Quantum Cryptography - LUhome.lu.lv/~sd20008/papers/slides/Quantum_cryptography.pdf · Quantum...

Post on 26-Jul-2020

2 views 0 download

Transcript of Quantum Cryptography - LUhome.lu.lv/~sd20008/papers/slides/Quantum_cryptography.pdf · Quantum...

QuantumCryptography

Māris OzolsUniversity of Cambridge

Overview

● What are quantum computers?● What is quantum cryptography?

- Shor's algorithm for factoring- Quantum key distribution- Device-independent quantum cryptography

What is quantum computing?

Physics Computer

Science

Mathematics

QuantumComputing

Quantum mechanics

How to simulate quantum physics?

Simulating quantum systems on a regular computer is very hard...

Wouldn't it be easier if the computer itself would operate based on the laws of quantum physics?

Richard Feynman

What is a quantum computer?

Quantum mechanics

Quantum computer is a device that processes information by using quantum phenomena

+

Computer

What quantum computers are not...

justsmaller

What quantum computers are not...

justsmaller

What quantum computers are not...

justfaster

justsmaller

What quantum computers are not...

exponentiallyfaster

justfaster

justsmaller

What quantum computers are not...

exponentiallyfaster

justfaster science

fiction

justsmaller

What quantum computers are not...

exponentiallyfaster

justfaster

availablefor $ale

science fiction

Quantum cryptography

● Quantum algorithms for breakingexisting cryptosystems- Shor's algorithm for factoring

Quantum cryptography

● Quantum algorithms for breakingexisting cryptosystems- Shor's algorithm for factoring

● Enabling secure communication- Quantum key distribution

Quantum cryptography

● Quantum algorithms for breakingexisting cryptosystems- Shor's algorithm for factoring

● Enabling secure communication- Quantum key distribution

● Computation with untrusted devices- Device-independent quantum cryptography

Multiplying vs factoring

3 × 5 = 1511 × 13 = 143

28423087481 × 25162321141 = 715190855015658735821

Multiplying is easy...

Multiplying vs factoring

3 × 5 = 1511 × 13 = 143

28423087481 × 25162321141 = 715190855015658735821

Multiplying is easy...

Multiplying vs factoring

12 = 3 × 4377 = 13 × 29

57249035862524887649 = 2543563837 × 22507410677

3 × 5 = 1511 × 13 = 143

28423087481 × 25162321141 = 715190855015658735821

Multiplying is easy...

Factoring is not...

Multiplying vs factoring

12 = 3 × 4377 = 13 × 29

57249035862524887649 = 2543563837 × 22507410677

3 × 5 = 1511 × 13 = 143

28423087481 × 25162321141 = 715190855015658735821

Multiplying is easy...

Factoring is not...

Public-key cryptography (RSA)

Public-key cryptography (RSA)

Public key57249035862524887649

Private key254356383722507410677

Public-key cryptography (RSA)

Public key57249035862524887649

Private key254356383722507410677

Message

Encrypt

Public-key cryptography (RSA)

Public key57249035862524887649

Private key254356383722507410677

Message

Encrypt

Decrypt

Message

Shor's algorithm breaks RSA

Peter Shor

● Produces prime factors of a given integer● Runs in polynomial time

(best known classical algorithm runs in exponential time)

Shor's algorithm breaks RSA

Peter Shor Fourier transform of Peter Shor

● Produces prime factors of a given integer● Runs in polynomial time

(best known classical algorithm runs in exponential time)● Based on quantum Fourier transform

Quantum key distribution

Quantum key distribution

Uncertainty principle

Quantum system cannot beobserved without disturbing it

Quantum key distribution

Device-independent quantum cryptography

untrusted device

Device-independent quantum cryptography

test

testtesttest

computetesttest

untrusted device

Strategy 1: Self-testing

Device-independent quantum cryptography

test

testtesttest

computetesttest

untrusteddevice 2

test

testtesttest

computetesttest

untrusteddevice 1

Strategy 2: Cross-checking

Device-independent quantum cryptography

Device-independent quantum protocols exist for● quantum key distribution● randomness expansion● randomness amplification

test

testtesttest

computetesttest

untrusteddevice 2

test

testtesttest

computetesttest

untrusteddevice 1

Long-term implications

Security vs Privacy

Thank you!