History of Networking and Security
Quantum Information Technology Group – Quantumlah
Networking and Security
Darwin Gosal
National University of Singapore
Quantum Information Technology Group – Quantumlah
Outline
History of communication
History of telecommunication
Computer networking now and beyond
Information Security
Ancient cryptography
Overview of modern cryptography
Introduction to quantum cryptography.
Quantum Information Technology Group – Quantumlah
History of Communication
Body Language
Quantum Information Technology Group – Quantumlah
History of Communication
Speech
200,000 years ago (FOXP2 gene)
Unreliable storage: human memory
human hearing
human voice
20Hz
300Hz
4kHz
500Hz
3kHz
speech
14kHz
20kHz
Quantum Information Technology Group – Quantumlah
History of Communication
Symbol
Rock carving
Cave painting
Pictograms
Ideograms
Logographic
Alphabet
Quantum Information Technology Group – Quantumlah
Symbol
Cave Paintings
Rock Carving (Petroglyph)
Chauvet Cave (30,000 BC)
Haljesta (10,000BC)
Quantum Information Technology Group – Quantumlah
Symbol
Pictograms (9000 BC)
Ideograms
Logographic (4000BC)
Ideograms from Mi’kmag hieroglyps
Water, Rabbit, & Deer from
Aztec Stone of the Sun
Egyptian hieroglyph
2600 BC Sumerian Cuneiform
Chinese Oracle
Bone Script
1600BC
Quantum Information Technology Group – Quantumlah
Symbol
Alphabet / Adjad
A mapping of single symbols to single phonemes
Nearly all alphabetical scripts used
around the world derived from ProtoSinaitic alphabet
“Ba’alat” means
Lady (title for Hathor,
feminime title for
semitic god Baal)
Quantum Information Technology Group – Quantumlah
History of Communication
Writing tools / medium
Papyrus (3000BC)
The first newspaper, Acta Diurna (59BC)
Paper (100AD)
Pens (1000AD)
Printing press, Gutenberg (1400AD)
Typewriter (1800s)
Computers (1960s)
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Transportation
Foot soldier
Postal system
Sneaker-net
F-16 payload: 4600kg
76,470pcs of 2.5” 160GB HDD
Capacity: 12 Peta-Bytes
Speed: Mach 2
Range: 3200km
Bandwidth: 2.6 TB/s
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Drums signal
Drum talking (i.e. Yoruba language)
Smoke signals
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Heliograph (Greek, 405BC)
Modern Heliograph
using Morse code (1810)
Semaphore (1972)
Distance: 20 miles
Bandwidth: 15 cpm
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Electric Telegraph
1st commercial version (1937)
by Wheatstone & Cooke
9 April 1839 – 21km
First transatlantic
telegraph cable (1866)
Telex (Teleprinter Exchange, 1932)
a switched telegraph service.
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Telephone (1876)
Alexander Graham Bell
Elisha Grey
Antonio Meucci
Bell Telephone Company (1877)
American Telephone & Telegraph (1885)
AT&T break-up (1984)
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Radio / Wireless Telegraph (1890s)
Nikola Tesla (1893)
Guglielmo Marconi (1901)
1st wireless comm. between UK & US
Won Nobel Prize in Physics (1909)
Mobile Phone (Marty Cooper 1973)
Quantum Information Technology Group – Quantumlah
From Analog to Digital
Claude Shannon
Father of Modern Information Theory
Publish: A Mathematical Theory of
Communication (1948)
Won 1936 Nobel on: “A Symbolic
Analysis of Relay and Switching Circuit”
Notion of BITS = Binary digITS.
Quantum Information Technology Group – Quantumlah
Computer Networking
1960/4 - Research on Packet Switching
1968 - DARPA contracts with BBN to
create ARPAnet
1970 - The first 5 nodes: BBN, Stanford,
UCLA, UC Santa Barbara, & U of Utah.
1972 - TCP created by Vint Cerf
1981 - ARPAnet have 213 nodes and
IPv4, TCP/UDP is used.
