Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com



Similar documents
Securing Your Data In Transit For The Long Term

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer

1.Context What is the problem with current cryptographic techniques? Current Quantum Key Distribution (QKD)... 4

World Class Standards. QKD in ETSI. Gaby Lenhart Strategy and New Initiatives ETSI All rights reserved ECOC 2009

24 th IEEE Annual Computer Communications Workshop (CCW)

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

Marker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications

A High Speed Quantum Communication Testbed

In-Flight Encryption. Jim Theodoras. Feb 2014

Quantum Safe Cryptography and Security

Quantum Telecommunications Networks. Dr Tim Whitley MD, Research and Innovation, BT

Progress in Quantum Cryptography

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

Quantum Secure Communication Networks:

The New Approach of Quantum Cryptography in Network Security

Quantum Cryptography: Privacy Through Uncertainty (Released October 2002) by Salvatore Vittorio

Adversary Modelling 1

THE FIBER OPTIC INFRASTRUCTURE COMPANY. Case Study Vienna: Building a Fiber Optic Network

CSci 530 Midterm Exam. Fall 2012

CPSC 467b: Cryptography and Computer Security

Quantum Safe Cryptography V1.0.0 ( )

DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN COPYRIGHT 2014 ALCATEL-LUCENT. ALL RIGHTS RESERVED.

INFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4

EUROVISION NETWORK TECHNOLOGIES, FUTURE

Privacy + Security + Integrity

Concept for a cryptographic infrastructure for measurement components in smart grids

Quantum computing in practice

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

Quantum technologies may be in their. nascence, but strategies regarding. their potential use cases within. defense and intelligence are not.

Chapter 7: Network security

Quantum Computers vs. Computers

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

Cybersecurity in a Quantum World: will we be ready?

NEW HORIZON COLLEGE OF ENGINEERING, BANGALORE CLOUD COMPUTING ASSIGNMENT Explain any six benefits of Software as Service in Cloud computing?

CSCE 465 Computer & Network Security

A Probabilistic Quantum Key Transfer Protocol

Computer Security: Principles and Practice

Encryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

Alliance Key Manager Solution Brief

Module 7 Security CS655! 7-1!

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

IoT Security Concerns and Renesas Synergy Solutions

HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE

Authentication in Online Banking Systems through Quantum Cryptography

Quantum cryptography

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

An Introduction to Cryptography as Applied to the Smart Grid

The Mathematics of the RSA Public-Key Cryptosystem

Cyber Security Recommendations October 29, 2002

Privacy and Security in Healthcare

3. Designed for installation by the user without further substantial support by the supplier; and

Unit 3 Cyber security

Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration

Commercial Prospects for Quantum Information Processing

future data and infrastructure

Uncompromising Integrity. Making 100Gb/s deployments as easy as 10Gb/s

Resilient network architecture based on Movable and Deployable Resource Unit (MDRU)

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Shor s algorithm and secret sharing

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Securing Distribution Automation

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

Hardware Security Modules for Protecting Embedded Systems

Motorola s Wireless Broadband Point-to-Point Solutions. The PTP 100, 400 & 600 Series Part of Motorola s MOTOwi4 portfolio

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

Certificate in Cyber Security

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

WORK PROGRAMME Topic ICT 9: Tools and Methods for Software Development

Huawei AR G3 FAQ TOP14

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

Agenda. NRENs, GARR and GEANT in a nutshell SDN Activities Conclusion. Mauro Campanella Internet Festival, Pisa 9 Oct

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Quantum communication and quantum computing

Transcription:

Quantum Enabled Security Solutions Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com

10 Years of Quantum Innovation IDQ presents its first quantum cryptography (QC) prototype First QC system sold SwissQuantum pilot network goes live in Geneva Cerberis QC solution is released World Premiere: Geneva counts on quantum cryptography as it counts its votes IDQ s quantum cryptography technology used at 2010 world cup World s first QC service launched by SwissQuantum2 IDQ Pilot network in Geneva 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 World s first quantum random number generator (RNG) is launched Second generation quantum RNG launched as PCI expansion card Quantum RNG as USB device Quantum RNG certified by Swiss Federal Office of Metrology Quantum RNG as PCIe expansion card The id201, IDQ s first single-photon dectector, is launched ID Quantique is founded in Octobre 2001 Silicon APD based singlephoton detectors launched. ID Quantique raises 1M EUR from venture capital fund i2i IDQ organizes its first Quantum Cryptography winter school. ID Quantique changes its logo and reorganizes in three business units The id210 replaces the id201 for telecom singlephoton detection 2

