Securing Your Data In Transit For The Long Term



Similar documents
Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA

1.Context What is the problem with current cryptographic techniques? Current Quantum Key Distribution (QKD)... 4

High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer

24 th IEEE Annual Computer Communications Workshop (CCW)

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

Quantum Computers vs. Computers

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Cryptography and Network Security Chapter 9

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Cryptography and Network Security

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

The New Approach of Quantum Cryptography in Network Security

Quantum Safe Cryptography and Security

Quantum computing in practice

CRYPTOGRAPHY IN NETWORK SECURITY

CPSC 467b: Cryptography and Computer Security

DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN COPYRIGHT 2014 ALCATEL-LUCENT. ALL RIGHTS RESERVED.

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

Quantum Safe Cryptography V1.0.0 ( )

The Mathematics of the RSA Public-Key Cryptosystem

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

World Class Standards. QKD in ETSI. Gaby Lenhart Strategy and New Initiatives ETSI All rights reserved ECOC 2009

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Cybersecurity in a Quantum World: will we be ready?

Quantum Secure Communication Networks:

Blaze Vault Online Backup. Whitepaper Data Security

Elements of Applied Cryptography Public key encryption

Notes on Network Security Prof. Hemant K. Soni

In-Flight Encryption. Jim Theodoras. Feb 2014

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

The science of encryption: prime numbers and mod n arithmetic

CSCE 465 Computer & Network Security

Shor s algorithm and secret sharing

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

3. Designed for installation by the user without further substantial support by the supplier; and

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4

Encryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Module 7 Security CS655! 7-1!

Public Key (asymmetric) Cryptography

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

A High Speed Quantum Communication Testbed

Cryptography and Network Security Chapter 10

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

QUANTUM RANDOM NUMBER GENERATOR

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Chapter 7 Transport-Level Security

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Overview of Public-Key Cryptography

C Information Systems for Managers Fall 1999

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CRYPTOGRAPHY AND NETWORK SECURITY

Cryptography & Digital Signatures

Table of Contents. Bibliografische Informationen digitalisiert durch

Virtual Privacy vs. Real Security

Chapter 1: Introduction

A Novel Approach for Signing Multiple Messages: Hash- Based Signature

Marker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications

CRYPTOG NETWORK SECURITY

SSL DOES NOT MEAN SOL What if you don t have the server keys?

National Security Agency Perspective on Key Management

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Software Tool for Implementing RSA Algorithm

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar

Associate Prof. Dr. Victor Onomza Waziri

7! Cryptographic Techniques! A Brief Introduction

Elliptic Curve Cryptography

An Introduction to Cryptography as Applied to the Smart Grid

Information Security and Cryptography

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

White Paper. Enhancing Website Security with Algorithm Agility

Entanglement: The Holy Grail of High-Speed Design

An Efficient data storage security algorithm using RSA Algorithm

Computer Security: Principles and Practice

Transcription:

Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014

ID Quantique Photon Counters Services Quantum Random Number Generators Technology Quantum Security Network Encryption Swiss company, founded 2001, based in Geneva Spin-off of University of Geneva, Group of Applied Physics Offers encryption technology which is safe into the quantum era Protection of long-term data in high-speed transit 2014 ID Quantique SA, Switzerland page 2 ID Quantique PROPRIETARY

Thank you! 2014 ID Quantique SA, Switzerland page 3 ID Quantique PROPRIETARY

HACKING IS EASY (AND EVERYONE IS DOING IT) 2014 ID Quantique SA, Switzerland page 4 ID Quantique PROPRIETARY

2014 ID Quantique SA, Switzerland page 5 ID Quantique PROPRIETARY

Optical Tapping for under 500 Optical fiber bending & coupling Buy an optical tap legally online http://www.fods.com/optic_clip_on_coupler.html Emitter Eavesdropper Receiver 2014 ID Quantique SA, Switzerland page 6 ID Quantique PROPRIETARY

Social Engineering A telecom company outsources the laying of new optical fibers for a bank to a maintenance team who do not understand the security issues. The naked optical fiber is accessible..and the detailed layout of the fiber network & the name of the bank is clearly visible for future hacking attempts 2014 ID Quantique SA, Switzerland page 7 ID Quantique PROPRIETARY 7

THE THREAT: PUBLIC-KEY CRYPTOGRAPHY 2014 ID Quantique SA, Switzerland page 8 ID Quantique PROPRIETARY

Public Key Cryptography: Threats Alice Bob What are the 2 prime factors of : 5313043722633707 Hint : http://primes.utm.edu/lists/small/ 2014 ID Quantique SA, Switzerland page 9 ID Quantique PROPRIETARY 9

Public Key Cryptography: Threats Alice Bob 5313043722633707 = 86030827 * 61757441 2014 ID Quantique SA, Switzerland page 10 ID Quantique PROPRIETARY 10

Public Key Cryptography: Threats Alice Bob Use mathematical «one-way» functions Theoretical Progress Vulnerable to 2 357 x 4 201 =? A x B = 9 901 757 Increase in Computing Power Quantum Computers 2014 ID Quantique SA, Switzerland page 11 ID Quantique PROPRIETARY 11

