1.Context What is the problem with current cryptographic techniques? Current Quantum Key Distribution (QKD)... 4
|
|
|
- Gilbert Cummings
- 10 years ago
- Views:
Transcription
1
2 Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques? Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve traditional cryptography implementations?... 4 What QKD solutions currently exist?... 4 What market does IDQ address?... 4 Can QKD be used as a watchdog to detect optical intrusion?... 5 Is Quantum Hacking a threat to IDQ's solutions?... 5 What is IDQ's approach to solving the range limitation problem? Quantum Computing and Cryptography... 6 What would be the impact of a Quantum Computer on the cryptographic infrastructure?... 6 When will a quantum computer be available?... 6 Is DWave's Quantum Computer cryptographically relevant?... 7 What is quantum-safe cryptography?... 7 When do I need to start worrying about Quantum Computers? Future directions for QKD technology... 8 IS IDQ considering QKD over satellite links?... 8 Is IDQ considering QKD for mobile devices? Corporate questions... 9 What is IDQ's position on collaborating with governments?... 9 Why can a non-us cryptography supplier offer better security guarantees... 9 Information in this document is subject to change without notice. Copyright 2014 ID Quantique SA. Printed in Switzerland. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the permission of ID Quantique. Trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. ID Quantique SA disclaims any proprietary interest in the trademarks and trade names other than its own.
3 Page 3 1. Context What is the problem with current cryptographic techniques? The transmission of data is protected using encryption. The information is encrypted using an encryption algorithm and an encryption key, before being sent across a network. The recipient then decrypts the information by reversing the process using the key. Such a scheme is known as secret key cryptography. As the key is used both to encrypt and decrypt the data, its transfer from the sender side to the receiver side must be protected. This is known as the key distribution problem. In conventional solutions, this problem is solved using a cryptographic scheme known as public key cryptography, where encryption is performed using a so-called public key while decryption requires the use of a private key. As the public key is only useful to encrypt, it can be distributed without special care, as long as the private key is kept secure. In practice, public key cryptography is not used for bulk data encryption, but securely to exchange a key, which is then used with a secret encryption scheme. The problem with this approach is that the security of the currently used public key cryptosystems is not well established and they are vulnerable to: Human ingenuity: Public key cryptography is based on mathematical problems, which could be broken by future progress. Moore s law: The increase in computing power makes it increasingly easier to break public key cryptography. Quantum physics: Public key cryptography is vulnerable to quantum computing, which can solve certain mathematical problems exponentially faster than classical computers. These three vulnerabilities means that the currently used public key cryptosystems are not appropriate to secure data that require long-term security. An adversary could indeed record encrypted data today and wait until one of these vulnerabilities materializes to decrypt it. Quantum Cryptography is an alternative solution to the key distribution problem, whose security is based on quantum physics and not on mathematical assumptions. Note that over the past few years, cryptographers have devised a new class of public key cryptosystems, which are resilient to currently known quantum attacks. These algorithms represent an improvement compared to traditional public key cryptography, but they come no way near quantum cryptography, as they remain vulnerable to the first two threats mentioned above. Moreover there is no guarantee that new quantum attacks will not be devised against them. IDQ believes that it is essential for organizations that have long-term security requirements to deploy a quantum-safe cryptographic infrastructure. Such an infrastructure may consist of a combination of quantum cryptography for example to secure backbone communications and of post-quantum cryptography for example for end-point security.