1983 – TCP/IP compliant network
Internet
ARPAnet + X.25 + UUCP + NSFnet
1989 – Tim Berners-Lee, CERN, invented
HTML thus World-Wide-Web.
1993 – Mosaic, the 1st graphical browser
100000
10000
Hosts
Quantum Information Technology Group – Quantumlah
Computer Networking
5000
1000
562
213
100
1981
1982
1983
1984
1985
Years
1986
1987
1988
1989
Quantum Information Technology Group – Quantumlah
Computer Networking
1992 – Internet Society (ISOC) given
formal oversight of the Internet Activities
Board (IAB) and the Internet Engineering
Task Force (IETF)
1995 – Fed Gov out from networking
infrastructure business eCommerce
Quantum Information Technology Group – Quantumlah
Networking now and beyond
Personal Area Network
Bluetooth, PDA-phone, Notebook
Local Area Network
Gigabit, WiFi (802.11a/b/g/n)
Wide Area Network
Frame-Relay, ATM, GSM (EDGE,
GPRS), CDMA (3G)
MAN
FDDI, FSO, WiMax
Quantum Information Technology Group – Quantumlah
Networking now and beyond
IPv6 (232 2128), Internet 2
Peer to Peer (Usenet 1979)
Wireless Mesh network (802.11s)
Convergence VoIP
Starhub cable: TV, Phone, Broadband
RFID (spychips?)
GPS
© NASA
Quantum Information Technology Group – Quantumlah
Networking now and beyond
The Future
Quantum Information Technology Group – Quantumlah
Information Security
Confidentiality (Authentication)
Ensuring the information is accessible only to
authorized personal (prevent unauthorized disclosure)
Integrity (Non-repudiation)
Safeguarding the accuracy and completeness of the
information (prevent unauthorized modification)
Availability (Reliability)
Ensuring authorized user to have access to the
information when required (prevent disruption of
service and productivity)
Quantum Information Technology Group – Quantumlah
Information Security
Confidentiality
PIN,Password, Passphrase, Biometrics,
Tokens, Encryption
Integrity
MD5, SHA1
Availability
Denial of Service
Quantum Information Technology Group – Quantumlah
Information Security
Network Security
Firewall, IDS, VPN
Application Security
SELinux, Secure coding
Host (End-point) Security
Anti-virus, Anti-spyware, ACL, Physical
security, Social engineering
Quantum Information Technology Group – Quantumlah
Information Security
Hacker activity
Firewall
Worms & viruses
Intrusion Detection
SPAM
SPAM filtering
Spyware
Anti-Spyware
Phishing
Phishing filtering
Quantum Information Technology Group – Quantumlah
Information Security
Trusted Computing (TPM)
Palladium
Digital Right Management (DRM)
Play4Sure, DVD’s Content Scrambling
System (CSS)
Digital Millennium Copyright Act (DMCA)
Quantum Information Technology Group – Quantumlah
Security Model
Threat avoidance (Military model)
Security is absolute (either you’re secure or not)
Quantum Information Technology Group – Quantumlah
Risk Management
Quantum Information Technology Group – Quantumlah
Security Model
Risk Management (Business model)
Security is relative (many risks and solutions)
Accept the risk
Mitigate the risk with technology
Mitigate the risk with procedures
Transfer the risk
Quantum Information Technology Group – Quantumlah
Cryptography
Claude Shannon
Father of modern cryptography
“Communication Theory of Secrecy Systems”
Cryptology (scrambling)
Cryptography
Cryptanalysis
Steganography (hiding)
Quantum Information Technology Group – Quantumlah
Cryptography
Quantum Information Technology Group – Quantumlah
History of Cryptography
Atbash cipher
Hebrew (600BC)
Permutation cipher (Greek)
Scytale (6BC)
Subtitution cipher
Caesar Shift
(1400s)
Quantum Information Technology Group – Quantumlah
History of Cryptography
Queen Mary’s Cipher (Babington Plot)
Plot to free Queen Mary,
incite a rebellion, and
murder Queen Elizabeth.
