Quantum Enabled Security Solutions Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com
10 Years of Quantum Innovation IDQ presents its first quantum cryptography (QC) prototype First QC system sold SwissQuantum pilot network goes live in Geneva Cerberis QC solution is released World Premiere: Geneva counts on quantum cryptography as it counts its votes IDQ s quantum cryptography technology used at 2010 world cup World s first QC service launched by SwissQuantum2 IDQ Pilot network in Geneva 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 World s first quantum random number generator (RNG) is launched Second generation quantum RNG launched as PCI expansion card Quantum RNG as USB device Quantum RNG certified by Swiss Federal Office of Metrology Quantum RNG as PCIe expansion card The id201, IDQ s first single-photon dectector, is launched ID Quantique is founded in Octobre 2001 Silicon APD based singlephoton detectors launched. ID Quantique raises 1M EUR from venture capital fund i2i IDQ organizes its first Quantum Cryptography winter school. ID Quantique changes its logo and reorganizes in three business units The id210 replaces the id201 for telecom singlephoton detection 2
Why secure information? Legal Requirements & Compliance Laws Regulations Threats Economic Espionage -by governments - by organized crime Sabotage Information Best Practices Security Governance Standards Guidelines
Cyber Espionnage is real! APT1: Exposing One of China's Cyber Espionage Units http://intelreport.mandiant.com/ 4
Data-in in-flight Encryption Main Office Links for Network (Ethernet) and Storage (Fibre Channel) Encryption Disaster Recovery Site Secret Key Cryptography AES 256 bit Message Encrypted Message Message Analogy Key Key 5
Key Distribution Problem Main Office Links for Network (Ethernet) and Storage (Fibre Channel) How to exchange the key? Disaster Recovery Site Conventional Techniques Quantum Key Distribution Based on mathematics Examples: RSA, Diffie Hellman Vulnerable to: Mathematical progress Increase in computing power Quantum Computing 6
Classical and Quantum Communications "0" "1" "1" "0" Fragile! 7
Key Distribution Problem Main Office Links for Network (Ethernet) and Storage (Fibre Channel) How to exchange the key? Disaster Recovery Site Conventional Techniques Quantum Key Distribution Based on mathematics Based on Quantum Physics Examples: RSA, Diffie Hellman Interception Perturbation Vulnerable to: Mathematical progress Increase in computing power Quantum Computing Secure against all present and future technologies Quantum Key Distribution (QKD) = Quantum Cryptography 8
Quantum-Enabled Link Encryption xwdm Uses keys to secure highspeed links using stateof- the art secret key cryptography. Link Encryption Quantum Channel Dark Fiber Quantum Key Distribution Distributes keys secured by quantum physics between two location 9
Open Question #1 xwdm Uses keys to secure highspeed links using stateof- the art secret key cryptography. Link Encryption Quantum Channel Dark Fiber Optical Connection Point-to-Point Range limited to about 100km Quantum Key Distribution Distributes keys secured by quantum physics between two location 10
Range Extension using Trusted Nodes Cryptographic Key Distribution 11
2004-2008 2008 Vienna Quantum Network Demonstrator Vienna, October 2008 5 QKD Technologies 5 Nodes / 7 Links + 30 other partners 12
Long Range Daisy Chaining QKD Battelle QKD Backbone Columbus OH to Washington DC Area > 770 km Deployment targeted in 2015 Battelle Aberdeen Office Battelle Main Campus 13
Satellite based QKD According to ESA Study by AIT, IQOQI, TESAT, EUTELSAT No major technological roadblocks Alice Bob Images by courtesy of R. Hughes, Los Alamos National Laboratory, USA 14
Open Question #2 Security is based on quantum physics Experiment Theory Alice LD 1 LD 2 LD 3 LD 4 Bob Basis 1 "1" APD Quantum PBS "0" BS F Channel λ/2 BS PBS "1" BS Waveplates "0" APD Basis 2 Public Channel QKD is provably secure, but implementations can contain loopholes due to discrepancies between model and realizations. Approaches to tackle this problem have been identified (eg. modification of the model to include imperfections), but further research is needed. Security Evaluation and Certification, by an independent body, is essential, but conventional approaches still need to be extended to quantum technologies. 15
Protecting Critical Infrastructures Swiss Programme on Critical Infrastructure Protection 16
Smart Grid Security Use Case for Quantum Security? CEN CENELEC ETSI Smart Grid Coordination Group Smart Grid Information Security 17
Europe: Leading Deployments 18
Support for Quantum Enabled Security Technologies Europe is paving the way for Quantum Enabled Security Technologies Unique scientific expertise Corporate laboratories Innovative SMEs Combined support from EC and members states Its lead is threatened Recent difficulties Virtually no support for QKD in FP7 (strong contrast with FP6) Limited activities of European actors in telecom photonic components (both academic and industrial actors) Lack of testbed activities 19
Quantum Key Distribution beyond 2020? Monolithic Integration Time Electronics Optoelectronics Quantum Optics IBM Silicon Integrated Nanophotonics Group 20
Conclusions Quantum Key Distribution Provides a solution for long-term data security Is being deployed by companies and governments worldwide Open questions remain Integrationwith current infrastructures Evaluation and Certification of Quantum Security Solutions but different approach exist to tackle them. Quantum Key Distribution is a strategic technology and addresses a growing need and large market opportunity Europe has historically been paving the way and is still leading, but challenges are arising Grégoire Ribordy, CEO ID Quantique SA gregoire.ribordy@idquantique.com Ch. Marbrerie 3 Phone: +41 (0)22 301 83 71 CH 1227 Carouge www.idquantique.com 21