History of Networking and Security

Quantum Information Technology Group – Quantumlah

Networking and Security
Darwin Gosal
National University of Singapore

Quantum Information Technology Group – Quantumlah

Outline
History of communication
History of telecommunication
Computer networking now and beyond
Information Security
Ancient cryptography
Overview of modern cryptography
Introduction to quantum cryptography.

Quantum Information Technology Group – Quantumlah

History of Communication


Body Language

Quantum Information Technology Group – Quantumlah

History of Communication
Speech
200,000 years ago (FOXP2 gene)
Unreliable storage: human memory
human hearing
human voice
20Hz

300Hz

4kHz

500Hz

3kHz
speech


14kHz

20kHz

Quantum Information Technology Group – Quantumlah

History of Communication
Symbol
Rock carving
Cave painting
Pictograms
Ideograms
Logographic
Alphabet

Quantum Information Technology Group – Quantumlah

Symbol
Cave Paintings

Rock Carving (Petroglyph)

Chauvet Cave (30,000 BC)

Haljesta (10,000BC)

Quantum Information Technology Group – Quantumlah

Symbol
Pictograms (9000 BC)
Ideograms
Logographic (4000BC)

Ideograms from Mi’kmag hieroglyps

Water, Rabbit, & Deer from
Aztec Stone of the Sun

Egyptian hieroglyph


2600 BC Sumerian Cuneiform

Chinese Oracle
Bone Script
1600BC

Quantum Information Technology Group – Quantumlah

Symbol
Alphabet / Adjad
A mapping of single symbols to single phonemes

Nearly all alphabetical scripts used
around the world derived from ProtoSinaitic alphabet
“Ba’alat” means
Lady (title for Hathor,
feminime title for
semitic god Baal)

Quantum Information Technology Group – Quantumlah


History of Communication
Writing tools / medium
Papyrus (3000BC)
The first newspaper, Acta Diurna (59BC)
Paper (100AD)
Pens (1000AD)
Printing press, Gutenberg (1400AD)
Typewriter (1800s)
Computers (1960s)

Quantum Information Technology Group – Quantumlah

History of Telecommunication
Transportation
Foot soldier
Postal system
Sneaker-net
F-16 payload: 4600kg
76,470pcs of 2.5” 160GB HDD

Capacity: 12 Peta-Bytes
Speed: Mach 2
Range: 3200km
Bandwidth: 2.6 TB/s

Quantum Information Technology Group – Quantumlah

History of Telecommunication
Drums signal
Drum talking (i.e. Yoruba language)
Smoke signals

Quantum Information Technology Group – Quantumlah

History of Telecommunication
Heliograph (Greek, 405BC)
Modern Heliograph
using Morse code (1810)
Semaphore (1972)
Distance: 20 miles

Bandwidth: 15 cpm

Quantum Information Technology Group – Quantumlah

History of Telecommunication
Electric Telegraph
1st commercial version (1937)
by Wheatstone & Cooke
9 April 1839 – 21km
First transatlantic
telegraph cable (1866)
Telex (Teleprinter Exchange, 1932)
a switched telegraph service.

Quantum Information Technology Group – Quantumlah

History of Telecommunication
Telephone (1876)
Alexander Graham Bell
Elisha Grey

Antonio Meucci

Bell Telephone Company (1877)
American Telephone & Telegraph (1885)
AT&T break-up (1984)

Quantum Information Technology Group – Quantumlah

History of Telecommunication
Radio / Wireless Telegraph (1890s)
Nikola Tesla (1893)
Guglielmo Marconi (1901)
1st wireless comm. between UK & US
Won Nobel Prize in Physics (1909)

Mobile Phone (Marty Cooper 1973)

Quantum Information Technology Group – Quantumlah

From Analog to Digital

Claude Shannon
Father of Modern Information Theory
Publish: A Mathematical Theory of
Communication (1948)
Won 1936 Nobel on: “A Symbolic
Analysis of Relay and Switching Circuit”
Notion of BITS = Binary digITS.

