Conf42 Quantum Computing 2022 - Online

Quantum Computing: Implications for Security

Video size:

Abstract

Quantum computing has been seen, in trade, research, and even science fiction literature, as a way to crack encryption keys with ease.

With the advent of the first practical (and now commercial!) quantum computing devices, it is possible to see that such a “universal decryption” application is likely a long ways off.

On the other hand, there are some very interesting applications that are much closer, with implications, both positive and negative, for information security.

This presentation will provide a brief outline of the realities and limitations of quantum computing, and then look at a wide variety of applications and implications in all domains of security.

Summary

  • This is security implications of quantum computing. Quantum computers deal with qubits. A qubit can be one and zero at the same time until we determine what it's ultimately going to be. Quantum technology can aid us in producing traditional computers.
  • quantum cryptography is not cryptography. It is basically just key exchange. It's going to be a long time before we see decent quantum computing proof algorithms for cryptography. Let's get into specific applications and what we can do with quantum computing in terms of security.
  • In terms of security, the news here is probably all bad. This is going to give us new architectures. It's going to introduce new vulnerabilities. The pattern matching capabilities of quantum computers. Is it going to be worth investing or not in quantum computing?
  • Business impact analysis and business continuity planning. Disaster recovery planning. The least path analysis part of quantum computing capabilities is definitely going to assist us there. Security testing of increasingly complex applications is a nontrivial task.

