Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Networking and Security
Networking and Security
Darwin Gosal
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Outline
Outline
History of communication
History of telecommunication
Computer networking now and beyond Information Security
Ancient cryptography
Overview of modern cryptography
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Communication
History of Communication
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Communication
History of Communication
Speech
200,000 years ago (FOXP2 gene) Unreliable storage: human memory
20Hz 300Hz
500Hz 3kHz
4kHz 14kHz 20kHz
speech
human voice
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Communication
History of Communication
Symbol
Rock carving Cave painting Pictograms
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Symbol
Symbol
Cave Paintings
Rock Carving (Petroglyph)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Symbol
Symbol
Pictograms (9000 BC) Ideograms
Logographic (4000BC)
Water, Rabbit, & Deer from Aztec Stone of the Sun
Ideograms from Mi’kmag hieroglyps
2600 BC Sumerian Cuneiform
Egyptian hieroglyph
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Symbol
Symbol
Alphabet / Adjad
A mapping of single symbols to single phonemes
Nearly all alphabetical scripts used around the world derived from Proto-Sinaitic alphabet
“Ba’alat” means
Lady (title for Hathor, feminime title for
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Communication
History of Communication
Writing tools / medium
Papyrus (3000BC)
The first newspaper, Acta Diurna (59BC) Paper (100AD)
Pens (1000AD)
Printing press, Gutenberg (1400AD) Typewriter (1800s)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Telecommunication
History of Telecommunication
Transportation
Foot soldier Postal system Sneaker-net
F-16 payload: 4600kg
76,470pcs of 2.5” 160GB HDD Capacity: 12 Peta-Bytes
Speed: Mach 2 Range: 3200km
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Telecommunication
History of Telecommunication
Drums signal
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Telecommunication
History of Telecommunication
Heliograph (Greek, 405BC) Modern Heliograph
using Morse code (1810) Semaphore (1972)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Telecommunication
History of Telecommunication
Electric Telegraph
1st commercial version (1937) by Wheatstone & Cooke
9 April 1839 – 21km First transatlantic
telegraph cable (1866)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Telecommunication
History of Telecommunication
Telephone (1876)
Alexander Graham Bell Elisha Grey
Antonio Meucci
Bell Telephone Company (1877)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Telecommunication
History of Telecommunication
Radio / Wireless Telegraph (1890s)
Nikola Tesla (1893)
Guglielmo Marconi (1901)
1st wireless comm. between UK & US
Won Nobel Prize in Physics (1909)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
From Analog to Digital
From Analog to Digital
Claude Shannon
Father of Modern Information Theory
Publish: A Mathematical Theory of Communication (1948)
Won 1936 Nobel on: “A Symbolic
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Computer Networking
Computer Networking
1960/4 - Research on Packet Switching 1968 - DARPA contracts with BBN to create ARPAnet
1970 - The first 5 nodes: BBN, Stanford, UCLA, UC Santa Barbara, & U of Utah. 1972 - TCP created by Vint Cerf
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Computer Networking
Computer Networking
1983 – TCP/IP compliant network ARPAnet + X.25 + UUCP + NSFnet
1989 – Tim Berners-Lee, CERN, invented HTML thus World-Wide-Web.
1993 – Mosaic, the 1st graphical browser
Internet
Internet
5000
562
213
100 1000 10000 100000
1981 1982 1983 1984 1985 1986 1987 1988 1989
Years
H
o
s
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Computer Networking
Computer Networking
1992 – Internet Society (ISOC) given
formal oversight of the Internet Activities Board (IAB) and the Internet Engineering Task Force (IETF)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Networking now and beyond
Networking now and beyond
Personal Area Network
Bluetooth, PDA-phone, Notebook Local Area Network
Gigabit, WiFi (802.11a/b/g/n) Wide Area Network
Frame-Relay, ATM, GSM (EDGE, GPRS), CDMA (3G)
MAN
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Networking now and beyond
Networking now and beyond
IPv6 (232 2128), Internet 2 Peer to Peer (Usenet 1979)
Wireless Mesh network (802.11s)
Convergence VoIP
Starhub cable: TV, Phone, Broadband RFID (spychips?)
