quantum computing : security implications robert m. slade, msc, cissp [email protected],...
TRANSCRIPT
![Page 1: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/1.jpg)
Quantum Computing: Security Implications
Robert M. Slade, MSc, [email protected], [email protected],
http://victoria.tc.ca/techrev/rms.htm
![Page 2: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/2.jpg)
Do we understand quantum computing?
This isn't right. It isn't even wrong.
- Wolfgang Pauli, on a paper submitted by a physicist colleague
![Page 3: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/3.jpg)
Quantum introduction (very small)
● Concepts Superposition Entanglement
● observer effect Qubit
● “If someone says that he can think or talk about quantum physics without becoming dizzy, that shows only that he has not understood anything whatever about it.” Niels Bohr
![Page 4: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/4.jpg)
Quantum Computing (1)
● Quantum computer quantum tech, traditional operation smaller, faster
● quantum size range Turing
● universal computer● irreversible computations
![Page 5: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/5.jpg)
Quantum Computing (2)
● Quantum cryptography photon polarization
● angular polarization● detector angle● public exchange of angle but not value
photon entanglement● eavesdropping detection
![Page 6: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/6.jpg)
Quantum Computing (3)
● Quantum computing computing device or processor analogue computer
● not digital?
![Page 7: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/7.jpg)
Analogue Computers
● Spaghetti computing parallel sorting special purpose/application
● Slide rule exact computation
● imprecise reading● Adiabatic quantum computer
least energy = best answer● least path, best comparison, simulation
D-Wave Orion
![Page 8: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/8.jpg)
Applications and Implications
● by domain● general functions
least path● Traveling Salesman Problem● scheduling, efficiency studies, multiple requirements● NP-complete, non-convergent, Ising model
simulation● climate models
pattern recognition● people are good, computers are bad● data reduction and representation
![Page 9: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/9.jpg)
Security management
● risk management (shortest path) what if - cost vs benefit
● information classification (pattern matching)● risk assessment required
investing, or not, in quantum computing
![Page 10: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/10.jpg)
Security architecture
● new architectures, new vulnerabilities● simulation of vulnerabilities and protections● quantum devices and noise
D-Wave Orion voting, error checking● quantum error correction (recent)
fault tolerant computing
![Page 11: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/11.jpg)
Access control
● biometrics (pattern matching)● information flow and covert channel analysis
(least path/simulation)● intrusion detection (pattern matching)
![Page 12: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/12.jpg)
Cryptography
● quantum communications/encryption/key negotiation/eavesdropping detection
● parallel decryption● new algorithms
tractable by neither classical nor quantum● quantum devices and generation of
randomness● analysis of implementation problems
(simulation)
![Page 13: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/13.jpg)
Physical
● noise, RFI/EMI interference● temperature
room temp 100x > interstellar space interstellar space 1000x > Orion device
● special costs, protections for devices● physical access control (biometrics)
![Page 14: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/14.jpg)
BCP
● Business Impact Analysis (least path)● testing of BC plans (simulation)● disaster management
direction of resources to maximum effect● continuity of operations for special devices
damage if power/cooling fails
![Page 15: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/15.jpg)
Applications security
● testing (simulation)● database analysis (pattern matching)
cost (privacy) vs benefit (safety)● database aggregation problem analysis
(pattern matching and simulation)● learning (pattern matching)
neural net augmented, check against neural net superstitious learning
● check against expected impossible to compute by classical methods
● malware/botnet detection, (pattern matching) operation/control/ownership
● completely new paradigms in programming
![Page 16: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/16.jpg)
Operations security
● combinations of classical and quantum devices and operations complexity, troubleshooting
● troubleshooting (simulation)● insider attack detection (pattern matching)
![Page 17: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/17.jpg)
Telecommunications and networking
● Intrusion Detection Systems● Botnet detection and assessment
Command & Control ownership “fast flux”
● Network attack analysis● quantum encryption special channels● quantum devices likely remote access
![Page 18: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/18.jpg)
Telecommunications and networking
● Spam limitations even in Bayesian analysis
![Page 19: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/19.jpg)
Telecommunications and networking
● quantum encryption requires special channels
● quantum devices likely to be remote access
![Page 20: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/20.jpg)
Law and investigation
● new forensic analysis tools (pattern matching/simulation)
● presentation/acceptance in court problematic
![Page 21: Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP rmslade@shaw.ca, rslade@vcn.bc.ca, rslade@computercrime.org](https://reader035.vdocuments.us/reader035/viewer/2022070305/55154e855503465e608b65d9/html5/thumbnails/21.jpg)
Quantum Computing: Security Implications
Robert M. Slade, MSc, [email protected], [email protected],
http://victoria.tc.ca/techrev/rms.htm