Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA
|
|
- Douglas Thornton
- 8 years ago
- Views:
Transcription
1 Quantum Enabled Security Solutions Dr. Grégoire Ribordy ID Quantique SA
2 10 Years of Quantum Innovation IDQ presents its first quantum cryptography (QC) prototype First QC system sold SwissQuantum pilot network goes live in Geneva Cerberis QC solution is released World Premiere: Geneva counts on quantum cryptography as it counts its votes IDQ s quantum cryptography technology used at 2010 world cup World s first QC service launched by SwissQuantum2 IDQ Pilot network in Geneva World s first quantum random number generator (RNG) is launched Second generation quantum RNG launched as PCI expansion card Quantum RNG as USB device Quantum RNG certified by Swiss Federal Office of Metrology Quantum RNG as PCIe expansion card The id201, IDQ s first single-photon dectector, is launched ID Quantique is founded in Octobre 2001 Silicon APD based singlephoton detectors launched. ID Quantique raises 1M EUR from venture capital fund i2i IDQ organizes its first Quantum Cryptography winter school. ID Quantique changes its logo and reorganizes in three business units The id210 replaces the id201 for telecom singlephoton detection 2
3 Why secure information? Legal Requirements & Compliance Laws Regulations Threats Economic Espionage -by governments - by organized crime Sabotage Information Best Practices Security Governance Standards Guidelines
4 Cyber Espionnage is real! APT1: Exposing One of China's Cyber Espionage Units 4
5 Data-in in-flight Encryption Main Office Links for Network (Ethernet) and Storage (Fibre Channel) Encryption Disaster Recovery Site Secret Key Cryptography AES 256 bit Message Encrypted Message Message Analogy Key Key 5
6 Key Distribution Problem Main Office Links for Network (Ethernet) and Storage (Fibre Channel) How to exchange the key? Disaster Recovery Site Conventional Techniques Quantum Key Distribution Based on mathematics Examples: RSA, Diffie Hellman Vulnerable to: Mathematical progress Increase in computing power Quantum Computing 6
7 Classical and Quantum Communications "0" "1" "1" "0" Fragile! 7
8 Key Distribution Problem Main Office Links for Network (Ethernet) and Storage (Fibre Channel) How to exchange the key? Disaster Recovery Site Conventional Techniques Quantum Key Distribution Based on mathematics Based on Quantum Physics Examples: RSA, Diffie Hellman Interception Perturbation Vulnerable to: Mathematical progress Increase in computing power Quantum Computing Secure against all present and future technologies Quantum Key Distribution (QKD) = Quantum Cryptography 8
9 Quantum-Enabled Link Encryption xwdm Uses keys to secure highspeed links using stateof- the art secret key cryptography. Link Encryption Quantum Channel Dark Fiber Quantum Key Distribution Distributes keys secured by quantum physics between two location 9
10 Open Question #1 xwdm Uses keys to secure highspeed links using stateof- the art secret key cryptography. Link Encryption Quantum Channel Dark Fiber Optical Connection Point-to-Point Range limited to about 100km Quantum Key Distribution Distributes keys secured by quantum physics between two location 10
11 Range Extension using Trusted Nodes Cryptographic Key Distribution 11
12 Vienna Quantum Network Demonstrator Vienna, October QKD Technologies 5 Nodes / 7 Links + 30 other partners 12
13 Long Range Daisy Chaining QKD Battelle QKD Backbone Columbus OH to Washington DC Area > 770 km Deployment targeted in 2015 Battelle Aberdeen Office Battelle Main Campus 13
14 Satellite based QKD According to ESA Study by AIT, IQOQI, TESAT, EUTELSAT No major technological roadblocks Alice Bob Images by courtesy of R. Hughes, Los Alamos National Laboratory, USA 14
15 Open Question #2 Security is based on quantum physics Experiment Theory Alice LD 1 LD 2 LD 3 LD 4 Bob Basis 1 "1" APD Quantum PBS "0" BS F Channel λ/2 BS PBS "1" BS Waveplates "0" APD Basis 2 Public Channel QKD is provably secure, but implementations can contain loopholes due to discrepancies between model and realizations. Approaches to tackle this problem have been identified (eg. modification of the model to include imperfections), but further research is needed. Security Evaluation and Certification, by an independent body, is essential, but conventional approaches still need to be extended to quantum technologies. 15
16 Protecting Critical Infrastructures Swiss Programme on Critical Infrastructure Protection 16
17 Smart Grid Security Use Case for Quantum Security? CEN CENELEC ETSI Smart Grid Coordination Group Smart Grid Information Security 17
18 Europe: Leading Deployments 18