4 2. Current Quantum Key Distribution (QKD) Page 4 What is Quantum Cryptography? Quantum cryptography is a technology that uses quantum physics to secure the distribution of symmetric encryption keys. A more accurate name for it is quantum key distribution (QKD). It works by sending photons, which are quantum particles of light, across an optical link. The Heisenberg Uncertainty Principle stipulates that in quantum physics observation causes perturbation. This is used to verify the security of the distributed keys. In theory, QKD should be combined to One-Time Pad (OTP) encryption to achieve provable security. However in practice, this would impose strong limitations on the available bandwidth due to the fact that the key distribution rate of QKD is typically to times lower than conventional optical communications. In practice, QKD is combined with conventional symmetric encryption, such as AES, and used to frequently refresh encryption keys. How does QKD improve traditional cryptography implementations? A security solution is as secure as its weakest link and in network encryption, the current weakest link is the key distribution based on public key cryptography. As its name says, QKD is used to distribute encryption keys, whose security is based on quantum physics and which are therefore resilient against attacks by brute force or quantum computers. It is therefore acknowledged to be "quantum safe" (resilient to quantum computers) and is recommended for use to protect data with long-term sensitivity. What QKD solutions currently exist? QKD solutions currently consist of key distribution appliances combined with link encryptors. Two QKD appliances are connected through an optical fiber and continuously distribute key material, which they store until it is requested by an encryptor. These solutions work up to a range of 100km (optical attenuation corresponding to 20dB) and are thus deployed in metropolitan area networks. Typical applications include secure LAN extension in corporate campuses or datacenter interconnects. The encryptors currently compatible with QKD (i.e. Quantum enabled ) are ISO layer 2 encryptors for Ethernet and Fibre Channel with link bandwidth up to 10Gbps and aggregated bandwidth up to 100Gbps. What market does IDQ address? IDQ s quantum-safe solutions are used in the financial and government sectors, as well as in enterprises with the requirement to protect IP for the long-term. Typical applications include secure LAN extension in corporate campuses or datacenter interconnections. The market is expanding due to the following megatrends: Computing power increases, making public key cryptography ever more vulnerable; Hacking is on the rise in a society increasingly relying on IT;
5 Page 5 It is now common knowledge that governments are also engaged in massive eavesdropping projects. Can QKD be used as a watchdog to detect optical intrusion? The fact that the security of QKD is based on the Heisenberg Uncertainty Principle (interception causes perturbation) may lead to think that this technology can be used as a watchdog to detection optical intrusion. This is unfortunately not true. First, QKD performs a statistical assessment of intrusion, which means that a sufficiently large sample of data must be collected and processed. In practice, this data acquisition and processing takes a few minutes, which means that an alarm would be triggered with a delay of several minutes. Second, using QKD as a watchdog would not protect the data transmitted in the same fiber, but at other wavelengths, which could be tapped without perturbing the quantum signals. Symbolically, using QKD as a watchdog is analogous to installing a speed radar on a highway monitoring a single lane. The drivers in the other lane could still exceed the speed limit without being caught. Last but not least, optical watchdogs don t work well in practical settings. Setting boundaries that are small enough to be useful, but large enough not to trigger too many false alarms is difficult. Various phenomena, such as for example component aging or optical fiber manipulation by technicians, cause the optical power in a fiber to vary over time. Is Quantum Hacking a threat to IDQ's solutions? Although the term Quantum Hacking sounds scary, it is nothing more than the translation into the quantum technology world of the security best practice of independent evaluation. The security of QKD solutions is based on two assumptions: that the laws of quantum physics are correct and that the actual QKD implementation complies with a model. The field of quantum hacking actually aims at testing this second assumption and demonstrating if a practical QKD system is compatible with its model or not. IDQ collaborates with and supports by providing free hardware - the best quantum hacking groups worldwide to have its technology tested. In the past, quantum hackers have demonstrated cases where commercial QKD implementations and models differed, leading to potential vulnerabilities. However, these attacks were academic and would not have worked in practical situations, as they required direct access to the equipment for calibration. Moreover, patches to prevent these attacks, even in cases where an adversary had access to the target equipment, were developed by IDQ.