Classical and Quantum Physics Classical physics - 1900 Describes the macroscopic world Quantum physics 1900 - Description of the microscopic world Deterministic Intuitive Probabilistic Central role of the observer Not very intuitive Quantum physics Novel information processing possibilities Quantum Information Theory (QIT) 2014 ID Quantique SA, Switzerland page 12 ID Quantique PROPRIETARY

The Threat: Quantum Computing Quantum Computing Basics Uses quantum properties, not binary code (qubits vs. bits) Acts as a massively parallel computer Will render today s public key encryption unsafe 2014 ID Quantique SA, Switzerland page 13 ID Quantique PROPRIETARY

Quantum Computing and Cryptography Shor s Algorithm Grover s Algorithm Peter Shor, 1994 Lov Grover, 1996 Quantum algorithm for integer factorization Quantum algorithm to perform search in an unsorted database O((log N) 3 ) vs O(e 1.9 (log N)1/3 (log log N)2/3 ) O(n ½ ) vs O(n) Key halfed for symmetric cryptography AES-128 64 bits security AES-256 128 bits security Can break RSA, Elliptic Curve & Diffie Hellman 2014 ID Quantique SA, Switzerland page 14 ID Quantique PROPRIETARY

Quantum Computing in Research America is building a quantum computer for cryptanalysis http://www.washingtonpost.com/world/national-security/nsa-seeks-to-build- quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e- 7195-11e3-8def-a33011492df2_story.html According to Snowden this is a major NSA initiative called Penetrating Hard Targets China Prepares for Quantum Age Source: http://www.hpcwire.com/2014/01/24/china-prepares-quantum-age/ The importance of building a quantum computer is such that the Chinese government funded 90 quantum related projects last year through the National Natural Science Foundation of China. Lazaridis (RIM cofounder) has invested $250 million+ into quantum computing at Waterloo Quantum Valley Dwave raised funds from Jeff Bezos (Amazon), InQTel (NSA investment arm) and sells to Lockheed Martin, NASA 2014 ID Quantique SA, Switzerland page 15 ID Quantique PROPRIETARY

When do we need to start worrying? «Wait and see» approach is too risky Time Vulnerability Information Exchange Information lifetime (based on legal, business or strategic constraints) Time for migration (from a few months to several years) Next generation of cryptographic infrastructure: Must have quantum-safe alternatives Should have algorithmic agility built in 2014 ID Quantique SA, Switzerland page 16 ID Quantique PROPRIETARY 16

Leading Signs That It s Time To Adopt QKD Quantum computers have more than 1000 qubits OR Quantum computers have demonstrated that Shor s algorithm to factor numbers works D-Wave sold a 128-bit computer in 2011; announced a 512-bit computer Lazaridis (RIM cofounder) has invested $250MM+ into quantum computing at Waterloo Quantum Valley RSA-1024 has been broken OR RSA-768 was cracked in December, 2009 using 5TB of data and 1500 CPU-years of a 2.2GHz Opteron NIST recommendation stop using RSA-1024 before 12/31/2013 U of Mich reported breaking RSA-1024 using a side channel attack Large organized networks of computers can be formed to solve complex, timeconsuming problems OR Network bots, SETI-at-home Bitcoin Millions-to-billions of smart phones around the world with quad-core ARM processors all linked over a common network (telecom systems) You transmit data over the network that needs to be protected for more than five years 2014 ID Quantique SA, Switzerland page 17 ID Quantique PROPRIETARY

The Solution: Quantum-Safe Cryptographic Infrastructure «Post-quantum» cryptography Classical codes deployable without quantum technologies Believed/hoped to be secure against quantum computer attacks of the future + Quantum Key Distribution Quantum codes requiring some quantum technologies currently available Typically no computational assumptions and thus known to be secure against quantum attacks Both sets of cryptographic tools can work together to form a quantum-safe cryptographic infrastructure 2014 ID Quantique SA, Switzerland page 18 ID Quantique PROPRIETARY

ONE SOLUTION: QUANTUM MECHANICS FOR SECURE ENCRYPTION KEYS 2014 ID Quantique SA, Switzerland page 19 ID Quantique PROPRIETARY

Change in Paradigm Network Encryption Key Management High speed cryptosystem implementation (typically AES) Crypto Key Lifecycle 2014 ID Quantique SA, Switzerland page 20 ID Quantique PROPRIETARY 20

THE SOLUTION (1): QUANTUM RANDOM NUMBER GENERATION (QRNG) 2014 ID Quantique SA, Switzerland page 21 ID Quantique PROPRIETARY

Quantum Randomness Physical Random Number Generator exploiting a phenomenon described by quantum physics Detectors Truly random Photons Semi-transparent Mirror Advantages Speed Source of photons Simple process that can be modeled influence of environment can be ruled out Live monitoring of elementary components possible 2014 ID Quantique SA, Switzerland page 22 ID Quantique PROPRIETARY

Quantum Random Number Generator 2014 ID Quantique SA, Switzerland page 23 ID Quantique PROPRIETARY 23