GPS
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Networking now and beyond
Networking now and beyond
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Information Security
Information Security
Confidentiality (Authentication)
Ensuring the information is accessible only to
authorized personal (prevent unauthorized disclosure)
Integrity (Non-repudiation)
Safeguarding the accuracy and completeness of the information (prevent unauthorized modification)
Availability (Reliability)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Information Security
Information Security
Confidentiality
PIN,Password, Passphrase, Biometrics, Tokens, Encryption
Integrity
MD5, SHA1
Availability
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Information Security
Information Security
Network Security Firewall, IDS, VPN Application Security
SELinux, Secure coding Host (End-point) Security
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Information Security
Information Security
Hacker activity
Worms & viruses
SPAM
Spyware
Phishing
Firewall
Intrusion Detection
SPAM filtering
Anti-Spyware
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Information Security
Information Security
Trusted Computing (TPM) Palladium
Digital Right Management (DRM)
Play4Sure, DVD’s Content Scrambling System (CSS)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Security Model
Security Model
Threat avoidance (Military model)
Quantum Information Technology Group – Quantumlah
R
is
k
M
a
n
a
g
e
m
e
n
t
R
is
k
M
a
n
a
g
e
m
e
n
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Security Model
Security Model
Risk Management (Business model)
Security is relative (many risks and solutions)
Accept the risk
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Cryptography
Cryptography
Claude Shannon
Father of modern cryptography
“Communication Theory of Secrecy Systems” Cryptology (scrambling)
Cryptography Cryptanalysis
Quantum Information Technology Group – Quantumlah
C
ry
p
to
g
ra
p
h
y
C
ry
p
to
g
ra
p
h
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Cryptography
History of Cryptography
Atbash cipher
Hebrew (600BC)
Permutation cipher (Greek) Scytale (6BC)
Subtitution cipher Caesar Shift
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Cryptography
History of Cryptography
Queen Mary’s Cipher (Babington Plot)
Plot to free Queen Mary, incite a rebellion, and
murder Queen Elizabeth. The conspirators
communicated with
Queen Mary, who was being held prisoner by
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Cryptography
History of Cryptography
Nomenclator – 23 symbols representing
letters, and 35 symbols representing words
Cracked by Thomas Phelippes
at the first Cipher school in England
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Cryptography
History of Cryptography
Mary replied to a letter from Babington using the compromised cipher.
Phelippes added a forged postscript from Queen Mary asking Babington for the
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Cryptography
History of Cryptography
Mary was beheaded
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Cryptography
History of Cryptography
Al-Kindi (800AD)
Frequency Analysis Lipograms
English: ETAOINSHR German: ENIRSATUD French: EAISTNRUL Spanish: EAOSNRILD Italian: EAIONLRTS Finnish: AITNESLOK
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Lipograms
Lipograms
The most famous lipogram: Georges Perec, La Disparition (1969) 85000
words without the letter e:
Gottlob Burmann (1737-1805) R-LESS POETRY. An obsessive dislike for the
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Cryptography
History of Cryptography
Enigma (WW2) Vernam Cipher
3DES AES
Gilbert Vernam (AT&T) 1918
Claude Shannon of Bell Labs (ca. 1945) proved the one time pad guaranties perfect security as long as:
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
DES Cracker
DES Cracker
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Key Distribution
Key Distribution
Public Key Cryptosystem RSA (Factoring)
Others:
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Modern Cryptography
Modern Cryptography
Public-Key Cryptosystem (RSA, ECC) Public Key Infrastructure
Authentication method
Diffie-Hellman key exchange
Session key created for symmetric cryptography
Quantum Information Technology Group – Quantumlah
D
iff
ie
-H
e
llm
a
n
D
iff
ie
-H
e
llm
a
Quantum Information Technology Group – Quantumlah
D
iff
ie
-H
e
llm
a
n
D
iff
ie
-H
e
llm
a
Quantum Information Technology Group – Quantumlah
D
iff
ie
-H
e
llm
a
n
D
iff
ie
-H
e
llm
a
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Copyright, 2000-2006 by NetIP, Inc. and Keith Palmgren, CISSP
Diffie-Hellman
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Computational Complexity
Computational Complexity
n
L
L2
INPUT SIZE
E
x
e
c
u
ti
o
n
T
im
e
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Quantum Computer
Quantum Computer
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Quantum Cryptography
Quantum Cryptography
In April 2004, the EU decided to spend €11 million
developing secure communication based on quantum cryptography — the SECOQC project — a system that would theoretically be unbreakable by ECHELON or any other espionage system. European governments have been leery of ECHELON since a December 3, 1995 story in the Baltimore Sun claiming that
aerospace company Airbus lost a $6Billion contract with Saudi Arabia in 1994 after the NSA reported that Airbus officials had been bribing Saudi officials to
secure the contract.