Quantum Information Technology Group – Quantumlah

Computer Networking
1960/4 - Research on Packet Switching
1968 - DARPA contracts with BBN to
create ARPAnet
1970 - The first 5 nodes: BBN, Stanford,
UCLA, UC Santa Barbara, & U of Utah.
1972 - TCP created by Vint Cerf
1981 - ARPAnet have 213 nodes and
IPv4, TCP/UDP is used.


1983 – TCP/IP compliant network
Internet
ARPAnet + X.25 + UUCP + NSFnet
1989 – Tim Berners-Lee, CERN, invented
HTML thus World-Wide-Web.
1993 – Mosaic, the 1st graphical browser
100000

10000

Hosts

Quantum Information Technology Group – Quantumlah

Computer Networking

5000

1000


562
213
100
1981

1982

1983

1984

1985

Years

1986

1987

1988

1989

Quantum Information Technology Group – Quantumlah

Computer Networking
1992 – Internet Society (ISOC) given
formal oversight of the Internet Activities
Board (IAB) and the Internet Engineering
Task Force (IETF)
1995 – Fed Gov out from networking
infrastructure business eCommerce

Quantum Information Technology Group – Quantumlah

Networking now and beyond
Personal Area Network
Bluetooth, PDA-phone, Notebook
Local Area Network
Gigabit, WiFi (802.11a/b/g/n)
Wide Area Network
Frame-Relay, ATM, GSM (EDGE,
GPRS), CDMA (3G)
MAN
FDDI, FSO, WiMax

Quantum Information Technology Group – Quantumlah

Networking now and beyond
IPv6 (232 2128), Internet 2
Peer to Peer (Usenet 1979)
Wireless Mesh network (802.11s)
Convergence VoIP
Starhub cable: TV, Phone, Broadband
RFID (spychips?)
GPS
© NASA

Quantum Information Technology Group – Quantumlah

Networking now and beyond

The Future

Quantum Information Technology Group – Quantumlah

Information Security
Confidentiality (Authentication)
Ensuring the information is accessible only to
authorized personal (prevent unauthorized disclosure)

Integrity (Non-repudiation)
Safeguarding the accuracy and completeness of the
information (prevent unauthorized modification)

Availability (Reliability)
Ensuring authorized user to have access to the
information when required (prevent disruption of
service and productivity)

Quantum Information Technology Group – Quantumlah

Information Security
Confidentiality
PIN,Password, Passphrase, Biometrics,
Tokens, Encryption

Integrity
MD5, SHA1

Availability
Denial of Service

Quantum Information Technology Group – Quantumlah

Information Security
Network Security
Firewall, IDS, VPN
Application Security
SELinux, Secure coding
Host (End-point) Security
Anti-virus, Anti-spyware, ACL, Physical
security, Social engineering

Quantum Information Technology Group – Quantumlah

Information Security
Hacker activity

Firewall

Worms & viruses

Intrusion Detection

SPAM

SPAM filtering

Spyware

Anti-Spyware

Phishing

Phishing filtering

Quantum Information Technology Group – Quantumlah

Information Security
Trusted Computing (TPM)
Palladium
Digital Right Management (DRM)
Play4Sure, DVD’s Content Scrambling
System (CSS)
Digital Millennium Copyright Act (DMCA)

Quantum Information Technology Group – Quantumlah

Security Model
Threat avoidance (Military model)
Security is absolute (either you’re secure or not)

Quantum Information Technology Group – Quantumlah

Risk Management

Quantum Information Technology Group – Quantumlah

Security Model
Risk Management (Business model)
Security is relative (many risks and solutions)
Accept the risk
Mitigate the risk with technology
Mitigate the risk with procedures
Transfer the risk

Quantum Information Technology Group – Quantumlah

Cryptography
Claude Shannon
Father of modern cryptography
“Communication Theory of Secrecy Systems”

Cryptology (scrambling)
Cryptography
Cryptanalysis

Steganography (hiding)

Quantum Information Technology Group – Quantumlah

Cryptography

Quantum Information Technology Group – Quantumlah

History of Cryptography
Atbash cipher
Hebrew (600BC)
Permutation cipher (Greek)
Scytale (6BC)
Subtitution cipher
Caesar Shift
(1400s)

Quantum Information Technology Group – Quantumlah

History of Cryptography
Queen Mary’s Cipher (Babington Plot)
Plot to free Queen Mary,
incite a rebellion, and
murder Queen Elizabeth.
The conspirators
communicated with
Queen Mary, who was
being held prisoner by
Elizabeth, via enciphered
smuggled letters.

