Quantum Computing: Security Implications - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

Quantum Computing: Security Implications

Description:

'If someone says that he can think or talk about quantum physics ... NP-complete, non-convergent, Ising model. simulation. climate models. pattern recognition ... – PowerPoint PPT presentation

Number of Views:194
Avg rating:3.0/5.0
Slides: 22
Provided by: infosecur7
Category:

less

Transcript and Presenter's Notes

Title: Quantum Computing: Security Implications


1
Quantum Computing Security Implications
  • Robert M. Slade, MSc, CISSP
  • rmslade_at_shaw.ca, rslade_at_vcn.bc.ca,
    rslade_at_computercrime.org
  • http//victoria.tc.ca/techrev/rms.htm

2
Do we understand quantum computing?
  • This isn't right. It isn't even wrong.
  • - Wolfgang Pauli, on a paper submitted by a
    physicist colleague

3
Quantum introduction (very small)
  • Concepts
  • Superposition
  • Entanglement
  • observer effect
  • Qubit
  • If someone says that he can think or talk about
    quantum physics without becoming dizzy, that
    shows only that he has not understood anything
    whatever about it.
  • Niels Bohr

4
Quantum Computing (1)
  • Quantum computer
  • quantum tech, traditional operation
  • smaller, faster
  • quantum size range
  • Turing
  • universal computer
  • irreversible computations

5
Quantum Computing (2)
  • Quantum cryptography
  • photon polarization
  • angular polarization
  • detector angle
  • public exchange of angle but not value
  • photon entanglement
  • eavesdropping detection

6
Quantum Computing (3)
  • Quantum computing
  • computing device or processor
  • analogue computer
  • not digital?

7
Analogue Computers
  • Spaghetti computing
  • parallel sorting
  • special purpose/application
  • Slide rule
  • exact computation
  • imprecise reading
  • Adiabatic quantum computer
  • least energy best answer
  • least path, best comparison, simulation
  • D-Wave Orion

8
Applications and Implications
  • by domain
  • general functions
  • least path
  • Traveling Salesman Problem
  • scheduling, efficiency studies, multiple
    requirements
  • NP-complete, non-convergent, Ising model
  • simulation
  • climate models
  • pattern recognition
  • people are good, computers are bad
  • data reduction and representation

9
Security management
  • risk management (shortest path)
  • what if - cost vs benefit
  • information classification (pattern matching)
  • risk assessment required
  • investing, or not, in quantum computing

10
Security architecture
  • new architectures, new vulnerabilities
  • simulation of vulnerabilities and protections
  • quantum devices and noise
  • D-Wave Orion voting, error checking
  • quantum error correction (recent)
  • fault tolerant computing

11
Access control
  • biometrics (pattern matching)
  • information flow and covert channel analysis
    (least path/simulation)
  • intrusion detection (pattern matching)

12
Cryptography
  • quantum communications/encryption/key
    negotiation/eavesdropping detection
  • parallel decryption
  • new algorithms
  • tractable by neither classical nor quantum
  • quantum devices and generation of randomness
  • analysis of implementation problems (simulation)

13
Physical
  • noise, RFI/EMI interference
  • temperature
  • room temp 100x gt interstellar space
  • interstellar space 1000x gt Orion device
  • special costs, protections for devices
  • physical access control (biometrics)

14
BCP
  • Business Impact Analysis (least path)
  • testing of BC plans (simulation)
  • disaster management
  • direction of resources to maximum effect
  • continuity of operations for special devices
  • damage if power/cooling fails

15
Applications security
  • testing (simulation)
  • database analysis (pattern matching)
  • cost (privacy) vs benefit (safety)
  • database aggregation problem analysis (pattern
    matching and simulation)
  • learning (pattern matching)
  • neural net augmented, check against neural net
    superstitious learning
  • check against expected
  • impossible to compute by classical methods
  • malware/botnet detection, (pattern matching)
  • operation/control/ownership
  • completely new paradigms in programming

16
Operations security
  • combinations of classical and quantum devices and
    operations
  • complexity, troubleshooting
  • troubleshooting (simulation)
  • insider attack detection (pattern matching)

17
Telecommunications and networking
  • Intrusion Detection Systems
  • Botnet detection and assessment
  • Command Control
  • ownership
  • fast flux
  • Network attack analysis
  • quantum encryption special channels
  • quantum devices likely remote access

18
Telecommunications and networking
  • Spam
  • limitations even in Bayesian analysis

19
Telecommunications and networking
  • quantum encryption requires special channels
  • quantum devices likely to be remote access

20
Law and investigation
  • new forensic analysis tools (pattern
    matching/simulation)
  • presentation/acceptance in court problematic

21
Quantum Computing Security Implications
  • Robert M. Slade, MSc, CISSP
  • rmslade_at_shaw.ca, rslade_at_vcn.bc.ca,
    rslade_at_computercrime.org
  • http//victoria.tc.ca/techrev/rms.htm
Write a Comment
User Comments (0)
About PowerShow.com