Source: Wikipedia
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Quantum Cryptography
Quantum Cryptography
Quantum Key Distribution Bit = 0’s or 1’s
Quantum Information Technology Group – Quantumlah
Q
u
b
it
Q
u
b
it
W
h
ic
h
p
a
th
is
ta
k
e
n
?
B
O
T
Quantum Information Technology Group – Quantumlah
Q
u
b
it
Q
u
b
it
W
h
a
t d
o
y
o
u
s
e
e
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Qubit
Qubit
Ψ = α 0 + β 1
0 1
or
Ψ = + + +
+ + + +
000 001 010 011
100 101 110 111
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
measuring polarisation states of photons
H
V
+45
-45
PBS (H/V) PBS (45/-45)
Heisenberg Uncertainty Principle
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
BB84
BB84
1 0 1 1 1 0 1 1 …
Key generation
+ + X + + + X X …
Base selection
V H -45 V V H -45 -45 …
Base selection
X + X + + X + X …
Encoding
45 H -45 V V -45 H -45 …
0 0 1 1 1 0 0 1 …
Base discussion Over public channel
0 1 1 1 …
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
BB84
BB84
No Cloning Theorem : It is not possible to copy an unknown quantum state with perfect fidelity.
Bound on copying fidelity is such that Eve will not succeed in tapping the channel even if using the best possible quantum copying machine.
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
BB84
BB84
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Entangled State
Entangled State
) (
2 1
) (
i s
i i
s V e V H
H − α
= Ψ −
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Entanglement
Entanglement
–“If, without in any way disturbing a system, we can predict with
certainty… the value of a physical quantity,
then there exists an element of physical reality corresponding to this physical
quantity”
PERFECT
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Local Realism
Local Realism
Local realism is refuted by quantum theory
Entangled photons do not have predetermined values of polarization…
…so eavesdropper has nothing to measure
Quantum mechanics allows eavesdropper free communication
Any post-quantum theory that refutes local realism allows eavesdropper free
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Ekert 91
Ekert 91
( H V − V H )
=
Ψ −
2 1
) (
Perfect Security for error < 15%
( 45 45 45 45 )
2 1 )
(
+ −
− −
+ =
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
History of Q. Cryptography
History of Q. Cryptography
C.H. Bennett & G. Brassard 1984
Prepare and Measure Protocols
Entanglement Based Protocols
Quantum Information Technology Group – Quantumlah
E
x
p
e
rim
e
n
ts
E
x
p
e
rim
e
n
ts
A
lp
s
(2
3
.4
k
m
)
V
ie
n
n
Quantum Information Technology Group – Quantumlah
1
0
J
a
n
2
0
0
4
R
is
e
o
f t
h
e
Q
u
a
n
tu
m
Is
la
n
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Governments
Governments
US (US$ 100M = SG$ 166M)
US Army, NSA, DARPA, NIST, etc
Japan (SG$ 41.5M)
ERATO, ICORP, PRESTO
Europe (€ 15M = SG$ 30M)
Australia (AU$ 10M = SG$ 13M) Singapore (SG$ 8M)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
Commercial
Commercial
MagiQ (US) BBN (US)
id-Quantique (Swiss) QinetiQ (UK)
D-wave (Canada) Elsag (Italy)
Fujitsu & Toshiba (UK + Japan) Lockheed Martin (US)
Q
u
a
n
tu
m
I
n
fo
r
m
a
ti
o
n
T
ec
h
n
o
lo
g
y
G
ro
u
p
–
Q
u
a
n
tu
m
la
h
The Future
The Future
Hybrid System Satellite
Quantum Information Technology Group – Quantumlah