Quantum Information Technology Group – Quantumlah

History of Cryptography
Nomenclator – 23 symbols representing
letters, and 35 symbols representing words

Cracked by Thomas Phelippes
at the first Cipher school in England
established in 1586 by Francis Walsingham,
Elizabeth’s Secretary and head of security.

Quantum Information Technology Group – Quantumlah

History of Cryptography
Mary replied to a letter from Babington
using the compromised cipher.
Phelippes added a forged postscript from
Queen Mary asking Babington for the
identities of the conspirators.
He supplied them.

Quantum Information Technology Group – Quantumlah

History of Cryptography
Mary was beheaded
Babington and the six conspirators were
emasculated, disemboweled, and then
executed.

Quantum Information Technology Group – Quantumlah

History of Cryptography
Al-Kindi (800AD)
Frequency Analysis
Lipograms

English: ETAOINSHR
German: ENIRSATUD
French: EAISTNRUL
Spanish: EAOSNRILD
Italian: EAIONLRTS
Finnish: AITNESLOK

That's right, this is a lipogram - a book, paragraph or similar thing in writing that fails to contain
a symbol, particularly that symbol fifth in rank out of 26 (amidst 'd' and 'f') and which stands for
a vocalic sound such as that in 'kiwi'. I won't bring it up right now, to avoid spoiling it..."

Quantum Information Technology Group – Quantumlah

Lipograms
The most famous lipogram: Georges Perec, La Disparition (1969) 85000
words without the letter e:

Gottlob Burmann (1737-1805) R-LESS POETRY. An obsessive dislike for the
letter r; wrote 130 poems without using that letter, he also omitted the letter r
from his daily conversation for 17 years…

Quantum Information Technology Group – Quantumlah

History of Cryptography
Enigma (WW2)
Vernam Cipher
3DES
AES

Claude Shannon of Bell Labs (ca. 1945) proved the one time pad
guaranties perfect security as long as:
•The key is a truly random number
•The key is as long as the message
•The key is used only once

Gilbert Vernam
(AT&T) 1918

Quantum Information Technology Group – Quantumlah

DES Cracker
This board is part of
the EFF DES cracker,
which contained over
1800 custom chips
and could brute force
a DES key in a matter
of days.

Quantum Information Technology Group – Quantumlah

Key Distribution
Public Key Cryptosystem
RSA (Factoring)
Others:
McEliece
ElGamal
ECC

Quantum Information Technology Group – Quantumlah

Modern Cryptography
Public-Key Cryptosystem (RSA, ECC)
Public Key Infrastructure
Authentication method
Diffie-Hellman key exchange
Session key created for symmetric
cryptography
Use AES or 3DES

Quantum Information Technology Group – Quantumlah

Diffie-Hellman

Quantum Information Technology Group – Quantumlah

Diffie-Hellman

Quantum Information Technology Group – Quantumlah

Diffie-Hellman

Quantum Information Technology Group – Quantumlah

Diffie-Hellman

Copyright, 2000-2006 by NetIP, Inc. and Keith Palmgren, CISSP

Execution Time

Quantum Information Technology Group – Quantumlah

Computational Complexity
2
L

INPUT SIZE
EXP
NP

n

L
P

Quantum Information Technology Group – Quantumlah

Quantum Computer

Shor’s algorithm
Moore’s law

Quantum Information Technology Group – Quantumlah

Quantum Cryptography
In April 2004, the EU decided to spend €11 million
developing secure communication based on quantum
cryptography — the SECOQC project — a system that
would theoretically be unbreakable by ECHELON or
any other espionage system. European governments
have been leery of ECHELON since a December 3,
1995 story in the Baltimore Sun claiming that
aerospace company Airbus lost a $6Billion contract
with Saudi Arabia in 1994 after the NSA reported that
Airbus officials had been bribing Saudi officials to
secure the contract.
Source: Wikipedia
http://news.bbc.co.uk/1/hi/world/europe/820758.stm

Quantum Information Technology Group – Quantumlah

Quantum Cryptography
Quantum Key Distribution
Bit = 0’s or 1’s
Qubit = 0’s, 1’s, or “0 and 1”.