19 Support for Quantum Enabled Security Technologies Europe is paving the way for Quantum Enabled Security Technologies Unique scientific expertise Corporate laboratories Innovative SMEs Combined support from EC and members states Its lead is threatened Recent difficulties Virtually no support for QKD in FP7 (strong contrast with FP6) Limited activities of European actors in telecom photonic components (both academic and industrial actors) Lack of testbed activities 19
20 Quantum Key Distribution beyond 2020? Monolithic Integration Time Electronics Optoelectronics Quantum Optics IBM Silicon Integrated Nanophotonics Group 20
21 Conclusions Quantum Key Distribution Provides a solution for long-term data security Is being deployed by companies and governments worldwide Open questions remain Integrationwith current infrastructures Evaluation and Certification of Quantum Security Solutions but different approach exist to tackle them. Quantum Key Distribution is a strategic technology and addresses a growing need and large market opportunity Europe has historically been paving the way and is still leading, but challenges are arising Grégoire Ribordy, CEO ID Quantique SA gregoire.ribordy@idquantique.com Ch. Marbrerie 3 Phone: +41 (0) CH 1227 Carouge 21
Securing Your Data In Transit For The Long Term
Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014 ID Quantique Photon Counters Services Quantum
More informationQuantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014
Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology
More informationHigh speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com
High speed link encryption State of the art ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com Agenda Company Solutions Risks Encryption Today (State of the Art) Quantum Cryptography, QKD
More information1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4
Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve
More informationWorld Class Standards. QKD in ETSI. Gaby Lenhart Strategy and New Initiatives ETSI 2009. All rights reserved ECOC 2009
QKD in ETSI ECOC 2009 Gaby Lenhart Strategy and New Initiatives ETSI 2009. All rights reserved Current Use of QKD ECOC 2009 QKD already in use I 11. October 2007 Swiss Federal Elections ( http://www.idquantique.com/news/news-elections2008.htm)
More information24 th IEEE Annual Computer Communications Workshop (CCW)
24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California
More informationNational Network of Quantum Technologies Hubs: Quantum Communications Hub. Director: Professor Tim Spiller Affiliation
National Network of Quantum Technologies Hubs: Quantum Communications Hub Director: Professor Tim Spiller Affiliation Quantum Communications Hub: Partners Academic partners: York (lead), Bristol, Cambridge,
More informationQuantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell
Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based
More informationMarker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications
Marker Drivers and Requirements for Encryption and QKD in Enterprise Connectivity Applications Christian Illmer September 2009 ADVA Optical Networking ADVA is a leading global provider of xwdm optical
More informationA High Speed Quantum Communication Testbed
A High Speed Communication Testbed Carl J. Williams, Xiao Tang, Mikko Hiekkero, Julie Rouzaud, Richang Lu, Andreas Goedecke, Alan Migdall, Alan Mink, Anastase Nakassis, Leticia Pibida, Jesse Wen a, Edward
More informationQUANTUM SECURE (PRE) STANDARDIZATION IN ETSI
QUANTUM SECURE (PRE) STANDARDIZATION IN ETSI May 2014 Presented by Gaby Lenhart for Post-Quantum Research - Identifying Future Challenges and Directions What Is ETSI? Globally applicable standards for
More informationIn-Flight Encryption. Jim Theodoras. Feb 2014
In-Flight Encryption Jim Theodoras Feb 2014 OSI Model 7 6 5 Top of Stack Application Presentation Session Data 4 Transport Layer TCP, UDP Segments 3 Network Layer IP/MPLS Packets 2 Data Link MAC Frames
More informationBusiness Continuity and Disaster Recovery Solutions in Government
> Business Continuity and Disaster Recovery Solutions in Government Protecting Critical Data Flow for Uninterrupted Services WHITE PAPER January 2010 J. Asenjo, CISSP www.thalesgroup.com/iss Information
More informationQuantum Safe Cryptography and Security
ETSI White Paper No. 8 Quantum Safe Cryptography and Security An introduction, benefits, enablers and challenges June 2015 ISBN No. 979-10-92620-03-0 ETSI (European Telecommunications Standards Institute)
More informationAnnouncement: 7 th Winter School on Practical Quantum Communications in the Swiss Alps in January 2015
Geneva, August 12 th, 2014 Announcement: 7 th Winter School on Practical Quantum Communications in the Swiss Alps in January 2015 Dear Sir/ Madam, Based on the success of our previous Winter Schools on