Transcript

This transcript was autogenerated. To make changes, submit a PR.
This is security implications of quantum computing. A little bit of introduction since we've got it here. Let me see. I've got get the chat and see if I can do that. No. Okay. I'll have to pick it up. Where are we here? There we go. Okay. There's the details in the chat screen if you want to do pick up those things. But anyways, that's sort of the introduction to a set of blog postings that I did some years back. That was five years ago, so that's got a little extra detail and introduction to what this is doing, because quantum computing. Well, quantum mechanics, I think it was Niels Bohr who said that anybody who thinks they understand it and their brain doesn't hurt, doesn't understand. You know, quantum computing is really interesting stuff. We definitely do not have an awful lot of an idea of what it really means, but in terms of not to get into the quantum physics and quantum mechanics stuff, but flowing out of the basic concepts there, we have the idea of the qubit. Now, we have bits in computers. We deal with bits. Quantum computers deal with qubits. And a bit is either a one or a zero. A qubit can be one and zero at the same time until we determine what it's ultimately going to be. The determination is what goes into quantum programming. This gets a little bit hairy because it can not only be one and zero at the same time, but any value in between in certain situations. So we won't get into that right now. We'll just say that it can be one and zero at the same time. What this allows us to do with sufficiently many qubits is to set up a situation where we can run through all possible values at the same time and find out which ones fit. That's basically what we talk about. We have all kinds of weird things about quantum mechanics and quantum computing. There's the observer effect. Schrodinger's cat is both alive and dead at the same time, and Schrodinger's phone, until you look, it's both cracked and not cracked at the same time, and stuff like that. But there's also an issue called entanglement, and we're going to touch on that slightly in one of these things in terms of networking. But the entanglement of multiple qubits is what gives us the opportunity to perform the same function on a bunch of qubits. And again, as I say, sort of find out which answer it is that actually fits with one operation. And here's the bore quote that I has saying if someone says that he can think or talk about quantum physics without becoming dizzy, that shows only that he has not understood anything whatever about it. So we'll do that. Now, one of the aspects of quantum technology with computers is that we can have quantum technology to aid us in producing traditional computers. So we're making chips and elements on the chips smaller and faster, and we're getting into the quantum size range, where there are quantum effects in what we're doing with chips and traces, and that sort of know we need to address that. There's also the fact that one of the things that Turing figured out with his ideas of computing, starting us all off here, is that irreversible computations, that's in traditional computers, they have a sort of a minimum limit. We're reaching the limits in terms of how much we can reduce the power consumption with traditional computers. But with quantum operations, we can do reversible computations, and in that case, you can make the power arbitrarily small. Again, we can build a traditional computer with very low power consumption if we're using quantum technology properly. There's quantum cryptography, and quantum cryptography is a real thing, but it keeps on getting mixed up with the idea of using quantum computers for decryption, a sort of a universal decryption. And people are saying, oh, quantum computers are going to kill. Cryptography has. We know it, and that is not the case, and we'll talk about that in a second here. But quantum cryptography, I do want to mention and disentangle it from this quantum decryption thing. Quantum cryptography is not cryptography. It is basically just key exchange. And I have a demo that we could do, but it takes half an hour, and we don't have time tonight, so we won't do that. But it is being used. I mean, a bunch of swiss banks have been using it, and there are a bunch of commercial enterprises that will sell this quantum cryptography stuff, which, as I say, has nothing, well, has to do with cryptography, but only in terms of key exchange. And, I mean, basically, you need dedicated, single mode fiber optic cable to do this key exchange. And if you've got dedicated, single mode fiber optic cable, why do you need cryptography, for crying out loud? Anyways. But it is something that is, unfortunately, in here and gets mixed up with everything else. It's real, but actually a lot more limited than people. It's very elegant. It's a really elegant idea. It just doesn't work in the real world. As I say, it's always implementation in cryptography it's always the implementation that gets attacked, and there's all kinds of implementation attacks on quantum cryptography, unfortunately. But quantum decryption, that's just hypothesized. It's going to be a long time before we see it, and by that time, we'll have decent quantum computing proof algorithms for cryptography. Anyways, the thing is, with quantum computing, there's also, is it a real, true quantum computer? And there are various quantum computers, fairly small. I think the largest of them is only barely into the three orders of magnitude qubit range, just over 100 qubits. And that isn't enough to do an awful lot of really interesting stuff. So those are only sort of test beds for the moment. And then there's d wave over in Burnaby here. And d wave has got something, but it's more of a quantum, um, it's like an analog mean, you know, we know digital computers, but we have had analog know. What are analog computers? Well, there's the spaghetti computer, which does parallel sorting. You cut pieces of spaghetti to the numbers that you want to sort, and then in one application, bang, you sort them all, and it's done. It's a special purpose. It has a single application, but there it's very effective. Same thing with the slide rule. We do exact computations, but it's a little imprecise in terms of how we