quantum technology applications - maran… · to be quantum safe; one can use post-quantum...

13
QUANTUM TECHNOLOGY APPLICATIONS - [email protected] Drs. ir. M.P.P. van Heesch

Upload: others

Post on 28-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

QUANTUM TECHNOLOGY

APPLICATIONS -

[email protected]. ir. M.P.P. van Heesch

Page 2: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

VISION OF QUANTUM COMPUTING

Medicine

production

Classic Computers Quantum Computers

Optimization

Quantum

Machine

learning

Breaking

cryptography

Quantum technology applications - [email protected]

Page 3: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

FILMPJE RICHARD

Quantum technology applications - [email protected]

Page 4: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

QC AND COMPLEXITY

Quantum technology applications - [email protected]: The Limits of Quantum – Scott Aaronson

PSPACE = the set of all problems that can be

solved using a polynomial amount of space (but

possibly an exponential number of steps).

NP = Problems with efficient algorithms for which a

given solution can be verified as a solution in

polynomial time.

P = Problems with efficient algorithms for finding

solutions, these algorithms use at most polynomial

amount of computational resources.

BQP = The class of decision problems solvable in

polynomial, with at most 1/3 probability of error.

NP-complete = Class of decision problems which

contains the hardest problems in NP. Each NP-

complete problem has to be in NP.

Page 5: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

QUANTUM ENHANCEMENTS FOR ML

Quantum effects helping us solve classical learning tasks

more efficiently.

Possible benefits:

Learning efficiency improvements: less training

information/samples needed; more complex relations

with same number of neurons; less neurons/layers

needed for same error.

Learning capacity improvements: increase of capacity

of associative or content-addressable memories.

Improvements on run-time: optimization done by

quantum annealers, use of quantum sampling in

generative models, Quantum ML algorithms (e.g.,SVM

using Grover’s algorithm)Quantum technology applications - [email protected]

CC CQ

QC QQ

classical quantum

Type of Algorithm

cla

ssic

al

qua

ntu

m

Type o

f D

ata

Page 6: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

A quantum computing platform

Try yourself!

Quantum technology applications - [email protected]

Page 7: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

IMPACT OF QUANTUM COMPUTING ON SECURITY

Shor’s factoring algorithm (1994)

Grover’s search algorithm (1996)

Most of the currently used asymmetric cryptography is broken.

This affects our digital infrastructure (data transfer, transactions, signatures).

Quantum technology applications - [email protected]

Store now,

decrypt later

Page 8: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

GETTING QUANTUM-READY

Need to diversify the cryptographic protocols and solutions

Important to think about strategies to be come quantum-safe now, and introduce flexible solutions.

Both post-quantum and quantum cryptography (QKD) can be used to become quantum safe.

Quantum technology applications - [email protected]

Page 9: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

POST-QUANTUM CRYPTOGRAPHY

Need to diversify the cryptographic protocols and associated mathematical problems.

Lattices Supersingular Isogenies

Quantum technology applications - [email protected]: https://www.esat.kuleuven.be/cosic/elliptic-curves-are-quantum-dead-long-live-elliptic-curves/

Page 10: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

QUANTUM KEY DISTRIBUTION

Provides: A point-to-point solution.

Promise: Information theoretic secure key exchange if implemented perfectly.

Need: classical authentication and post processing.

To consider: distance limitations.

Quantum technology applications - [email protected]

Alice Bob

Page 11: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

QUANTUM NETWORKS

Quantum technology applications - [email protected]: https://phys.org/news/2018-01-real-world-intercontinental-quantum-enabled-micius.html

For

secure

communication

For

computation

For

sensors

Page 12: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

TAKEAWAYS

Quantum technology offers both opportunities and threats

Quantum computing offers possible breakthroughs in the fields of

Simulation of quantum physics and chemistry

Machine Learning, optimization problems and other hard problems

To be quantum safe; one can use post-quantum cryptography or quantum communication

To get quantum ready it is important

to investigate possible use cases of the quantum computer and experiment on the current

hardware.

to take the security threat into consideration and start planning

Quantum technology applications - [email protected]

Drs. Ir. Maran van Heesch

[email protected]

Page 13: QUANTUM TECHNOLOGY APPLICATIONS - MARAN… · To be quantum safe; one can use post-quantum cryptography or quantum communication To get quantum ready it is important to investigate

THANK YOU FOR YOUR

ATTENTION

Take a look:TNO.NL/TNO-INSIGHTS

Drs. Ir. Maran van Heesch

[email protected]