain

  • general functions

    • least path

      • Traveling Salesman Problem

      • scheduling, efficiency studies, multiple requirements

      • NP-complete, non-convergent, Ising model

    • simulation

      • climate models

    • pattern recognition

      • people are good, computers are bad

      • data reduction and representation


Security management

Security management

  • risk management (shortest path)

    • what if - cost vs benefit

  • information classification (pattern matching)

  • risk assessment required

    • investing, or not, in quantum computing


Security architecture

Security architecture

  • new architectures, new vulnerabilities

  • simulation of vulnerabilities and protections

  • quantum devices and noise

    • D-Wave Orion voting, error checking

  • quantum error correction (recent)

    • fault tolerant computing


Access control

Access control

  • biometrics (pattern matching)

  • information flow and covert channel analysis (least path/simulation)

  • intrusion detection (pattern matching)


Cryptography

Cryptography

  • quantum communications/encryption/key negotiation/eavesdropping detection

  • parallel decryption

  • new algorithms

    • tractable by neither classical nor quantum

  • quantum devices and generation of randomness

  • analysis of implementation problems (simulation)


Physical

Physical

  • noise, RFI/EMI interference

  • temperature

    • room temp 100x > interstellar space

    • interstellar space 1000x > Orion device

  • special costs, protections for devices

  • physical access control (biometrics)


Quantum computing security implications

BCP

  • Business Impact Analysis (least path)

  • testing of BC plans (simulation)

  • disaster management

    • direction of resources to maximum effect

  • continuity of operations for special devices

    • damage if power/cooling fails


Applications security

Applications security

  • testing (simulation)

  • database analysis (pattern matching)

    • cost (privacy) vs benefit (safety)

  • database aggregation problem analysis (pattern matching and simulation)

  • learning (pattern matching)

    • neural net augmented, check against neural net superstitious learning

  • check against expected

    • impossible to compute by classical methods

  • malware/botnet detection, (pattern matching)

    • operation/control/ownership

  • completely new paradigms in programming


Operations security

Operations security

  • combinations of classical and quantum devices and operations

    • complexity, troubleshooting

  • troubleshooting (simulation)

  • insider attack detection (pattern matching)


Telecommunications and networking

Telecommunications and networking

  • Intrusion Detection Systems

  • Botnet detection and assessment

    • Command & Control

    • ownership

    • “fast flux”

  • Network attack analysis

  • quantum encryption special channels

  • quantum devices likely remote access


Telecommunications and networking1

Telecommunications and networking

  • Spam

    • limitations even in Bayesian analysis


Telecommunications and networking2

Telecommunications and networking

  • quantum encryption requires special channels

  • quantum devices likely to be remote access


Law and investigation

Law and investigation

  • new forensic analysis tools (pattern matching/simulation)

  • presentation/acceptance in court problematic


Quantum computing security implications

Robert M. Slade, MSc, CISSP

[email protected], [email protected], [email protected]

http://victoria.tc.ca/techrev/rms.htm

Quantum Computing: Security Implications


  • Login