read it. The D wave computer is an adiabatic quantum computer. It looks for situation where it gets the least energy and therefore the best answer, least path, best comparison simulation. So the D wave Orion machines, they are not full quantum computers. They have some very interesting capabilities, but it is at best, sort of a quantum coprocessor. That's the general idea. So having provided some of that as a background, let's get into specific applications and what we can do with quantum computing in terms of security. And I've structured this by the domains of security to give it a little bit of format when we do it. But the general functions that we're going to be looking at here are the same ones that the D wave can do, and that is looking at least path calculations, doing simulations, doing pattern matching, and lease path problems. The big example that people use is the traveling salesman problem. And for example, there's like 28,000 cities and towns in Norway. And the traveling salesman problem, if you've only got two sites to visit, it's easier to see which is the shortest path. It's just the shortest distance between two points is a straight line, one straight line. But as you start adding different places to go, then what's the best path to get to all the places? That's the traveling salesman problem. And this is not something that can be done easily with a traditional computer. As I say, there's 28,000 towns in Norway. They did the traveling salesman problem. I believe that it took like ten or eleven years using multiple network, high speed computers to actually do this. Whereas you get a big enough quantum computer, you can do it. One operation type of thing, simulation. There's all kinds of things that we can run with simulation, climate models, weather maps, those types of things are a really good example. The thing is that when you're doing weather and climate simulations, you divide up the atmosphere into a whole bunch of cells, and you do calculations on each cell. And then because those calculations have changed the results in all of those cells, then you have to go back and redo the calculations based on the new information from the surrounding cells. For every cell type of thing, it's over and over again. There's an awful lot of cells, therefore, there's an awful lot of processing, and it just takes a lot of time. Again, with a quantum computer, you're able to do this big enough quantum computer, you're able to do this sort of one shot so you can get closer to real time stuff and much more accurate, and therefore longer range forecasts. The other thing that we are really good at, and traditional computers are not, is pattern recognition. Now, there's a picture there of airplanes. Immediately you as a person look at that, and without even fully concentrating on it, you probably immediately think airplanes, and then possibly even military airplanes and that sort of thing. Whereas it would take a computer a long time to figure that out. People are good at this. Computers are bad, but the quantum computers are going to be much better at recognition. That type of thing that we want computers to be able to do is going to be much easier with quantum computers. So into the domains of security and what we can do with them, risk management. And again, this is shortest path traveling salesman type of problem, because when we're doing risk management, the tools that we've got for risk management, we put in all the data, collect all the data on the risks, on the threats, the realities, the impacts, and then the efficacy of different types of controls that we're going to put in place to counter, to mitigate the risks. Once we've collected all that data, we can then put it into sort of a giant spreadsheet and we can start playing around. What if we put a little bit of more effort, more resources into this control and reduce it in that, because, of course, you've always got a fixed security budget. Does this give us a better outcome? Does that trade off, give us a better outcome? But we've got to do all the shuffling of increasing this and decreasing that and see if it gives us a better result. Now, what the quantum computers, and again, once we get big enough ones, will allow us to do is collect all that data, put it in, and the quantum computer will be able to do the least energy, shortest path type analysis and tell us what's the optimum arrangement, the optimum configuration, the most efficient, the most effective, the most cost effective, greatest benefit for the fixed cost, for our various controls, for all the different risks that we have. So again, it'll sort of be a one shot bang and you get your answer type of thing, which right now is just not possible. Information classification, pattern matching is going to help us there. The pattern matching capabilities of quantum computers. Risk assessment is not something that people look forward to, like we said, in the risk management area, but we're going to have to do some thought here. Is it going to be worth investing or not in quantum computing? And again, figuring out what it can do for us and what the benefits are is going to be part of that decision as to whether or not we're going to get into the field of quantum computing for those benefits. In terms of security architecture, the news here is probably all bad. This is going to give us new architectures. It's going to be much more complex. It's going to introduce new vulnerabilities, just a whole bunch of work that we need to do in regard to that, simply because somebody might want to put a quantum computer into our company. But it does give us simulation of vulnerabilities and protections, allowing us to sort of test out whether or not given protections or safeguards are going to help us in certain situations. Quantum devices are going to, they are subject, quite subject, unfortunately, to issues of noise. And that is going to be something that we're going to have to look at and address in a variety of different ways. Right now, the d wave they've tried to reduce noise has much as possible, but basically what they do with their systems is just sort of vote run multiple times and see if they get the same answer multiple times. There are new technologies in terms of quantum error correction, again, going back to the issue of entanglement, and