More informationQuantum Telecommunications Networks. Dr Tim Whitley MD, Research and Innovation, BT
Quantum Telecommunications Networks Dr Tim Whitley MD, Research and Innovation, BT BT has a long history of innovation including significant optical transmission firsts World Firsts 1846: Telecommunications
More informationProgress in Quantum Cryptography
Progress in Quantum Cryptography The 5th Symposium of Laboratory of Physical Foundations of Information Processing 27 th - 28 th January 2014 Wroclaw University of Technology Wrocław, Poland The 5th LFPPI
More informationMXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
More informationRoyal Holloway Series 2011
Quantum key distribution: Awesome or pointless? Some believe the advent of quantum computing will reduce the time taken to solve cryptographic algorithms so dramatically that they will no longer provide
More informationQuantum Secure Communication Networks:
QCrypt 2014 Quantum Secure Communication Networks: Products and Solutions Yong Zhao 2014-09- 04 1 Founda2on Ini2ally founded by the university (USTC) and private investors in 2009 Research Lab (USTC) Company
More informationThe New Approach of Quantum Cryptography in Network Security
The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time
More informationQuantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio
Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio Review Key Citations Web Sites Glossary Conferences Editor Review Article 1. Cryptography - an Overview I
More informationAdversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Key Distillation Process on Quantum Cryptography Protocols in
More informationTHE FIBER OPTIC INFRASTRUCTURE COMPANY. Case Study Vienna: Building a Fiber Optic Network
THE FIBER OPTIC INFRASTRUCTURE COMPANY Case Study Vienna: Building a Fiber Optic Network THE STORY OF THE CABLERUNNER TECHNOLOGY The CableRunner Technology was invented by the Sewer Department of the City
More informationCSci 530 Midterm Exam. Fall 2012
CSci 530 Midterm Exam Fall 2012 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 100 minutes to complete the exam. Please prepare your answers
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
More informationQuantum Safe Cryptography V1.0.0 (2014-10)
White Paper Quantum Safe Cryptography and Security; An introduction, benefits, enablers and challenges ISBN 979-10-92620-03-0 Disclaimer This document reflects the views of the authors. It does not necessarily
More informationDATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN COPYRIGHT 2014 ALCATEL-LUCENT. ALL RIGHTS RESERVED.
DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN AGENDA 1. Key Feature learning's from ancient Greece? 2. User challenges to be addressed for IT, Data Centre and Cloud
More informationINFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press
DISCRETE MATHEMATICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN A MULTIDISCIPLINARY INTRODUCTION TO INFORMATION SECURITY Stig F. Mjolsnes Norwegian University ofscience & Technology Trondheim
More informationNetwork Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4
Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Computer Science and Engineering, KL University Green Fields, Vaddeswaram, PO Dt-522 502, Andhra Pradesh,
More informationEUROVISION NETWORK TECHNOLOGIES, FUTURE
EUROVISION NETWORK TRANSMISSION TECHNOLOGIES, PRESENT AND FUTURE 1 CONTENT 01 EUROVISION NETWORK SHORT PRESENTATION 02 EUROVISION NETWORK FUTURE DEVELOPMENTS 2 EUROVISION NETWORK SHORT PRESENTATION 3 THE
More informationPrivacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
More informationConcept for a cryptographic infrastructure for measurement components in smart grids
Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Concept for a cryptographic infrastructure for measurement components in smart grids Norbert Zisky Physikalisch-Technische Bundesanstalt Norbert
More informationQuantum computing in practice
Quantum computing in practice & applications to cryptography Renaud Lifchitz OPPIDA NoSuchCon, November 19-21, 2014 Renaud Lifchitz NoSuchCon, November 19-21, 2014 1 / 68 Speaker s bio French senior security
More informationBASED IN GENEVA. Robust Network Designs & Solutions
Robust Network Designs & Solutions Who are we? IP-Max SA, originally created as an association (2005) by its joint owners, Frédéric Gargula and Grégoire Huet An innovative IT/IP design and management company
More informationIMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationQuantum technologies may be in their. nascence, but strategies regarding. their potential use cases within. defense and intelligence are not.