6 Page 6 What is IDQ's approach to solving the range limitation problem? As an optical communication technique, QKD transmission is subject to optical attenuation. In conventional communication, this problem is solved by amplifying optical signal every 100 kilometers. This is not possible with quantum signals, as it would induce perturbations. IDQ pursues both short-term and long-term solutions to this limitation: In the short-term, the approach selected by IDQ is based on trusted nodes, which consists of a receiver and an emitter used to detect the quantum signal, process it classically and re-emit it as quantum signal. IDQ is currently jointly developing this technology with its US partner Battelle. Trusted-nodes will require appropriate tamper protection of their cryptographically sensitive parts, which is addressed in the project. In the long-term, IDQ s vision is to deploy quantum repeaters instead of trusted-nodes. These devices will relay quantum signals without measuring them, and will thus not require any specific cryptographic protection. The University of Geneva, IDQ s research partner, is one of the world leaders in this research field. However, no practical advances are expected before 5 to 10 years. Finally IDQ is working on assessing the suitability and industrialization potential of satellitebased QKD for commercial and government applications. 3. Quantum Computing and Cryptography What would be the impact of a Quantum Computer on the cryptographic infrastructure? Quantum algorithms are procedures for calculation that can be run efficiently only on quantum computers. There currently exists two such algorithms that have a relevant impact on cryptographic infrastructure. The first one is known as Shor s algorithm and it allows to efficiently factor large integers. This problem is cryptographically relevant, as the most commonly used public key cryptography schemes such as RSA; elliptic curves or Diffie-Hellman are based on this problem or equivalent variants. Shor s algorithm implementation would immediately render these cryptosystems useless, no matter how long the key is. The second algorithm is known as Grover s algorithm. It allows optimizing databases searches, which could be used in exhaustive key searches against symmetric cryptosystems. Its implementation would effectively render symmetric encryption with key length of less than 160 bits useless. However, this means that the AES algorithm used with a key length of 256 bits can be considered as resilient to quantum computing, particularly if the key is refreshed frequently. Finally, it is possible that other quantum algorithms threatening conventional cryptography may be discovered in the future, easing attacks even further. When will a quantum computer be available? It is IDQ s position that the first unclassified demonstration of the first small scale universal quantum computer will take place within the next five to ten years.
7 Page 7 This estimate is based on the scientific state of the art for technologies such as superconducting qubits and ion traps as well as the level of investment by public funding agencies. Government agencies are also working on this topic and investing significant resources in classified projects, so that they are likely to be ahead of public research. Is D-Wave's Quantum Computer cryptographically relevant? D-Wave, a Canadian company, which is developing a quantum computing platform receives a lot of publicity. This platform implements a technology known as adiabatic quantum computing, which allows to implement certain quantum algorithms for example to perform optimization tasks but which does not allow them to build a universal quantum computer. Based on publicly available information, DWave s computing platform is currently not considered as cryptographically useful. It is however important to realize that in order to implement its quantum computing platform, DWave is solving practical problems, such as optimization of Inputs/Outputs, which may be relevant to realize a universal i.e. cryptographically relevant quantum computer. What is quantum-safe cryptography? The concept of "quantum-safe" is well defined in the white paper on "Quantum-Safe Security and Cryptography" 1 by the European Telecommunications Standards Institute (ETSI). Quantum-safe cryptography are security controls which are resilient to attacks by a quantum computer. Quantum key distribution (QKD) is known to be quantum-safe. Some "post-quantum" cryptographic primitives, such as lattice-, code- or hash-based cryptosystems, are currently believed to be quantum-safe until proven otherwise. When do I need to start worrying about Quantum Computers? Even if the first public demonstration of a universal quantum computer will take place in the next five to ten years, this does not mean that the implementation of a quantum-safe infrastructure can be postponed until then. For data which require long-term confidentiality, such an infrastructure must be implemented early enough, as an adversary could tap communications and store encrypted data until a quantum computer becomes available. More specifically, one must ensure that the sum of the time needed to implement a quantumsafe infrastructure (from months to years depending on the application) and of the lifetime of the information (from seconds to decades depending on the type of information) does not exceed the time required for an adversary to develop a quantum computer (five to ten years according to IDQ s estimate). In a wide range of cases, such as government secrets, strategic corporate information or health data to name a few, where long-term security is important, one is already in a critical situation today. 1 ETSI white paper "Quantum-Safe Security and Cryptography"
