quantum security for classical computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · this...
TRANSCRIPT
![Page 1: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/1.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
Quantum Security for Classical ComputersEvelyn Krivorotova | Patrick Leggett | Wildenslo Osias
![Page 2: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/2.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
● Preparing and Interpreting a problem to be solved by quantum computing using classical methods
● Conducting hands-on exercises using Network Miner, IBM Q Experience, Qiskit Aqua and the Falcon Sandbox API to demonstrate how quantum computing will impact forensics
Project Overview
![Page 3: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/3.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
What is Quantum Computing ?● Quantum Computer vs Classical Computer● Classical bit vs Qubit● Superposition & Entanglement
![Page 4: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/4.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
Literature Review • Quantum Computing, 2001
• Cryptographic distinguishability measures for quantum-mechanical states, 1999
• Quantum Algorithm Implementation for Beginners, 2018
• Stability of Grover’s algorithm in respect to perturbations in quantum circuit, 2017
![Page 5: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/5.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
Quantum Algorithms
● Shor’s Algorithm - quantum algorithm for integer factorization
● Grover’s Algorithm - quantum algorithm that finds with high probability the unique input to a black box function that produces a particular output value
![Page 6: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/6.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
Project Requirements● IBM Q Experience - cloud service that that gives users in
the general public access to a set of IBM's prototype quantum processors
● Qiskit/Qiskit Aqua - an open-source quantum computing software development framework. Qiskit Aqua is a library of quantum algorithms
● Falcon Sandbox Public API - open and free API that can be used to submit files/URLs for analysis, pull report data, but also perform advanced search queries
● Network Miner - open source forensic analysis tool
![Page 7: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/7.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
Example of Qiskit Entire Workflow
![Page 8: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/8.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
IBM Q Experience / Qiskit
• Qiskit - Initial Installation
– Anaconda Prompt– Pip– API Token
![Page 9: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/9.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
Circuit Composer
• Ibmqx4 5-qubit computer• How does Grover’s Algorithm apply?• Building the circuit
![Page 10: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/10.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
Qiskit & Qiskit Aqua • Qiskit (Powered by Jupyter) • QASM• Qiskit Aqua
![Page 11: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/11.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
Qiskit Pseudocode Executing Satisfiability Problem
![Page 12: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/12.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
Preliminary Findings:● 3-SAT probabilities ● 5-SAT probabilities would run slightly lower● Current systems can not carry all gates/device
strings
Future Work:● Building a system to perform computation tasks
before decohering● New components for Qiskit Aqua
Preliminary Findings & Future Work
![Page 13: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting](https://reader036.vdocuments.net/reader036/viewer/2022081406/5f11104886f782404b087ffc/html5/thumbnails/13.jpg)
This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com
● Thank you!