Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan… · Web...
Click here to load reader
-
Upload
truongngoc -
Category
Documents
-
view
212 -
download
0
Transcript of Quantum Security - cysecure.orgcysecure.org/.../indiProject/indi18nealeshRagoodial_Quan… · Web...
Quantum Security
Nealesh Ragoodial
Security Capstone
Nealesh Ragoodial Quantum Security
ContentsAbstract:....................................................................................................................2
Introduction...............................................................................................................2
What is Quantum?.....................................................................................................3
Quantum Cryptography.............................................................................................5
Why do we need Quantum?......................................................................................6
The Problem..............................................................................................................9
Solution....................................................................................................................10
Conclusion...............................................................................................................12
References...............................................................................................................13
1
Nealesh Ragoodial Quantum Security
Abstract
Quantum Computing is not that of fiction and sci-fi. It is a topic that will become more
and more discussed as time goes by. With regards to speed, Quantum Computing has a lot of
perks to it, more pros than cons in all honesty. However, in discussion of cons, there are some
fallbacks when it come to the use of quantum computers. The most obvious of drawbacks is that
we as a society do not have the necessary technology to create a quantum computer, this
however is not the biggest problem. The biggest problem is within the security itself. By theory,
a quantum computer can decode an encryption within half the time of a normal digital computer.
With supremacy like that how can other businesses or even countries defend against a quantum
attack? Luckily something called post-quantum cryptography has a solution to this concern.
Keywords: Cryptography, post-quantum, quantum computing
Introduction
Quantum Computing is both theoretical and a topic that will be seen within the upcoming
years. But what is quantum computing exactly? To put it simple, it is a computer that has the
capability to completely translate the full motion of electrons into computing power. By doing
so, you exceed traditional computers by a noticeable amount. This type of advancement will not
only affect the processing powers of computers but it will change the way encryption and
decryption is looked upon. Once quantum is widespread and normal among the market, the way
we look at security will be changed. New rules will have to be established and different
procedures will need to be in place to account for the new technology.
2
Nealesh Ragoodial Quantum Security
Although there is a lot of perks to quantum computing, with every new technologic
advancement there has to be some downsides to it. The main downside is how one will be able to
develop such a thing. Understanding how it works is one progress but actually developing it is a
whole different story. The technology we have right now as a society cannot develop computers
with quantum capabilities just as yet. However, that does not mean it is impossible or it will
never happen. Just as a broad representation, adapting to quantum computing itself is a hurdle as
well. If and when quantum technology becomes available, advanced encryptions we know today
will take only days to break. Quantum computing is inevitable in our future, but what is it and
how exactly will it push us forward.
What is Quantum?
To understand how quantum computing works, we must understand how a classical
digital computer works. A classical computer is based off molecules, an electron is an example.
When that particular molecule jumps up, that is equal to one. When that molecule jumps down
that is equal zero. This is the simplest of ways is how we get ones and zeros, also known as
binary which is the language of computers. However, Molecules do now just move up and down.
They go left, right, forward, back, in all axis of x, y and z. If only there was a way to translate
this into a computer language. This is where quantum computing comes into play.
3
Nealesh Ragoodial Quantum Security
Classical computers are based on bits of data. Quantum runs on quantum bits also known
qubits. “Quantum computers, on the other hand, are based on qubits, which operate according to
two key principles of quantum physics: superposition and entanglement. Superposition means
that each qubit can represent both a 1 and a 0 at the same time. Entanglement means that qubits
in a superposition can be correlated with each other; that is, the state of one (whether it is a 1 or a
0) can depend on the state of another”1. How can superposition and entanglement help with
computing? A classical computer uses transistors to perform jobs. They are the building blocks
of the CPU and create the binary code used by the computer to communicate. As of 2016, the
largest commercially available processor uses 7.2 billion transistors. Now let’s compare that to
qubits. With one quantum bit you are in two possible states at the same time. With another you
can be in four possible states at the same time. “With every added quantum bit, you double the
computing computational power. With a 30-qubit quantum computer you will faster than the
world’s most powerful supercomputer that ever existed and with 300 qubits that would be more
powerful than all of the computer in the world connected together”2. 300 qubits compared to 7.2
billion transistors. That is the difference.