The conspirators
communicated with
Queen Mary, who was
being held prisoner by
Elizabeth, via enciphered
smuggled letters.
Quantum Information Technology Group – Quantumlah
History of Cryptography
Nomenclator – 23 symbols representing
letters, and 35 symbols representing words
Cracked by Thomas Phelippes
at the first Cipher school in England
established in 1586 by Francis Walsingham,
Elizabeth’s Secretary and head of security.
Quantum Information Technology Group – Quantumlah
History of Cryptography
Mary replied to a letter from Babington
using the compromised cipher.
Phelippes added a forged postscript from
Queen Mary asking Babington for the
identities of the conspirators.
He supplied them.
Quantum Information Technology Group – Quantumlah
History of Cryptography
Mary was beheaded
Babington and the six conspirators were
emasculated, disemboweled, and then
executed.
Quantum Information Technology Group – Quantumlah
History of Cryptography
Al-Kindi (800AD)
Frequency Analysis
Lipograms
English: ETAOINSHR
German: ENIRSATUD
French: EAISTNRUL
Spanish: EAOSNRILD
Italian: EAIONLRTS
Finnish: AITNESLOK
That's right, this is a lipogram - a book, paragraph or similar thing in writing that fails to contain
a symbol, particularly that symbol fifth in rank out of 26 (amidst 'd' and 'f') and which stands for
a vocalic sound such as that in 'kiwi'. I won't bring it up right now, to avoid spoiling it..."
Quantum Information Technology Group – Quantumlah
Lipograms
The most famous lipogram: Georges Perec, La Disparition (1969) 85000
words without the letter e:
Gottlob Burmann (1737-1805) R-LESS POETRY. An obsessive dislike for the
letter r; wrote 130 poems without using that letter, he also omitted the letter r
from his daily conversation for 17 years…
Quantum Information Technology Group – Quantumlah
History of Cryptography
Enigma (WW2)
Vernam Cipher
3DES
AES
Claude Shannon of Bell Labs (ca. 1945) proved the one time pad
guaranties perfect security as long as:
•The key is a truly random number
•The key is as long as the message
•The key is used only once
Gilbert Vernam
(AT&T) 1918
Quantum Information Technology Group – Quantumlah
DES Cracker
This board is part of
the EFF DES cracker,
which contained over
1800 custom chips
and could brute force
a DES key in a matter
of days.
Quantum Information Technology Group – Quantumlah
Key Distribution
Public Key Cryptosystem
RSA (Factoring)
Others:
McEliece
ElGamal
ECC
Quantum Information Technology Group – Quantumlah
Modern Cryptography
Public-Key Cryptosystem (RSA, ECC)
Public Key Infrastructure
Authentication method
Diffie-Hellman key exchange
Session key created for symmetric
cryptography
Use AES or 3DES
Quantum Information Technology Group – Quantumlah
Diffie-Hellman
Quantum Information Technology Group – Quantumlah
Diffie-Hellman
Quantum Information Technology Group – Quantumlah
Diffie-Hellman
Quantum Information Technology Group – Quantumlah
Diffie-Hellman
Copyright, 2000-2006 by NetIP, Inc. and Keith Palmgren, CISSP
Execution Time
Quantum Information Technology Group – Quantumlah
Computational Complexity
2
L
INPUT SIZE
EXP
NP
n
L
P
Quantum Information Technology Group – Quantumlah
Quantum Computer
Shor’s algorithm
Moore’s law
Quantum Information Technology Group – Quantumlah
Quantum Cryptography
In April 2004, the EU decided to spend €11 million
developing secure communication based on quantum
cryptography — the SECOQC project — a system that
would theoretically be unbreakable by ECHELON or
any other espionage system. European governments
have been leery of ECHELON since a December 3,
1995 story in the Baltimore Sun claiming that
aerospace company Airbus lost a $6Billion contract
with Saudi Arabia in 1994 after the NSA reported that
Airbus officials had been bribing Saudi officials to
secure the contract.
