quantum computing : security implications

21
Quantum Computing: Security Implications Robert M. Slade, MSc, CISSP [email protected], [email protected], [email protected] http://victoria.tc.ca/techrev/ rms.htm

Upload: kayo

Post on 05-Jan-2016

61 views

Category:

Documents


0 download

DESCRIPTION

Robert M. Slade , MSc, CISSP [email protected], [email protected], [email protected] http://victoria.tc.ca/techrev/rms.htm. Quantum Computing : Security Implications. This isn't right. It isn't even wrong. - Wolfgang Pauli, on a paper submitted by a physicist colleague. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Quantum Computing :  Security Implications

Quantum Computing: Security Implications

Robert M. Slade, MSc, [email protected], [email protected],

[email protected]

http://victoria.tc.ca/techrev/rms.htm

Page 2: Quantum Computing :  Security Implications

Do we understand quantum computing?

This isn't right. It isn't even wrong.

- Wolfgang Pauli, on a paper submitted by a physicist colleague

Page 3: Quantum Computing :  Security Implications

Quantum introduction (very small)

● Concepts Superposition Entanglement

● observer effect Qubit

● “If someone says that he can think or talk about quantum physics without becoming dizzy, that shows only that he has not understood anything whatever about it.” Niels Bohr

Page 4: Quantum Computing :  Security Implications

Quantum Computing (1)

● Quantum computer quantum tech, traditional operation smaller, faster

● quantum size range Turing

● universal computer● irreversible computations

Page 5: Quantum Computing :  Security Implications

Quantum Computing (2)

● Quantum cryptography photon polarization

● angular polarization● detector angle● public exchange of angle but not value

photon entanglement● eavesdropping detection

Page 6: Quantum Computing :  Security Implications

Quantum Computing (3)

● Quantum computing computing device or processor analogue computer

● not digital?

Page 7: Quantum Computing :  Security Implications

Analogue Computers

● Spaghetti computing parallel sorting special purpose/application

● Slide rule exact computation

● imprecise reading● Adiabatic quantum computer

least energy = best answer● least path, best comparison, simulation

D-Wave Orion

Page 8: Quantum Computing :  Security Implications

Applications and Implications

● by domain● general functions

least path● Traveling Salesman Problem● scheduling, efficiency studies, multiple requirements● NP-complete, non-convergent, Ising model

simulation● climate models

pattern recognition● people are good, computers are bad● data reduction and representation

Page 9: Quantum Computing :  Security Implications

Security management

● risk management (shortest path) what if - cost vs benefit

● information classification (pattern matching)● risk assessment required

investing, or not, in quantum computing

Page 10: Quantum Computing :  Security Implications

Security architecture

● new architectures, new vulnerabilities● simulation of vulnerabilities and protections● quantum devices and noise

D-Wave Orion voting, error checking● quantum error correction (recent)

fault tolerant computing

Page 11: Quantum Computing :  Security Implications

Access control

● biometrics (pattern matching)● information flow and covert channel analysis

(least path/simulation)● intrusion detection (pattern matching)

Page 12: Quantum Computing :  Security Implications

Cryptography

● quantum communications/encryption/key negotiation/eavesdropping detection

● parallel decryption● new algorithms

tractable by neither classical nor quantum● quantum devices and generation of

randomness● analysis of implementation problems

(simulation)

Page 13: Quantum Computing :  Security Implications

Physical

● noise, RFI/EMI interference● temperature

room temp 100x > interstellar space interstellar space 1000x > Orion device

● special costs, protections for devices● physical access control (biometrics)

Page 14: Quantum Computing :  Security Implications

BCP

● Business Impact Analysis (least path)● testing of BC plans (simulation)● disaster management

direction of resources to maximum effect● continuity of operations for special devices

damage if power/cooling fails

Page 15: Quantum Computing :  Security Implications

Applications security

● testing (simulation)● database analysis (pattern matching)

cost (privacy) vs benefit (safety)● database aggregation problem analysis

(pattern matching and simulation)● learning (pattern matching)

neural net augmented, check against neural net superstitious learning

● check against expected impossible to compute by classical methods

● malware/botnet detection, (pattern matching) operation/control/ownership

● completely new paradigms in programming

Page 16: Quantum Computing :  Security Implications

Operations security

● combinations of classical and quantum devices and operations complexity, troubleshooting

● troubleshooting (simulation)● insider attack detection (pattern matching)

Page 17: Quantum Computing :  Security Implications

Telecommunications and networking

● Intrusion Detection Systems● Botnet detection and assessment

Command & Control ownership “fast flux”

● Network attack analysis● quantum encryption special channels● quantum devices likely remote access

Page 18: Quantum Computing :  Security Implications

Telecommunications and networking

● Spam limitations even in Bayesian analysis

Page 19: Quantum Computing :  Security Implications

Telecommunications and networking

● quantum encryption requires special channels

● quantum devices likely to be remote access

Page 20: Quantum Computing :  Security Implications

Law and investigation

● new forensic analysis tools (pattern matching/simulation)

● presentation/acceptance in court problematic

Page 21: Quantum Computing :  Security Implications

Quantum Computing: Security Implications

Robert M. Slade, MSc, [email protected], [email protected],

[email protected]

http://victoria.tc.ca/techrev/rms.htm