WHITE PAPER NOVEMBER 2015 Place Your Bets: Creating a Quantum Technology Strategy for Defense Firms Evan Rolfe Quantum technologies may be in their nascence, but strategies regarding their potential use
More informationChapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
More informationQuantum Computers vs. Computers Security. @veorq http://aumasson.jp
Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert
More informationHow to Drop your Anchor
How to Drop your Anchor Enabling Trust in Cloud-Based Services Andreas Curiger CTO Securosys SA DIGS DC Day, Sep 16, 2015 10:30-10:55 The Promising World of Cloud Computing Cloud computing offers network
More informationAuthentic Digital Signature Based on Quantum Correlation
Authentic Digital Signature Based on Quantum Correlation Xiao-Jun Wen, Yun Liu School of Electronic Information Engineering, Beijing Jiaotong University, Beijing 00044, China Abstract: An authentic digital
More informationNetwork Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
More informationCyberSource Payment Security. with PCI DSS Tokenization Guidelines
CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance
More informationCybersecurity in a Quantum World: will we be ready?
Cybersecurity in a Quantum World: will we be ready? Michele Mosca University Research Chair 3 April 2015 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental
More informationNEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT-1. 1. Explain any six benefits of Software as Service in Cloud computing?
NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT-1 1. Explain any six benefits of Software as Service in Cloud computing? 2. List the different cloud applications available in the
More informationHow To Secure A Computer System From A Hacker
Lecture 10 Security (Part 2) Outline Securing computer systems Cryptography Virtual Private Networks (VPN) Access controls Mandatory access control Discretionary access control Role based
More informationCSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
More informationA Probabilistic Quantum Key Transfer Protocol
A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: aparakh@unomaha.edu August 9, 01
More informationMINIMUM SECURITY REQUIREMENTS OF THE PROJECT
HELLENIC ELECTRICITY DISTRIBUTION NETWORK OPERATOR S.A. NOTICE OF CALL FOR TENDERS No ND-xxx PROJECT: Pilot Telemetering and Management System for the Electric Power Supply Demand by Residential and Small
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
More informationEncryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION
Encryption PCS-1/1P Ver.3.20 or later PCS-11/11P Ver.3.20 or later PCS-HG90 Ver.2.00 or later PCS-G50/G50P Ver.2.21 or later PCS-G70/G70P Ver.2.21 or later PCS-TL30 Ver.1.04 or later PCS-TL33 All PCS-TL50
More informationTowards Trustworthy Clouds
IBM Research Zurich Christian Cachin 12 September 2013 Towards Trustworthy Clouds 2009 IBM Corporation Cloud computing? 2 Cloud services are convenient No investment cost Pay only for consumption Scalable
More informationMeeting Today s Data Security Requirements with Cisco Next-Generation Encryption
White Paper Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption Today s Encryption Environments The number of cyber attacks targeting US organizational data has doubled over
More informationAlliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
More informationModule 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
More informationCONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense
CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions
More informationIoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
More informationHIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE CRITICAL NATIONAL INFRASTRUCTURE The UKs national infrastructure is defined by Government as those facilities, systems, sites
More informationQUANTUM LIGHT :! A BRIEF INTRODUCTION!
Quantum Physics QUANTUM LIGHT : A BRIEF INTRODUCTION Philippe Grangier Laboratoire Charles Fabry de l'institut d'optique, UMR 85 du CNRS, 927 Palaiseau, France Quantum Physics * Alain Aspect, in «Demain
More informationAuthentication in Online Banking Systems through Quantum Cryptography
Authentication in Online Banking Systems through Quantum Cryptography Anand Sharma 1, S.K.Lenka 2 FET, MITS, Lakshmangarh Sikar, Rajasthan, India 1 anand_glee@yahoo.co.in, 2 lenka.sarojkumar@gmail.com
More informationQuantum cryptography
Quantum cryptography Optical fibers to carry information 10 Kb/s 1Tb/s 10 12 b/s Optical fibers vs electrical cables Frequency: 10 8 Hz vs 10 15 Hz Bit rate for electrical interconnections B B 0 A l 2
More informationENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was
More informationPart I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
More informationNext Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE.