Source: Wikipedia
http://news.bbc.co.uk/1/hi/world/europe/820758.stm
Quantum Information Technology Group – Quantumlah
Quantum Cryptography
Quantum Key Distribution
Bit = 0’s or 1’s
Qubit = 0’s, 1’s, or “0 and 1”.
Quantum Information Technology Group – Quantumlah
Qubit
Which path is taken?
BOTH
Quantum Information Technology Group – Quantumlah
What do you see?
Qubit
Quantum Information Technology Group – Quantumlah
Qubit
or
0
1
Ψ =α 0 +β 1
Ψ = 000 + 001 + 010 + 011
+ 100 + 101 + 110 + 111
L qubits encode 2L numbers
Quantum Information Technology Group – Quantumlah
Heisenberg Uncertainty Principle
measuring polarisation states of photons
H
V
+45
-45
PBS (H/V)
PBS (45/-45)
Quantum Information Technology Group – Quantumlah
0→H
1→V
0 → 45
1 → -45
BB84
Key generation
0 0 1 1 1 0 0 1 …
1 0 1 1 1 0 1 1 …
Base selection
+ + X + + + X X …
Base discussion
Over public channel
45 H -45 V V -45 H -45 …
Base selection
X + X + + X + X …
Encoding
V H -45 V V H -45 -45 …
Quantum Information Technology Group – Quantumlah
BB84
No Cloning Theorem : It is not possible to copy an unknown quantum
state with perfect fidelity.
Bound on copying fidelity is such that Eve will not succeed in tapping the
channel even if using the best possible quantum copying machine.
Wootters and Zurek; Dieks 1982
Quantum Information Technology Group – Quantumlah
BB84
www.research.ibm.com/journal/rd/481/smolin.htm
Quantum Information Technology Group – Quantumlah
Entangled State
Ψ
(−)
1
=
(H
2
s
V i − e iα V
s
H i)
Phys. Rev. Lett. 75, 4337-4341 (1995)
Quantum Information Technology Group – Quantumlah
Entanglement
–“If, without in any way
disturbing a system,
we can predict with
certainty… the value of
a physical quantity,
then there exists an
element of physical
reality corresponding
to this physical
quantity”
LOCAL REALISM
PERFECT
EAVESDROPPING!
Quantum Information Technology Group – Quantumlah
Local Realism
Local realism is refuted by quantum theory
Entangled photons do not have predetermined
values of polarization…
…so eavesdropper has nothing to measure
Quantum mechanics allows eavesdropper free
communication
Any post-quantum theory that refutes local
realism allows eavesdropper free
communication.
Quantum Information Technology Group – Quantumlah
Ekert 91
Ψ
Ψ
( −)
( −)
1
(H V − V H )
=
2
1
( + 45 − 45 − − 45 + 45
=
2
)
Perfect Security for error < 15%
Quantum Information Technology Group – Quantumlah
History of Q. Cryptography
S. Wiesner 1970
C.H. Bennett &
G. Brassard 1984
Prepare and
Measure
Protocols
A. Ekert 1991
Entanglement
Based
Protocols
Quantum Information Technology Group – Quantumlah
Alps (23.4 km)
Vienna
Experiments
Quantum Information Technology Group – Quantumlah
10 Jan 2004
Rise of the Quantum Island
Quantum Information Technology Group – Quantumlah
Governments
US (US$ 100M = SG$ 166M)
US Army, NSA, DARPA, NIST, etc
Japan (SG$ 41.5M)
ERATO, ICORP, PRESTO
Europe (€ 15M = SG$ 30M)
Australia (AU$ 10M = SG$ 13M)
Singapore (SG$ 8M)
A*Star, DSTA, DSO
Quantum Information Technology Group – Quantumlah
Commercial
MagiQ (US)
BBN (US)
id-Quantique (Swiss)
QinetiQ (UK)
D-wave (Canada)
Elsag (Italy)
Fujitsu & Toshiba (UK + Japan)
Lockheed Martin (US)
Q-tool (Germany)
Quantum Information Technology Group – Quantumlah
The Future
Hybrid System
Satellite
QKD network
Quantum Information Technology Group – Quantumlah
Think like a physicists!