that may give us some promise in terms of fault tolerant computing. So it's an area to be addressed there in the field of access control biometrics, really, in terms of biometrics. Up until this point, we're using just interesting forms of data representation, but we're losing an awful lot of the data. That has implications for our error rates for false positives and false negatives. In terms of biometrics. The pattern matching capability of quantum computing is going to allow us more freedom there and more ability to say, well, yeah, that sure looks like it's Verne's login or face or fingerprints or whatever it is, even though it's not quite so, that pattern matching capability is probably going to assist us there in terms of both the lease path and the simulation capabilities. Information flow, which is very time consuming right now, and covert channel analysis, which again is something that's hard to figure out, is probably much more possible with quantum computers. And again, in intrusion detection, we've got our intrusion detection systems. The pattern matching capabilities is probably going to make those a lot more effective. So cryptography now has, I say we've got all the things about the quantum computing, which really is only the key negotiation, key exchange. It's the BB 84 protocol. It's tremendously elegant, wonderful. It is able to detect eavesdropping for the first time. All of that is in terms of the theory, but in terms of the implementation, there's just been all kinds of ways to attack that. Unfortunately, the issue of being able to do sort of parallel decryption all in one step, do brute force attacks that just drop the right key out of the system. That is limited to the shore algorithm and others that may use mod functions. Right now, it's basically RSA is susceptible to that. And there are new algorithms that are being pursued to make sure that they have a high work factor, both when you're doing classical types of crypt analysis and the quantum crypt analysis as well. One of the really important things in cryptography, of course, is randomness. And quantum computers actually can help us there. On the one hand, because they are so subject to noise, we can just use the noise as a source of randomness. But there's also, for the first know, John said that anybody who thinks of arithmetic methods of generating randomness is in a state of sin. But the thing is that there are things we can do with quantum devices that can give us genuinely random answers and in a sense, tunably random. We can take something that has a random output and sort of tweak the bias on it. So if we've got another system that is generating random stuff, but it has a bit of a bias, we can tweak the bias in the other direction and sort of use these two together and come up with a balanced source of random data. Again, cryptography desperately needs random data all the time. Analysis of the implementation problems. Like I say, you always attack cryptography in implementation, and quantum computing simulations will probably be able to help us to identify those issues in physical. This is really interesting. Again, the noise, radio frequency interference, electromagnetic interference, all of that stuff is a problem and needs to be addressed. But the big one, possibly, depending on which technology eventually gets used in this regard, is temperature. The Orion computer, well, it's running at super cold temperatures. Room temperature is 100 times as hot as interstellar space. But when the Orion computer is operating, interstellar space is 1000 times as hot as the central core of the Orion device. That's how cold we have to get for some of these operations. That has implications. We have to keep the power considerations in some of the technologies to create qubits for quantum computing. If you lose power, you just lose whatever process you're working on right now. You actually lose your cpu because you've got lattices of photons or electrons bouncing around in channels, in laser guides and things like that. It's a nontrivial task sometimes to keep these things power, heat and cooling. All of these issues are going to have to be addressed for operating quantum computing. So there's going to be special costs, there's going to be special protections for devices, and you're probably going to want to deal with physical access control. Who's going to get access to this business impact analysis? I've got to admit, sorry, business impact analysis and business continuity planning. Disaster recovery planning. This is close to my heart because, of course, of all my work in emergency management and doing a business impact analysis, what's most crucial, what's your most crucial, what are your various critical business units and systems and that sort of thing? The least path analysis part of quantum computing capabilities is definitely going to assist us there. The simulation part will very much help us with the testing of business continuity plans and whether or not they're effective, whether or not we've missed anything out. But what really is interesting to me is the disaster management, again, like the risk management in a disaster, you want to direct resources to maximum effect and that it saves lives, it helps people to, well, it reduces the suffering. So there's all kinds of really good stuff that can happen if you do proper management in the middle of a disaster. And like I said, the risk management that can be done, that has to be done. The calculations are very complex and generally take time to perform with a traditional computer because there's so many different moving parts. Well, when you've got a simulation situation, you're able to do those calculations in real time. So while the hurricane is going on and when it hits land 20 miles away from where you thought it was going to hit land, you've got a whole bunch of things that are in the wrong place. But with quantum computing, you can correct that very quickly and also address issues of what do we do to move those resources, to redirect those resources to where they are going to be most needed as soon as possible. Again, the continuity of operations for these special devices is definitely going to be an issue. Talking about the power, talking about the cooling, what is going to happen if there's failures there? Now, in