Straddling the Next Frontier H O W QU A N TUM T E C H N O LOGIES H AV E A L R E A DY B E GU N I M PAC TING T HE C Y B E R S E C U RI TY L A N D S CAPE. E R I C J O D O I N B S I D E S O T T A WA 2 0 1
More informationAn Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
More informationThe Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
More informationCyber Security Recommendations October 29, 2002
Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown
More informationPrivacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
More information3. Designed for installation by the user without further substantial support by the supplier; and
Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information
More informationNES Patagonia Security
NES Patagonia Security Networked Energy Services Corporation (NES) November 2014 www.networkedenergy.com Executive Summary With NES Patagonia, our newly announced next generation platform, the security
More informationUnit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
More informationQuantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration Alan Mink, Sheila Frankel and Ray Perlner National Institute of Standards and Technology (NIST), 100 Bureau
More informationEurope Canada collaborative R&D Opportunities: Driving sustainability through integrated information and energy infrastructures
Europe Canada collaborative R&D Opportunities: Driving sustainability through integrated information and energy infrastructures Contact:: Charles Despins, Prompt Inc. cdespins@promptinc.org +1.514.875.0032
More informationCommercial Prospects for Quantum Information Processing
Commercial Prospects for Quantum Information Processing I think I can safely say that no one understands quantum mechanics. - Richard P Feynman Quantum Information Processing Interdisciplinary Research
More informationfuture data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
More informationUncompromising Integrity. Making 100Gb/s deployments as easy as 10Gb/s
Uncompromising Integrity Making 100Gb/s deployments as easy as 10Gb/s Supporting Data Rates up to 100Gb/s Mellanox 100Gb/s LinkX cables and transceivers make 100Gb/s deployments as easy as 10Gb/s. A wide
More informationResilient network architecture based on Movable and Deployable Resource Unit (MDRU)
ITU Workshop on Disaster Relief Systems, Network Resiliency and Recovery (Phuket, Thailand, 20 May 2013) Resilient network architecture based on Movable and Deployable Resource Unit (MD) Toshikazu SAKANO,
More informationCommon Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting shayz@comsecglobal.com Copyright 2006 - The OWASP
More informationShor s algorithm and secret sharing
Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful
More informationSecurity Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
More informationSecuring Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
More informationIoT Security. Introduction. Threat Model
IoT Security Introduction In this 1248 white paper we summarise the various aspects of security which need to be considered when designing connected products for the Internet of Things. We give a general
More informationA Novel Approach to combine Public-key encryption with Symmetric-key encryption
Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach
More informationHardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
More informationECE 297:11 - Lecture 1. Security Services. Basic Concepts of Cryptology. Security Threats and Security Services. Need for information security
ECE 297:11 - Lecture 1 Security Services Basic Concepts of Cryptology Need for information security widespread use of data processing equipment: computer security widespread use of computer networks and
More informationTHREATS. Your Business Can t Afford to Ignore. Your business depends on intelligence, but can you count on your technology?
10 DATA SECURITY THREATS Your Business Can t Afford to Ignore Your business depends on intelligence, but can you count on your technology? Today, technology plays a vital role in the way you service and
More informationMotorola s Wireless Broadband Point-to-Point Solutions. The PTP 100, 400 & 600 Series Part of Motorola s MOTOwi4 portfolio
Motorola s Wireless Broadband Point-to-Point Solutions The PTP 100, 400 & 600 Series Part of Motorola s MOTOwi4 portfolio High-Speed Point-to-Point Solutions Engineered for Simple-to-Complex Applications
More informationIDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD
IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD 8 BILLION IDENTITY DOCUMENTS IN CIRCULATION IN 2014 END-USER BENEFITS OT invents products and
More informationCertificate in Cyber Security
Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff
More informationSecure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
More informationWORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development
WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development Dr. Odysseas I. PYROVOLAKIS European Commission DG CONNECT Software & Services, Cloud odysseas.pyrovolakis@ec.europa.eu
More informationHuawei AR G3 FAQ TOP14
Huawei AR G3 FAQ TOP14 Question 1: "AR G3" Is the Name of the Huawei AR G3 Series Routers of Huawei Technologies Co., Ltd. What Does "AR G3" Represent? "AR G3" is short for "the Third-Generation Access
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationProtect Identities for people, workstations, mobiles, networks
ot Corporate ID Protect Identities for people, workstations, mobiles, networks Address your security needs with the leader in the corporate identity market Corporate security challenges The security of
More informationAgenda. NRENs, GARR and GEANT in a nutshell SDN Activities Conclusion. Mauro Campanella Internet Festival, Pisa 9 Oct 2015 2
Agenda NRENs, GARR and GEANT in a nutshell SDN Activities Conclusion 2 3 The Campus-NREN-GÉANT ecosystem CAMPUS networks NRENs GÉANT backbone. GÉANT Optical + switching platforms Multi-Domain environment
More informationCryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
More informationQuantum communication and quantum computing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 30-34 Quantum communication and quantum computing *Sweety Mittal, **Nilesh
More information