Networking and Security
Darwin Gosal
National University of Singapore
Quantum Information Technology Group – Quantumlah
Outline
History of communication
History of telecommunication
Computer networking now and beyond
Information Security
Ancient cryptography
Overview of modern cryptography
Introduction to quantum cryptography.
Quantum Information Technology Group – Quantumlah
History of Communication
Body Language
Quantum Information Technology Group – Quantumlah
History of Communication
Speech
200,000 years ago (FOXP2 gene)
Unreliable storage: human memory
human hearing
human voice
20Hz
300Hz
4kHz
500Hz
3kHz
speech
14kHz
20kHz
Quantum Information Technology Group – Quantumlah
History of Communication
Symbol
Rock carving
Cave painting
Pictograms
Ideograms
Logographic
Alphabet
Quantum Information Technology Group – Quantumlah
Symbol
Cave Paintings
Rock Carving (Petroglyph)
Chauvet Cave (30,000 BC)
Haljesta (10,000BC)
Quantum Information Technology Group – Quantumlah
Symbol
Pictograms (9000 BC)
Ideograms
Logographic (4000BC)
Ideograms from Mi’kmag hieroglyps
Water, Rabbit, & Deer from
Aztec Stone of the Sun
Egyptian hieroglyph
2600 BC Sumerian Cuneiform
Chinese Oracle
Bone Script
1600BC
Quantum Information Technology Group – Quantumlah
Symbol
Alphabet / Adjad
A mapping of single symbols to single phonemes
Nearly all alphabetical scripts used
around the world derived from ProtoSinaitic alphabet
“Ba’alat” means
Lady (title for Hathor,
feminime title for
semitic god Baal)
Quantum Information Technology Group – Quantumlah
History of Communication
Writing tools / medium
Papyrus (3000BC)
The first newspaper, Acta Diurna (59BC)
Paper (100AD)
Pens (1000AD)
Printing press, Gutenberg (1400AD)
Typewriter (1800s)
Computers (1960s)
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Transportation
Foot soldier
Postal system
Sneaker-net
F-16 payload: 4600kg
76,470pcs of 2.5” 160GB HDD
Capacity: 12 Peta-Bytes
Speed: Mach 2
Range: 3200km
Bandwidth: 2.6 TB/s
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Drums signal
Drum talking (i.e. Yoruba language)
Smoke signals
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Heliograph (Greek, 405BC)
Modern Heliograph
using Morse code (1810)
Semaphore (1972)
Distance: 20 miles
Bandwidth: 15 cpm
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Electric Telegraph
1st commercial version (1937)
by Wheatstone & Cooke
9 April 1839 – 21km
First transatlantic
telegraph cable (1866)
Telex (Teleprinter Exchange, 1932)
a switched telegraph service.
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Telephone (1876)
Alexander Graham Bell
Elisha Grey
Antonio Meucci
Bell Telephone Company (1877)
American Telephone & Telegraph (1885)
AT&T break-up (1984)
Quantum Information Technology Group – Quantumlah
History of Telecommunication
Radio / Wireless Telegraph (1890s)
Nikola Tesla (1893)
Guglielmo Marconi (1901)
1st wireless comm. between UK & US
Won Nobel Prize in Physics (1909)
Mobile Phone (Marty Cooper 1973)
Quantum Information Technology Group – Quantumlah
From Analog to Digital
Claude Shannon
Father of Modern Information Theory
Publish: A Mathematical Theory of
Communication (1948)
Won 1936 Nobel on: “A Symbolic
Analysis of Relay and Switching Circuit”
Notion of BITS = Binary digITS.
Quantum Information Technology Group – Quantumlah
Computer Networking
1960/4 - Research on Packet Switching
1968 - DARPA contracts with BBN to
create ARPAnet
1970 - The first 5 nodes: BBN, Stanford,
UCLA, UC Santa Barbara, & U of Utah.
1972 - TCP created by Vint Cerf
1981 - ARPAnet have 213 nodes and
IPv4, TCP/UDP is used.