1 https://www.research.ibm.com/ibm-q/learn/what-is-quantum-computing/2 https://www.youtube.com/watch?v=cugu4iW4W54
4
Nealesh Ragoodial Quantum Security
Quantum Cryptography
There are tons of cryptographic algorithms out there. Just to name a few, there is AES,
MD5, SHA and RSA. Every algorithm is more complex and harder to decrypt than the other.
Recently, the most popular ones are AES and RSA. You cannot have a quantum computer
without discussing quantum cryptography. This would be an algorithm used to break modern day
encryptions with ease. “The Quantum Key Distribution (QKD) is a set of protocols, systems and
procedures by which is possible to create and distribute Secret Keys”3. Unlike other algorithms it
is not used to encrypt and protect information or transfer encrypted data, and is not used to store
data in a secure manner. Instead, “QKD can be used to generate and distribute secret keys which
can then be used together with classical algorithms and protocols to encrypt and transfer in a
secure way information (data) between two distant correspondents”4.
To understand how exactly quantum encryption is completed, one must first understand
how classical encryption works. With a modern-day computer, you will need a random number
of proper length. This random number is usually supplied by a pseudo random generator. This
generator is a program that generates a sequence of numbers until it deems the numbers are
completely random. On a modern computer it is impossible to completely generate a random
number, so this program has to be used. Encryption today uses public and private keys. Public to
encrypt and the private to decrypt the data. To use algorithms to encrypt large amount of data, it
is usually slow and very resource heavy.
Quantum Encryption works a little bit different however. The Quantum key distribution
relies on photons, which are the smallest particles compressed by light. It is usually transferred
3 http://www.ucci.it/docs/QC-Pros+Cons-0.4.pdf4 http://www.ucci.it/docs/QC-Pros+Cons-0.4.pdf
5
Nealesh Ragoodial Quantum Security
through an optical fiber cable. If an individual wanted to send a message using a secret key, the
two devices would be exchanging photons through this cable. Once connected, the two devices
trying to talk, would create a key in a sequence of zero and one which would be completely
random. By doing this it not only allows but it guarantees that this key cannot be copied or
intercepted. This type of encryption is highly secure but extremely expensive.
Why do we need Quantum?
In the past 20-30 years computers have been getting faster and smaller by the year. The
number at which technology is growing was increasing exponentially. However, recently this
number has slowed down. Moor’s law dictates that the number of transistors per square inch on
integrated circuits would double every year since the integrated circuit was invented. In lament
terms, the size and processing speed of computers would double every year. Which has been true
throughout the years. According to theoretical physicist Michio Kaku, “"In about ten years or so,
we will see the collapse of Moore's law. In fact, we see a slowing down of Moore's law.
Computer power simply cannot maintain its rapid exponential rise using standard silicon
technology". Intel Corporation has admitted this. Kaku says that when Moore's law finally
collapses by the end of the next decade, we will simply tweak it a bit with chip-like computers in
three dimensions. He then says "we may have to go to molecular computers and perhaps late in
the 21st century quantum computers"5.
5 http://www.umsl.edu/~siegelj/information_theory/projects/Bajramovic/www.umsl.edu/_abdcf/Cs4890/link1.html
6
Nealesh Ragoodial Quantum Security
We go from a classical age of computing to the quantum age. But what perks does
quantum computation have in stored for us? Why is it important to research and develop such a
technology? The major role quantum computers would be to factor extremely large number
easily. For example, the traveling salesman problem. If have a salesman who wants to travel to
multiple cities, you would want to calculate the fastest and the number of possible routes he or
she can take. If you have to go to 14 cities, there are already 10 to the power of 11 possible roots
that the salesperson can take. If you take a classical computer running at 10 to the 9th operations
per second, it can work out the solution in about 100 seconds. If you were to increase the number
to 22 cities there are 10 to the 19th possible roots. With that same computer it would take about
1600 years to find a solution. It is hard to believe but this is the problem classical computers run
into. Solving hard mathematical problems are important when it comes to quantum computers.
These mathematical computations would be used for predictions and to more into
chemistry. Regarding predictions, having a quantum computer we can accurately calculate
intense weather patterns therefore reducing weather-related deaths. We can also predict the
location of distant planets by analyzing all the data collected from telescopes simultaneously. In
7
Nealesh Ragoodial Quantum Security
regards to chemistry, we can collect more relatable and useful data for human civilization.