8 4. Future directions for QKD technology Page 8 Is IDQ considering QKD over satellite links? Although it is traditionally implemented over optical fiber links, QKD could also work over satellite links. In such a scenario, a low orbit satellite or drone would be used as a moving trusted-node. The current status of QKD over satellite links is the following: Demonstrations of quantum communications from ground telescope to ground telescope have been performed. Some of these demonstrations have targeted long distance, while others have looked at the tracking problem. They have confirmed the general feasibility of QKD over satellite links. These demonstrations have been complemented by simulations of ground to space quantum communications, which confirm feasibility but identify challenges. A number of projects to send a satellite with quantum communication payload are under preparation, for example in China, Canada and Europe. IDQ is working on a feasibility study on QKD over satellite links, and the possibility to industrialize it for specific industries and applications. Is IDQ considering QKD for mobile devices? Although it is traditionally implemented over optical fiber links, QKD could also work over a freespace link between a handheld device and a fixed terminal such as an ATM. Researchers have demonstrated this approach using optical hardware connected to a smart phone. The use-case put forward by proponent of this approach is to load cryptographic keys to a handheld device by bringing it in close proximity to a fixed station, instead of connecting using a USB cable. Once loaded, key material is gradually consumed to secure communications. The business case for QKD for handheld devices is questionable. The primary reason is the fact that long-term security the main promise of QKD is not needed by most end-users, which means that the price premium to introduce it would be hard to justify. Moreover, QKD is an expensive replacement to a USB cable which is not justified by any sound threat model. IDQ s strategy to bring QKD technology to the market is to follow a top-down approach, by targeting first the most demanding applications in terms of security, before gradually expanding to less demanding markets. In this strategy, QKD for handheld devices is not a priority. Finally, one must note that this usecase requires QKD trusted-node to connect the fixed stations with a centralized key management system, which will allow IDQ to play in this market if a clear opportunity is identified. What is Device Independent QKD and is it relevant? The security of traditional QKD is based on two assumptions: The laws of quantum physics are correct The actual QKD implementation complies with a model QKD system
9 Page 9 The first assumption cannot be formally proven, but the fact that the world behaves according to quantum physics at the microscopic level has been established by experimental evidence accumulated over more than half a century. As for the second assumption, it is validated through security evaluation and certification, which, as with any other security solution, tests that a system behaves as expected. The fact that the security of QKD can be established on these two simple assumptions is what gives its appeal to QKD. However, over the past few years, researchers have discovered that it is actually possible to devise QKD protocols, which can provide self-testing of the quantum layer. With these protocols, a system can perform measurements that demonstrate that it is working properly. These protocols are known as Device Independent QKD and they basically enable to automatically test the second assumption above. In spite of its appeal, Device Independent QKD is not practical yet, as its implementation would require hardware that does not exist yet. Moreover, the range and the bit rate of these protocols are so low that they would serve little real purpose. Progress is nevertheless to be expected in this fruitful research field, and IDQ watches developments in order to be at the forefront of the introduction of this technology when it matures. 5. Corporate questions What is IDQ's position on collaborating with governments? As an independent vendor, IDQ collaborates with governments and other organizations for the evaluation and certification of its solutions, but does not engage in activities that would compromise the security offered to end-users by its products. As a Swiss company, IDQ is also operating in an environment where government interference is forbidden by law. Why can a non-us cryptography supplier offer better security guarantees The Snowden scandal has demonstrated that certain technology companies have collaborated with the US government to enable it to access information that was supposed to be protected. IDQ is a Swiss company, which guarantees its independence because: Switzerland is a neutral, thus independent country, and, as such, not part of any geopolitical alliance. The Swiss government does not interfere with commercial activities. Switzerland is a stable country both at the financial and political level, which means that IDQ can operate in a stable environment and develop a long-term strategy. At the corporate level, IDQ implements strict governance and confidentiality principles to ensure products offer uncompromised security and that customer data are protected.
Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014
Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology
Securing Your Data In Transit For The Long Term
Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014 ID Quantique Photon Counters Services Quantum
High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com
High speed link encryption State of the art ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com Agenda Company Solutions Risks Encryption Today (State of the Art) Quantum Cryptography, QKD
Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com
Quantum Enabled Security Solutions Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com 10 Years of Quantum Innovation IDQ presents its first quantum cryptography (QC) prototype First QC system sold
Quantum Computers vs. Computers Security. @veorq http://aumasson.jp
Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert
24 th IEEE Annual Computer Communications Workshop (CCW)
24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California
Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell
Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based
Quantum Safe Cryptography V1.0.0 (2014-10)
White Paper Quantum Safe Cryptography and Security; An introduction, benefits, enablers and challenges ISBN 979-10-92620-03-0 Disclaimer This document reflects the views of the authors. It does not necessarily
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Quantum Safe Cryptography and Security
ETSI White Paper No. 8 Quantum Safe Cryptography and Security An introduction, benefits, enablers and challenges June 2015 ISBN No. 979-10-92620-03-0 ETSI (European Telecommunications Standards Institute)
3. Designed for installation by the user without further substantial support by the supplier; and
Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information
Fiber-Optic Networks: Is Safety Just an Optical Illusion?
TECHNOLOGY ASSESSMENT Fiber-Optic Networks: Is Safety Just an Optical Illusion? Romain Fouchereau IDC OPINION Fiber-optic cable networks have been deemed the fastest, most reliable, and most secure way
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Packet Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, [email protected] Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
AMI security considerations
AMI security considerations Jeff McCullough Introduction Many electric utilities are deploying or planning to deploy smart grid technologies. For smart grid deployments, advanced metering infrastructure
MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Keeping SCADA Networks Open and Secure DNP3 Security
Keeping SCADA Networks Open and Secure DNP3 Security June 2008 DNP3 Protocol DNP3 protocol has become widely accepted within water and electrical utilities worldwide for SCADA communications with field
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
PrivyLink Internet Application Security Environment *
WHITE PAPER PrivyLink Internet Application Security Environment * The End-to-end Security Solution for Internet Applications September 2003 The potential business advantages of the Internet are immense.
CHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.0 Introduction Voice over Internet Protocol (VoIP) is the most popular in telecommunication technology. Nowadays, three million users use VoIP. It is estimated that the number
APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/
DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE CRITICAL NATIONAL INFRASTRUCTURE The UKs national infrastructure is defined by Government as those facilities, systems, sites
QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6
Technology Overview CONTENTS INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 FULL TWO-WAY SYNCHRONIZED TDMA COMMUNICATION... 5 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6 UNMATCHED
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Security Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Quantum technologies may be in their. nascence, but strategies regarding. their potential use cases within. defense and intelligence are not.
WHITE PAPER NOVEMBER 2015 Place Your Bets: Creating a Quantum Technology Strategy for Defense Firms Evan Rolfe Quantum technologies may be in their nascence, but strategies regarding their potential use
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
SCADA System Security, Complexity, and Security Proof
SCADA System Security, Complexity, and Security Proof Reda Shbib, Shikun Zhou, Khalil Alkadhimi School of Engineering, University of Portsmouth, Portsmouth, UK {reda.shbib,shikun.zhou,khalil.alkadhimi}@port.ac.uk
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
SFWR ENG 4C03 - Computer Networks & Computer Security
KEY MANAGEMENT SFWR ENG 4C03 - Computer Networks & Computer Security Researcher: Jayesh Patel Student No. 9909040 Revised: April 4, 2005 Introduction Key management deals with the secure generation, distribution,
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Quantum Secure Communication Networks:
QCrypt 2014 Quantum Secure Communication Networks: Products and Solutions Yong Zhao 2014-09- 04 1 Founda2on Ini2ally founded by the university (USTC) and private investors in 2009 Research Lab (USTC) Company
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
The New Approach of Quantum Cryptography in Network Security
The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time
High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF
High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure
CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense
CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
PowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0
PowerKey Conditional Access System Phase 1.0 System Overview Revision 1.0 Scientific-Atlanta, Inc, Unpublished Works of Scientific-Atlanta, Inc. Copyright 1997 Scientific-Atlanta, Inc. All Rights Reserved
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Software License Management using the Polymorphic Encryption Algorithm White Paper
pmc-ciphers.com Software License Management using the Polymorphic Encryption Algorithm White Paper Published: May 2007, first published in January 2003 PMC Software License Management 1 Software License
Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4
Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Computer Science and Engineering, KL University Green Fields, Vaddeswaram, PO Dt-522 502, Andhra Pradesh,
How To Build A Network For Storage Area Network (San)
White Paper Data Storage across the MAN by deploying a SAN over Dark Fiber by Pieter Panis, EuroFiber 1/7 1 Introduction The purpose of this document is to illustrate how a storage area network (SAN) can
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631
Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.