Quantum Information Technology Group – Quantumlah

Qubit

Which path is taken?

BOTH

Quantum Information Technology Group – Quantumlah

What do you see?

Qubit

Quantum Information Technology Group – Quantumlah

Qubit
or
0

1

Ψ =α 0 +β 1

Ψ = 000 + 001 + 010 + 011
+ 100 + 101 + 110 + 111

L qubits encode 2L numbers

Quantum Information Technology Group – Quantumlah

Heisenberg Uncertainty Principle
measuring polarisation states of photons
H
V
+45
-45

PBS (H/V)

PBS (45/-45)

Quantum Information Technology Group – Quantumlah

0→H
1→V
0 → 45
1 → -45

BB84

Key generation
0 0 1 1 1 0 0 1 …

1 0 1 1 1 0 1 1 …

Base selection
+ + X + + + X X …

Base discussion
Over public channel

45 H -45 V V -45 H -45 …

Base selection
X + X + + X + X …

Encoding
V H -45 V V H -45 -45 …

Quantum Information Technology Group – Quantumlah

BB84
No Cloning Theorem : It is not possible to copy an unknown quantum
state with perfect fidelity.
Bound on copying fidelity is such that Eve will not succeed in tapping the
channel even if using the best possible quantum copying machine.

Wootters and Zurek; Dieks 1982

Quantum Information Technology Group – Quantumlah

BB84

www.research.ibm.com/journal/rd/481/smolin.htm

Quantum Information Technology Group – Quantumlah

Entangled State

Ψ

(−)

1
=
(H
2

s

V i − e iα V

s

H i)

Phys. Rev. Lett. 75, 4337-4341 (1995)

Quantum Information Technology Group – Quantumlah

Entanglement
–“If, without in any way
disturbing a system,
we can predict with
certainty… the value of
a physical quantity,
then there exists an
element of physical
reality corresponding
to this physical
quantity”

LOCAL REALISM
PERFECT
EAVESDROPPING!

Quantum Information Technology Group – Quantumlah

Local Realism
Local realism is refuted by quantum theory
Entangled photons do not have predetermined
values of polarization…
…so eavesdropper has nothing to measure
Quantum mechanics allows eavesdropper free
communication
Any post-quantum theory that refutes local
realism allows eavesdropper free
communication.

Quantum Information Technology Group – Quantumlah

Ekert 91

Ψ
Ψ

( −)

( −)

1
(H V − V H )
=
2
1
( + 45 − 45 − − 45 + 45
=
2

)

Perfect Security for error < 15%

Quantum Information Technology Group – Quantumlah

History of Q. Cryptography

S. Wiesner 1970

C.H. Bennett &
G. Brassard 1984

Prepare and
Measure
Protocols

A. Ekert 1991

Entanglement
Based
Protocols

Quantum Information Technology Group – Quantumlah

Alps (23.4 km)
Vienna

Experiments

Quantum Information Technology Group – Quantumlah

10 Jan 2004
Rise of the Quantum Island

Quantum Information Technology Group – Quantumlah

Governments
US (US$ 100M = SG$ 166M)
US Army, NSA, DARPA, NIST, etc

Japan (SG$ 41.5M)
ERATO, ICORP, PRESTO

Europe (€ 15M = SG$ 30M)
Australia (AU$ 10M = SG$ 13M)
Singapore (SG$ 8M)
A*Star, DSTA, DSO

Quantum Information Technology Group – Quantumlah

Commercial
MagiQ (US)
BBN (US)
id-Quantique (Swiss)
QinetiQ (UK)
D-wave (Canada)
Elsag (Italy)
Fujitsu & Toshiba (UK + Japan)
Lockheed Martin (US)
Q-tool (Germany)

Quantum Information Technology Group – Quantumlah

The Future

Hybrid System
Satellite
QKD network

Quantum Information Technology Group – Quantumlah

Think like a physicists!