Why secure information? Legal Requirements & Compliance Laws Regulations Threats Economic Espionage -by governments - by organized crime Sabotage Information Best Practices Security Governance Standards Guidelines

Cyber Espionnage is real! APT1: Exposing One of China's Cyber Espionage Units http://intelreport.mandiant.com/ 4

Data-in in-flight Encryption Main Office Links for Network (Ethernet) and Storage (Fibre Channel) Encryption Disaster Recovery Site Secret Key Cryptography AES 256 bit Message Encrypted Message Message Analogy Key Key 5

Key Distribution Problem Main Office Links for Network (Ethernet) and Storage (Fibre Channel) How to exchange the key? Disaster Recovery Site Conventional Techniques Quantum Key Distribution Based on mathematics Examples: RSA, Diffie Hellman Vulnerable to: Mathematical progress Increase in computing power Quantum Computing 6

Classical and Quantum Communications "0" "1" "1" "0" Fragile! 7

Key Distribution Problem Main Office Links for Network (Ethernet) and Storage (Fibre Channel) How to exchange the key? Disaster Recovery Site Conventional Techniques Quantum Key Distribution Based on mathematics Based on Quantum Physics Examples: RSA, Diffie Hellman Interception Perturbation Vulnerable to: Mathematical progress Increase in computing power Quantum Computing Secure against all present and future technologies Quantum Key Distribution (QKD) = Quantum Cryptography 8

Quantum-Enabled Link Encryption xwdm Uses keys to secure highspeed links using stateof- the art secret key cryptography. Link Encryption Quantum Channel Dark Fiber Quantum Key Distribution Distributes keys secured by quantum physics between two location 9

Open Question #1 xwdm Uses keys to secure highspeed links using stateof- the art secret key cryptography. Link Encryption Quantum Channel Dark Fiber Optical Connection Point-to-Point Range limited to about 100km Quantum Key Distribution Distributes keys secured by quantum physics between two location 10

Range Extension using Trusted Nodes Cryptographic Key Distribution 11

2004-2008 2008 Vienna Quantum Network Demonstrator Vienna, October 2008 5 QKD Technologies 5 Nodes / 7 Links + 30 other partners 12

Long Range Daisy Chaining QKD Battelle QKD Backbone Columbus OH to Washington DC Area > 770 km Deployment targeted in 2015 Battelle Aberdeen Office Battelle Main Campus 13

Satellite based QKD According to ESA Study by AIT, IQOQI, TESAT, EUTELSAT No major technological roadblocks Alice Bob Images by courtesy of R. Hughes, Los Alamos National Laboratory, USA 14

Open Question #2 Security is based on quantum physics Experiment Theory Alice LD 1 LD 2 LD 3 LD 4 Bob Basis 1 "1" APD Quantum PBS "0" BS F Channel λ/2 BS PBS "1" BS Waveplates "0" APD Basis 2 Public Channel QKD is provably secure, but implementations can contain loopholes due to discrepancies between model and realizations. Approaches to tackle this problem have been identified (eg. modification of the model to include imperfections), but further research is needed. Security Evaluation and Certification, by an independent body, is essential, but conventional approaches still need to be extended to quantum technologies. 15

Protecting Critical Infrastructures Swiss Programme on Critical Infrastructure Protection 16

Smart Grid Security Use Case for Quantum Security? CEN CENELEC ETSI Smart Grid Coordination Group Smart Grid Information Security 17

Europe: Leading Deployments 18

Support for Quantum Enabled Security Technologies Europe is paving the way for Quantum Enabled Security Technologies Unique scientific expertise Corporate laboratories Innovative SMEs Combined support from EC and members states Its lead is threatened Recent difficulties Virtually no support for QKD in FP7 (strong contrast with FP6) Limited activities of European actors in telecom photonic components (both academic and industrial actors) Lack of testbed activities 19

Quantum Key Distribution beyond 2020? Monolithic Integration Time Electronics Optoelectronics Quantum Optics IBM Silicon Integrated Nanophotonics Group 20

Conclusions Quantum Key Distribution Provides a solution for long-term data security Is being deployed by companies and governments worldwide Open questions remain Integrationwith current infrastructures Evaluation and Certification of Quantum Security Solutions but different approach exist to tackle them. Quantum Key Distribution is a strategic technology and addresses a growing need and large market opportunity Europe has historically been paving the way and is still leading, but challenges are arising Grégoire Ribordy, CEO ID Quantique SA gregoire.ribordy@idquantique.com Ch. Marbrerie 3 Phone: +41 (0)22 301 83 71 CH 1227 Carouge www.idquantique.com 21