According to Dr. Kaku, a theoretic physicist, “Chemistry is built on quantum mechanics: the
mechanics of atoms and atomic physics. But we do not know how to model them — they are too
complicated. For example, photosynthesis. If this sounds too esoteric, perhaps something
relatable will make you appreciate quantum computing more — Alzheimer’s disease. Currently,
no computer is powerful enough to model the elements or processes that cause people to develop
Alzheimer’s disease What I’m talking about is doing chemistry from the first principle.
Chemistry reduced to software, so we don’t have to play with thousands of different kinds of
antibiotics, thousands of different kinds of plastics, thousands of different kinds of chemicals.
We can do it using software on a quantum computer”6.
Of course, quantum computing has tons of perks within the biological realm, but it also
has its take on security. Breaking modern day security encryptions become relatively easy and
quick. One can break an encryption within days compared to years. This is where the problem
arises
The Problem
With every ground-breaking piece of technology, there are always some downfalls. In
this case it’s not much of a downfall but more as preparation. As explained, the potential of
quantum computing is almost limitless. From advances in chemical research to advancements in
interstellar research, there seems to be nothing but positives coming through from this
6 https://e27.co/quantum-computing-help-us-tackle-alzheimers-disease-michio-kaku-20171108/
8
Nealesh Ragoodial Quantum Security
development. The secrets to all this knowledge can be revealed, but so can that of hidden
information from you as an individual. Or even more drastic, that of a nation. From financial
information to classified government intelligence, under the modern-day encryption algorithms,
nothing is protected.
Here is a scenario. It is a few years down into the future and quantum computing is now
that of reality. Similar to the Space Race from 1957 – 1975, major countries are pushing to
develop quantum devices. A country that is first to develop this technology will not only have
renown but also be considered a supreme power. “The impact of quantum on our national
defense will be tremendous. The question is whether the United States and its allies will be
ready”7. Let’s say that Russia, for example, accomplished quantum computing before the United
States and its allies, military information and classified government documents will be breached
and therefore open to the public. People have seen the damage one hacker can do to a
corporation. How about a country intercepting encrypted files from across the world? Definitely
frightening to think about but sadly, this may be our reality. “From academics to the National
Security Agency, there is widespread agreement that quantum computers will rock current
security protocols that protect global financial markets and the inner workings of government”8.
Solution
With quantum computing so advanced and so powerful how could anyone protect or
prepare against such an advancement? “It is now clear that current Internet security measures and
the cryptography behind them will not withstand the new computational capabilities that
7 https://www.wired.com/story/quantum-computing-is-the-next-big-security-risk/8 https://www.wired.com/story/quantum-computing-is-the-next-big-security-risk/
9
Nealesh Ragoodial Quantum Security
quantum computers will bring,”9. There happens to be one and it is within the realm of
cryptography.
The main reason why quantum computers are so powerful is because of where they gain
power. A quantum computer, again, can read the full motion of electron and their superposition.
One way to combat a quantum attack is to use quantum in defense. Using the quantum key
distribution algorithm, one can prepare oneself for a quantum attack. As explained earlier a QKD
uses photons to transfer data between two endpoints. Using Quantum Mechanics, the two
connected devices generate and exchange single photons. By doing this the secret key as a
sequence in zero and one is completely random and having it random is the key to beating the
attack. Also having it done in this manner makes sure that no one can intercept or copy the key.
This is superior to network communication which happens to be the weakest point in security.
QKD is highly expensive though and usually needed in a military grade system. We can hope by
the time quantum computers are established the price of such a system would decrease and
extensive research on QKD would be completed.
After further research there is one other way to protect or even stop a quantum attack.
This happens to be a special code known as the Generalized Knapsack Code. Quantum
computers operate on the subatomic level so theoretically one would need to devise a solution
that can go way beyond conventional computers. Developed by Nathan Hamlin, the Generalized
Knapsack Code works by disguising data with number strings more complex than the zero and
one’s modern computers use to operate. The knapsack code offers a viable security method for
defending against quantum computer attacks. "The Generalized Knapsack Code expands upon
the binary representations today's computers use to operate by using a variety of representations
9 https://www.wired.com/2015/09/tricky-encryption-stump-quantum-computers/
10
Nealesh Ragoodial Quantum Security
other than 0s and 1," Hamlin said. "This lets it block a greater array of cyberattacks, including
those using basis reduction, one of the decoding methods used to break the original knapsack
code”10.