1983 – TCP/IP compliant network
Internet
ARPAnet + X.25 + UUCP + NSFnet
1989 – Tim Berners-Lee, CERN, invented
HTML thus World-Wide-Web.
1993 – Mosaic, the 1st graphical browser
100000
10000
Hosts
Quantum Information Technology Group – Quantumlah
Computer Networking
5000
1000
562
213
100
1981
1982
1983
1984
1985
Years
1986
1987
1988
1989
Quantum Information Technology Group – Quantumlah
Computer Networking
1992 – Internet Society (ISOC) given
formal oversight of the Internet Activities
Board (IAB) and the Internet Engineering
Task Force (IETF)
1995 – Fed Gov out from networking
infrastructure business eCommerce
Quantum Information Technology Group – Quantumlah
Networking now and beyond
Personal Area Network
Bluetooth, PDA-phone, Notebook
Local Area Network
Gigabit, WiFi (802.11a/b/g/n)
Wide Area Network
Frame-Relay, ATM, GSM (EDGE,
GPRS), CDMA (3G)
MAN
FDDI, FSO, WiMax
Quantum Information Technology Group – Quantumlah
Networking now and beyond
IPv6 (232 2128), Internet 2
Peer to Peer (Usenet 1979)
Wireless Mesh network (802.11s)
Convergence VoIP
Starhub cable: TV, Phone, Broadband
RFID (spychips?)
GPS
© NASA
Quantum Information Technology Group – Quantumlah
Networking now and beyond
The Future
Quantum Information Technology Group – Quantumlah
Information Security
Confidentiality (Authentication)
Ensuring the information is accessible only to
authorized personal (prevent unauthorized disclosure)
Integrity (Non-repudiation)
Safeguarding the accuracy and completeness of the
information (prevent unauthorized modification)
Availability (Reliability)
Ensuring authorized user to have access to the
information when required (prevent disruption of
service and productivity)
Quantum Information Technology Group – Quantumlah
Information Security
Confidentiality
PIN,Password, Passphrase, Biometrics,
Tokens, Encryption
Integrity
MD5, SHA1
Availability
Denial of Service
Quantum Information Technology Group – Quantumlah
Information Security
Network Security
Firewall, IDS, VPN
Application Security
SELinux, Secure coding
Host (End-point) Security
Anti-virus, Anti-spyware, ACL, Physical
security, Social engineering
Quantum Information Technology Group – Quantumlah
Information Security
Hacker activity
Firewall
Worms & viruses
Intrusion Detection
SPAM
SPAM filtering
Spyware
Anti-Spyware
Phishing
Phishing filtering
Quantum Information Technology Group – Quantumlah
Information Security
Trusted Computing (TPM)
Palladium
Digital Right Management (DRM)
Play4Sure, DVD’s Content Scrambling
System (CSS)
Digital Millennium Copyright Act (DMCA)
Quantum Information Technology Group – Quantumlah
Security Model
Threat avoidance (Military model)
Security is absolute (either you’re secure or not)
Quantum Information Technology Group – Quantumlah
Risk Management
Quantum Information Technology Group – Quantumlah
Security Model
Risk Management (Business model)
Security is relative (many risks and solutions)
Accept the risk
Mitigate the risk with technology
Mitigate the risk with procedures
Transfer the risk
Quantum Information Technology Group – Quantumlah
Cryptography
Claude Shannon
Father of modern cryptography
“Communication Theory of Secrecy Systems”
Cryptology (scrambling)
Cryptography
Cryptanalysis
Steganography (hiding)
Quantum Information Technology Group – Quantumlah
Cryptography
Quantum Information Technology Group – Quantumlah
History of Cryptography
Atbash cipher
Hebrew (600BC)
Permutation cipher (Greek)
Scytale (6BC)
Subtitution cipher
Caesar Shift
(1400s)
Quantum Information Technology Group – Quantumlah
History of Cryptography
Queen Mary’s Cipher (Babington Plot)
Plot to free Queen Mary,
incite a rebellion, and
murder Queen Elizabeth.