Security & Encryption
Security & Encryption Introduction: the importance of encryption nected networks, spies can tap into the connection from Encryption for security is thousands of years old. With the No longer can any business
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Alarm over IP. What is Alarm over IP? How does Alarm over IP work? Intrusion Systems White Paper Series Alarm over IP
Intrusion Systems White Paper Series Alarm over IP Alarm over IP What is Alarm over IP? Alarm over IP is the ability for security and fire alarm systems to transmit alarm signals over IP networks such
In-Flight Encryption. Jim Theodoras. Feb 2014
In-Flight Encryption Jim Theodoras Feb 2014 OSI Model 7 6 5 Top of Stack Application Presentation Session Data 4 Transport Layer TCP, UDP Segments 3 Network Layer IP/MPLS Packets 2 Data Link MAC Frames
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
Gold Lock Desktop White Paper
Gold Lock Desktop White Paper TM EMAIL AND FILE ENCRYPTION SOFTWARE Effective Data Security in the 21st Century Evaluating the needs of appropriate data security and identifying the risks in the modern
Sectra Communications ensuring security with flexibility
Panthon Sectra Communications ensuring security with flexibility Sectra has more than 30 years of experience in developing secure communications. We know what is required to meet the toughest demands.
Quantum computing in practice
Quantum computing in practice & applications to cryptography Renaud Lifchitz OPPIDA NoSuchCon, November 19-21, 2014 Renaud Lifchitz NoSuchCon, November 19-21, 2014 1 / 68 Speaker s bio French senior security
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
A Question of Key Length
A Question of Key Length Does Size Really Matter When It Comes To Cryptography? White Paper December 7, 2015 By Alessio Di Mauro A Question of Key Length 2015 Yubico. All rights reserved. Page 1 of 10
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
Quantum cryptography
Quantum cryptography Optical fibers to carry information 10 Kb/s 1Tb/s 10 12 b/s Optical fibers vs electrical cables Frequency: 10 8 Hz vs 10 15 Hz Bit rate for electrical interconnections B B 0 A l 2
Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption
White Paper Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption Today s Encryption Environments The number of cyber attacks targeting US organizational data has doubled over
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
NXP & Security Innovation Encryption for ARM MCUs
NXP & Security Innovation Encryption for ARM MCUs Presenters Gene Carter- International Product Manager, NXP Semiconductors Gene is responsible for marketing of the ARM7 and Cortex-M3 microcontrollers.
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Reaching a Balance Between Communications and Security
Books and Beyond. Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu Department of Computer Science University of Texas at San Antonio
How to Secure Your Email Address Books and Beyond Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu p Department of Computer Science University of Texas at San Antonio Outline Email: A Brief Overview The
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Network Security 101 Multiple Tactics for Multi-layered Security
Security and Resilience for Utility Network Communications White Paper Communications networks represent a partial paradox. The very openness and ubiquity that make them powerful can also present a weakness.
