|Quantum Computing and Defeating Encryption: Myths vs. Realities for Cyber Security Decision Makers
Sponsored By: TeleStrategies' ISS WorldŽ
June 6, 2017 : Online Webinar
TIME: 9:00-10:00 AM New York Time, Eastern USA Time
Free for Law Enforcement, the government intelligence community and private enterprise investigators. Registration with Government or Corporate e-mail address is required.
Click Here To Register
Quantum Computing and Defeating Encryption: Myths vs. Realities for Cyber Security Decision Makers
The sole reason nation state governments are investing billiions of dollars in quantum computing development is to defeat today's crypto systems. On the otherhand the sole reason nation state governments as well as the venture capital community are investing in quantum safe cryptograph is to defeat quantum computers. If you have responsibilities for sifting through the myths and realities of quantum computing and/or quantum safe cryptography product readiness claims but don't have a degree in physics nor math, this webinar is for you.
Part 1: Quantum Computing and Defeating Encryption
The first myth is all quantum computer architectures under development are addressing the same problems. The reality some companies like Volkswagen, Airbus and Google are supporting quantum computer projects that are not designed to nor capable of cracking encryption. While others, like nation state governments are supporting quantum computer architectures designed solely for defeating encryption. The other reality some quantum computer architectures forming the basis for someones Ph.D thesis in Physics, if developed at a large enough scale to crack today's encryption would require a dedicated nuclear power plant just to provide the required electrical power. Part 1 topics include:
Quantum Mechanic Principles used in developing computers described with pictures and metaphors (e.g. no math): Quantum Entanglement, Superpositioning, Heisenberg Uncertainty Principle, etc.
Qubits: What mathematically and physically are Qubits, Entangled Qubits and Quantum Gates, Why Quantum Computers can reduce the time to crack todays Public Key Cryptography from thousands of years with conventional computer systems to a few hours with future Quantum Computers,
Defeating Encryption Algorithms: Understanding the classic encryption defeating algorithms: (Shor algorithm example using simple math), Which algorithms are best suited to defeat RSA & AES, Why Bitcoin Cryptography is the most vulnerable, e.g. the first crypto system to be cracked (or hacked) with quantum computing.
Quantum Computer Hardware: From Qubit Gates to Computer Processors, Options under development, NMR, Ion Traps, Quantum Dots, etc., What companies are investing besides Google and IBM, Why the key performance factor is "number of entangled Qubits", and the number when reached (60?) makes today's encryption systems totally obsolete.
D-Wave: The most visible company in Quantum Computing today, What is different about their approach, What's Adiabatic Computing, NP class problems and Why this architecture is good for optimization problems but not promising for encryption key cracking.
Part 2: Quantum Safe Crytpography for Defeating Quantum Computers
There are two quantum safe crytpography development camps. the first focusses on "Quantum Resistant Algorithms or QRA" and the second focuses on "Quantum Key Distribution or QKD". The QRA group promote the concept, it's just a software upgrade, e.g. replace PKI and more with a QRA module. Where is QKD requires special puprose fiber optic or satellite based networks infrastructure.
The 64 dollar question: are the proposed QRA really quantum safe, given there are no mass commercial products deployed at this point for the hackers to go after nor agreed upon standards. The reality, until QRA are proven bullet proof, both QRA and QKD are being supported by nation state governments. Part 2 topics include:
Option 1: Quantum Resistant Algorithms:
Option 2: Quantum Key Distribution:
The session introduces the principles and QKD and discusses its integration into a quantum-safe security infrastructure. It covers the following: Principles of QKD (quantum channel, authentication, key distribution); current field trail implementations; point-to-point versus point-to multipoint systems; Increasing the distance range with Trusted Nodes and free space key distribution; Some use cases (government, finance, data centers...); Roadmap for the future of QKD.
All Contents Copyright © 2017