1 / 21

Quantum Computing : Security Implications

Robert M. Slade , MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org http://victoria.tc.ca/techrev/rms.htm. Quantum Computing : Security Implications. This isn't right. It isn't even wrong. - Wolfgang Pauli, on a paper submitted by a physicist colleague.

kayo
Download Presentation

Quantum Computing : Security Implications

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org http://victoria.tc.ca/techrev/rms.htm Quantum Computing: Security Implications

  2. This isn't right. It isn't even wrong. - Wolfgang Pauli, on a paper submitted by a physicist colleague Do we understand quantum computing?

  3. Quantum introduction (very small) • Concepts • Superposition • Entanglement • observer effect • Qubit • “If someone says that he can think or talk about quantum physics without becoming dizzy, that shows only that he has not understood anything whatever about it.” • Niels Bohr

  4. Quantum Computing (1) • Quantum computer • quantum tech, traditional operation • smaller, faster • quantum size range • Turing • universal computer • irreversible computations

  5. Quantum Computing (2) • Quantum cryptography • photon polarization • angular polarization • detector angle • public exchange of angle but not value • photon entanglement • eavesdropping detection

  6. Quantum Computing (3) • Quantum computing • computing device or processor • analogue computer • not digital?

  7. Analogue Computers • Spaghetti computing • parallel sorting • special purpose/application • Slide rule • exact computation • imprecise reading • Adiabatic quantum computer • least energy = best answer • least path, best comparison, simulation • D-Wave Orion

  8. Applications and Implications • by domain • general functions • least path • Traveling Salesman Problem • scheduling, efficiency studies, multiple requirements • NP-complete, non-convergent, Ising model • simulation • climate models • pattern recognition • people are good, computers are bad • data reduction and representation

  9. Security management • risk management (shortest path) • what if - cost vs benefit • information classification (pattern matching) • risk assessment required • investing, or not, in quantum computing

  10. Security architecture • new architectures, new vulnerabilities • simulation of vulnerabilities and protections • quantum devices and noise • D-Wave Orion voting, error checking • quantum error correction (recent) • fault tolerant computing

  11. Access control • biometrics (pattern matching) • information flow and covert channel analysis (least path/simulation) • intrusion detection (pattern matching)

  12. Cryptography • quantum communications/encryption/key negotiation/eavesdropping detection • parallel decryption • new algorithms • tractable by neither classical nor quantum • quantum devices and generation of randomness • analysis of implementation problems (simulation)

  13. Physical • noise, RFI/EMI interference • temperature • room temp 100x > interstellar space • interstellar space 1000x > Orion device • special costs, protections for devices • physical access control (biometrics)

  14. BCP • Business Impact Analysis (least path) • testing of BC plans (simulation) • disaster management • direction of resources to maximum effect • continuity of operations for special devices • damage if power/cooling fails

  15. Applications security • testing (simulation) • database analysis (pattern matching) • cost (privacy) vs benefit (safety) • database aggregation problem analysis (pattern matching and simulation) • learning (pattern matching) • neural net augmented, check against neural net superstitious learning • check against expected • impossible to compute by classical methods • malware/botnet detection, (pattern matching) • operation/control/ownership • completely new paradigms in programming

  16. Operations security • combinations of classical and quantum devices and operations • complexity, troubleshooting • troubleshooting (simulation) • insider attack detection (pattern matching)

  17. Telecommunications and networking • Intrusion Detection Systems • Botnet detection and assessment • Command & Control • ownership • “fast flux” • Network attack analysis • quantum encryption special channels • quantum devices likely remote access

  18. Telecommunications and networking • Spam • limitations even in Bayesian analysis

  19. Telecommunications and networking • quantum encryption requires special channels • quantum devices likely to be remote access

  20. Law and investigation • new forensic analysis tools (pattern matching/simulation) • presentation/acceptance in court problematic

  21. Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org http://victoria.tc.ca/techrev/rms.htm Quantum Computing: Security Implications

More Related