These two techniques are just some of ideas that can protect us from a full-on quantum
attack. The best practice would be to use both QKD and the Generalized Knapsack Code in
parallel as protection. It is recommended in the Quantum Key Distribution that more than one
layer of protection should be used. This layered protection is nothing new. We have this today
and with the upcoming quantum computers showing up we need to keep old habits but develop
stronger tools.
Conclusion
Quantum computers is not that of science fiction. This is a blessing and a curse that will
be arriving within the next twenty to thirty years. Definitely within our lifetimes, we will see this
advancement. These computers use quantum mechanics to function and in doing so establish
speed and security. We are coming to a point in human civilization where problems are
becoming harder to solve and the exponential rise of computers have slowed down drastically.
These hard problems will propel us to answer the harder questions and create advancements that
will benefit human civilization for the better. Quantum computing is that answer, however, we
must not take new technology lightly. Every positive advancement can be misused. This is why
the proper security must be set into place to prevent for example, data breaches and nationwide
10 https://www.sciencedaily.com/releases/2017/02/170228185341.htm
11
Nealesh Ragoodial Quantum Security
panic from occurring. Quantum computing is a topic that must not be taken lightly and with it
there must be path where Quantum Security is not only needed but required.
References
“Mathematician breaks down how to defend against quantum computing attacks.” ScienceDaily,
ScienceDaily, 28 Feb. 2017, www.sciencedaily.com/releases/2017/02/170228185341.htm.
“Disadvantages.” Quantum Computing: The Future Computers, 4 Dec. 2013,
danielsharlow.wordpress.com/disadvantages/.
“Exponential Growth In Linear Time: The End Of Moore's Law.” Hackaday, 29 Apr. 2016,
hackaday.com/2015/09/09/exponential-growth-in-linear-time-the-end-of-moores-law/.
Hurd, Will. “Rep. Will Hurd of Texas Argues that Quantum Computing Is the Next Big Security
Risk.” Wired, Conde Nast, 6 Dec. 2017, www.wired.com/story/quantum-computing-is-the-next-
big-security-risk/.
12
Nealesh Ragoodial Quantum Security
“Moore's Law.” University of Missouri-St. Louis,
www.umsl.edu/~siegelj/information_theory/projects/Bajramovic/www.umsl.edu/_abdcf/
Cs4890/link1.html.
Publishing, Scientific Research. “Number in Mathematical Cryptography.” Open Journal of
Discrete Mathematics, Scientific Research Publishing, 23 Jan. 2017, file.scirp.org/Html/3-
1200310_73743.htm.
TEDxTalks. “Quantum computation | Michelle Simmons | TEDxSydney.” YouTube, YouTube, 22
June 2012, www.youtube.com/watch?v=cugu4iW4W54.
“Quantum computing 101.” Institute for Quantum Computing, 11 Nov. 2013, uwaterloo.ca/institute-
for-quantum-computing/quantum-computing-101.
“Quantum computing could help us tackle Alzheimer's disease: Dr Michio Kaku.” e27,
e27.co/quantum-computing-help-us-tackle-alzheimers-disease-michio-kaku-20171108/.
“Quantum computing: John Prekill.”
http://www.theory.caltech.edu/~preskill/pubs/preskill-1998-pro-con.pdf
“Quantum Cryptography Pros & Cons: Andrea Pasquinucci.”
http://www.ucci.it/docs/QC-Pros+Cons-0.4.pdf
Skuse, Benjamin. “The trouble with quantum computing.” RSS, 8 Nov. 2016,
eandt.theiet.org/content/articles/2016/11/the-trouble-with-quantum-computing/.
Wolchover, Natalie. “The Tricky Encryption That Could Stump Quantum Computers.” Wired,
Conde Nast, 29 June 2017, www.wired.com/2015/09/tricky-encryption-stump-quantum-
computers/.
13
Nealesh Ragoodial Quantum Security
14