THE SOLUTION (2): QUANTUM KEY DISTRIBUTION (QKD) 2014 ID Quantique SA, Switzerland page 24 ID Quantique PROPRIETARY

Quantum Cryptography "0" "1" "1" "0" Fragile! Alice Message Scrambled Message Message Symmetric Cryptography Secret Key Secret Key Bob Identical keys Key Exchange?!? 2014 ID Quantique SA, Switzerland page 25 ID Quantique PROPRIETARY

Quantum-Enabled Network Encryption Transparent Layer 2 Encryption AES-256 in CFC and CTR modes Up to 100Gbps Multiprotocol (Ethernet, Fibre Channel) Provably secure key distribution: QKD Distilled key distribution rate: 1000 bps over 25km/6dB Range: 100km + xwdm Local Area Network Quantum Channel Dark Fiber Local Area Network 2014 ID Quantique SA, Switzerland page 26 ID Quantique PROPRIETARY

Today s Depoyments of QKD Hybrid solutions: Conventional encryption on wide area network QKD on DRC and backbone links (WAN) Classical Encryption Device Quantum Encryption Solution MAN/SAN 2014 ID Quantique SA, Switzerland page 27 ID Quantique PROPRIETARY

Sporting & Public Events Critical police & Joint Operations link secured during 2010 FIFA World Cup in South Africa Secured communication for data, telephone, internet, video, and e-mail 2014 ID Quantique SA, Switzerland page 28 ID Quantique PROPRIETARY

European Banks: Data Center Interconnect European banks secure critical links between bank headquarters and data recovery centers 2014 ID Quantique SA, Switzerland page 29 ID Quantique PROPRIETARY

Data Centers for Financial Companies QKD-secured data center link large financial institution in Netherlands Installed in 2010 High-speed encryption 4 x Ethernet 1G links 2 x FC-4 links 2014 ID Quantique SA, Switzerland page 30 ID Quantique PROPRIETARY

Government & Public Administration Downtown Geneva Geneva (Switzerland) uses QKD to guarantee confidentiality & integrity of data during federal & cantonal elections Geneva Government Data Center 4 km Central Vote Counting Station Ballots Working since October 2007 Mail Votes Cerberis Solution 2014 ID Quantique SA, Switzerland page 31 ID Quantique PROPRIETARY

Quantum Keys-as-a-Service by Telecom Operators Data Recovery Center World-first QKD-as-a-Service offered by Colt Data link between Swiss financial district and critical DRC 70 kms away Eg. 10Gigabit FCoIP link Bank Ethernet or FC connection for data Server Room Bank Colt provides quantumsecured link as a monthly service for banks & enterprises Client B QKD fiber Server Room Client B Easy to set up & maintain under existing SLAs First step towards a QuantumCloud Client C Server Room Client C Client D Server Room Client D 2014 ID Quantique SA, Switzerland page 32 ID Quantique PROPRIETARY

Enterprise: Corporate Data & IP Battelle USA World s largest nonprofit R&D organization Over 22,000 employees at more than 130 locations globally Requirement to protect mission critical corporate, financial information & intellectual property (designs, drawings, etc) IDQ s quantum cryptography used to secure critical links between headquarters in Columbus Ohio and satellite office in Dublin Ohio By 2015 will connect Battelle building in Washington DC with QKD-secured link Working with IDQ to develop trusted nodes for increased distance of QKD 2014 ID Quantique SA, Switzerland page 33 ID Quantique PROPRIETARY

QKD IN THE FUTURE 2014 ID Quantique SA, Switzerland page 34 ID Quantique PROPRIETARY

Battelle in 2015 Battelle QKD Backbone Columbus Ohio to Washington DC area > 770 km Deployment in 2015 Battelle Aberdeen Office Battelle Main Campus 2014 ID Quantique SA, Switzerland page 35 ID Quantique PROPRIETARY

2015: IDQ-Battelle quantum backbone for longterm inter-datacenter security Columbus, OH QKD pilot network (showing four Battelle-IDQ prototype Trusted Nodes operating today) illustrates multi-access metro topology 36 2014 ID Quantique SA, Switzerland page 36 ID Quantique PROPRIETARY

QKD Networks 2014 ID Quantique SA, Switzerland page 37 ID Quantique PROPRIETARY 37

Thank you for your attention 7th Winter School on Practical Quantum Communications Dates: January or February 2015 Location: Les Diablerets, Switzerland More: www.idquantique.com or info@idquantique.com Pictures from previous editions 2014 key note speakers included: Gilles Brassard Nicolas Gisin Vadim Makarov Sandu Popescu Renato Renner 2015 will include Whitfield Diffie Nicolas Gisin Catherine Mc Geoch Colin Williams and more! 38 2014 ID Quantique SA, Switzerland page 38 38 ID Quantique PROPRIETARY

Our team today : Gilles Gravier Director Product Management Email: gilles.gravier@idquantique.com ID Quantique SA http://www.idquantique.com/ Pierre-Alain Hinnen Key Account Manager Email: pierre-alain.hinnen@idquantique.com 2014 ID Quantique SA, Switzerland page 39 ID Quantique PROPRIETARY