The conspirators
communicated with
Queen Mary, who was
being held prisoner by
Elizabeth, via enciphered
smuggled letters.
Quantum Information Technology Group – Quantumlah
History of Cryptography
Nomenclator – 23 symbols representing
letters, and 35 symbols representing words
Cracked by Thomas Phelippes
at the first Cipher school in England
established in 1586 by Francis Walsingham,
Elizabeth’s Secretary and head of security.
Quantum Information Technology Group – Quantumlah
History of Cryptography
Mary replied to a letter from Babington
using the compromised cipher.
Phelippes added a forged postscript from
Queen Mary asking Babington for the
identities of the conspirators.
He supplied them.
Quantum Information Technology Group – Quantumlah
History of Cryptography
Mary was beheaded
Babington and the six conspirators were
emasculated, disemboweled, and then
executed.
Quantum Information Technology Group – Quantumlah
History of Cryptography
Al-Kindi (800AD)
Frequency Analysis
Lipograms
English: ETAOINSHR
German: ENIRSATUD
French: EAISTNRUL
Spanish: EAOSNRILD
Italian: EAIONLRTS
Finnish: AITNESLOK
That's right, this is a lipogram - a book, paragraph or similar thing in writing that fails to contain
a symbol, particularly that symbol fifth in rank out of 26 (amidst 'd' and 'f') and which stands for
a vocalic sound such as that in 'kiwi'. I won't bring it up right now, to avoid spoiling it..."
Quantum Information Technology Group – Quantumlah
Lipograms
The most famous lipogram: Georges Perec, La Disparition (1969) 85000
words without the letter e:
Gottlob Burmann (1737-1805) R-LESS POETRY. An obsessive dislike for the
letter r; wrote 130 poems without using that letter, he also omitted the letter r
from his daily conversation for 17 years…
Quantum Information Technology Group – Quantumlah
History of Cryptography
Enigma (WW2)
Vernam Cipher
3DES
AES
Claude Shannon of Bell Labs (ca. 1945) proved the one time pad
guaranties perfect security as long as:
•The key is a truly random number
•The key is as long as the message
•The key is used only once
Gilbert Vernam
(AT&T) 1918
Quantum Information Technology Group – Quantumlah
DES Cracker
This board is part of
the EFF DES cracker,
which contained over
1800 custom chips
and could brute force
a DES key in a matter
of days.
Quantum Information Technology Group – Quantumlah
Key Distribution
Public Key Cryptosystem
RSA (Factoring)
Others:
McEliece
ElGamal
ECC
Quantum Information Technology Group – Quantumlah
Modern Cryptography
Public-Key Cryptosystem (RSA, ECC)
Public Key Infrastructure
Authentication method
Diffie-Hellman key exchange
Session key created for symmetric
cryptography
Use AES or 3DES
Quantum Information Technology Group – Quantumlah
Diffie-Hellman
Quantum Information Technology Group – Quantumlah
Diffie-Hellman
Quantum Information Technology Group – Quantumlah
Diffie-Hellman
Quantum Information Technology Group – Quantumlah
Diffie-Hellman
Copyright, 2000-2006 by NetIP, Inc. and Keith Palmgren, CISSP
Execution Time
Quantum Information Technology Group – Quantumlah
Computational Complexity
2
L
INPUT SIZE
EXP
NP
n
L
P
Quantum Information Technology Group – Quantumlah
Quantum Computer
Shor’s algorithm
Moore’s law
Quantum Information Technology Group – Quantumlah
Quantum Cryptography
In April 2004, the EU decided to spend €11 million
developing secure communication based on quantum
cryptography — the SECOQC project — a system that
would theoretically be unbreakable by ECHELON or
any other espionage system. European governments
have been leery of ECHELON since a December 3,
1995 story in the Baltimore Sun claiming that
aerospace company Airbus lost a $6Billion contract
with Saudi Arabia in 1994 after the NSA reported that
Airbus officials had been bribing Saudi officials to
secure the contract.
Source: Wikipedia
http://news.bbc.co.uk/1/hi/world/europe/820758.stm
Quantum Information Technology Group – Quantumlah
Quantum Cryptography
Quantum Key Distribution
Bit = 0’s or 1’s
Qubit = 0’s, 1’s, or “0 and 1”.
Quantum Information Technology Group – Quantumlah
Qubit
Which path is taken?
BOTH
Quantum Information Technology Group – Quantumlah
What do you see?
Qubit
Quantum Information Technology Group – Quantumlah
Qubit
or
0
1
Ψ =α 0 +β 1
Ψ = 000 + 001 + 010 + 011
+ 100 + 101 + 110 + 111
L qubits encode 2L numbers
Quantum Information Technology Group – Quantumlah
Heisenberg Uncertainty Principle
measuring polarisation states of photons
H
V
+45
-45
PBS (H/V)
PBS (45/-45)
Quantum Information Technology Group – Quantumlah
0→H
1→V
0 → 45
1 → -45
BB84
Key generation
0 0 1 1 1 0 0 1 …
1 0 1 1 1 0 1 1 …
Base selection
+ + X + + + X X …
Base discussion
Over public channel
45 H -45 V V -45 H -45 …
Base selection
X + X + + X + X …
Encoding
V H -45 V V H -45 -45 …
Quantum Information Technology Group – Quantumlah
BB84
No Cloning Theorem : It is not possible to copy an unknown quantum
state with perfect fidelity.
Bound on copying fidelity is such that Eve will not succeed in tapping the
channel even if using the best possible quantum copying machine.
Wootters and Zurek; Dieks 1982
Quantum Information Technology Group – Quantumlah
BB84
www.research.ibm.com/journal/rd/481/smolin.htm
Quantum Information Technology Group – Quantumlah
Entangled State
Ψ
(−)
1
=
(H
2
s
V i − e iα V
s
H i)
Phys. Rev. Lett. 75, 4337-4341 (1995)
Quantum Information Technology Group – Quantumlah
Entanglement
–“If, without in any way
disturbing a system,
we can predict with
certainty… the value of
a physical quantity,
then there exists an
element of physical
reality corresponding
to this physical
quantity”
LOCAL REALISM
PERFECT
EAVESDROPPING!
Quantum Information Technology Group – Quantumlah
Local Realism
Local realism is refuted by quantum theory
Entangled photons do not have predetermined
values of polarization…
…so eavesdropper has nothing to measure
Quantum mechanics allows eavesdropper free
communication
Any post-quantum theory that refutes local
realism allows eavesdropper free
communication.
Quantum Information Technology Group – Quantumlah
Ekert 91
Ψ
Ψ
( −)
( −)
1
(H V − V H )
=
2
1
( + 45 − 45 − − 45 + 45
=
2
)
Perfect Security for error < 15%
Quantum Information Technology Group – Quantumlah
History of Q. Cryptography
S. Wiesner 1970
C.H. Bennett &
G. Brassard 1984
Prepare and
Measure
Protocols
A. Ekert 1991
Entanglement
Based
Protocols
Quantum Information Technology Group – Quantumlah
Alps (23.4 km)
Vienna
Experiments
Quantum Information Technology Group – Quantumlah
10 Jan 2004
Rise of the Quantum Island
Quantum Information Technology Group – Quantumlah
Governments
US (US$ 100M = SG$ 166M)
US Army, NSA, DARPA, NIST, etc
Japan (SG$ 41.5M)
ERATO, ICORP, PRESTO
Europe (€ 15M = SG$ 30M)
Australia (AU$ 10M = SG$ 13M)
Singapore (SG$ 8M)
A*Star, DSTA, DSO
Quantum Information Technology Group – Quantumlah
Commercial
MagiQ (US)
BBN (US)
id-Quantique (Swiss)
QinetiQ (UK)
D-wave (Canada)
Elsag (Italy)
Fujitsu & Toshiba (UK + Japan)
Lockheed Martin (US)
Q-tool (Germany)
Quantum Information Technology Group – Quantumlah
The Future
Hybrid System
Satellite
QKD network
Quantum Information Technology Group – Quantumlah
Think like a physicists!