terms of application security testing of our increasingly complex applications is a nontrivial task and one where quantum computing will definitely be able to assist us and give us better information. Database analysis, again, the pattern matching capabilities will help us. And looking, as I talked about, in terms of the differential privacy, the cost of privacy versus the benefit of safety and some of those calculations, database aggregation, problem analysis, and again, the privacy budget, privacy accounting calculations that differential privacy is meant to address, um, will, you know, they're going to be very complex. And, and so quantum computers are probably going to be an area that will assist us in there learning artificial intelligence, machine learning, the pattern matching capabilities of quantum computing are probably going to be very useful, give us new insights in there. And the thing is that right now, when we're trying to check the output of a neural network, say, or of genetic computing operation, because those are systems that are going beyond what traditional computers are capable of, how do we have a check on what they're doing? Well, quantum computing gives us those same capabilities coming at it from a different. So again, as with the voting in the Orion systems, probably running a neural net, running a quantum computing assessment, and seeing whether or not they agree is at least a first attempt at trying to check some of these things that we want to know about. Again, as I say, we traditionally say check the output against what you expected. Well, with a lot of these artificial intelligence things, what did we expect? The reason that we're doing them is because we wanted to get results that we didn't expect. But when we get quantum computing in there and start looking at those results, how are we going to check them? You know, those things are, are things that we're going to be impossible to compute by classical methods. And so how are we going to test whether or not this is actually working, malware, botnet decryption, as per the intrusion detection, the pattern matching capabilities is going to allow us better analysis there. Also in terms of both malware looking at what family does this come from and therefore tying it back to what group, what possibly even the individual is the person who wrote this. But certainly in terms of botnets out on the Internet looking at the control and ownership of these large networks, it's a nontrivial task and quantum computers can help us there. There are going to be completely new paradigms in programming here. It's already hard for some of us old dinosaurs to. We're stuck in the procedural days. I've done a little bit of functional programming and that can turn your head, certainly object oriented. I think object oriented programming is basically lying to you because I want to know who's going to show me an object oriented cpu. It doesn't work, or rather it seems to work, but sort of how, it's kind of a trick. But anyways, what quantum computing, they're really going to change our outlook in terms of how we think about programming. How do we make sure that they work? Just being able to write a hello program is not going to mean that you understand how quantum computers actually do operate. So in terms of security, we are going to have limitations of classical and quantum devices and operations to increase the complexity of our systems that are already very complex. So the complexity there is going to create problems for us. On the other hand, quantum computers with simulation, with the pattern matching will probably provide tools for us for troubleshooting, which is a good thing because we will have to be troubleshooting where the problem lies in a system which contains both quantum and classical computers. So again, it's not going to be an easy thing to do. Insider attacks pattern matching capabilities of quantum computing may give us some tools for insider attack detection. That has been a very intractable problem. It's always been an issue and it's not easy to figure out who's going to deal with it. So it's an interesting situation and maybe we will get a tool that can help us there. Telecommunications and networking. Again, we've mentioned intrusion detection systems and the capabilities there, botnet detection and assessment and looking at the command and control, the ownership, particularly for fast flux systems, network attack analysis, all of these things are issues where the tools that quantum computers give us can help. We're coming to the limitations of our spam detection, even with bayesian analysis. Certainly a number of the systems that I work with regularly, it seems to be a problem. And the pattern matching capabilities that go along with quantum computing are probably areas where we'll get new spam decryption tools in there. Quantum encryption requires special channels, the quantum cryptography. Quantum devices, though, are likely to be remote access for the foreseeable future. We're going to start out with centralized systems with sort of like timesharing capabilities that you can sign on, you can get something from, pay rent for time on the computer. So it's going to be remote access. And again, dealing with telecommunications and networking for these situations, particularly as we're doing some computations with a quantum computer and some with classical, there's going to be data flying back and forth, and we need to protect that and perform authentication on who's available to do it. Interesting communications channels. The quantum entities that we use for transmission can provide for more than one bit per photon. For example, one test sent enough data for a small graphic image. I think it was around 128 bits in one photon. So there's also, as I say, the possibility of continuously variable entities. So we have an analog photon, which is really kind of bizarre because the whole point of quantum computing was that it was defining stepwise states in entities. So being able to send something in an analog situation is kind of mind blowing. Quantum networks, this is something that I came across recently. I'm not sure about this. I mean, they made it work and that sort of thing, but it's probably going to be more local connections in terms of distributed quantum computing rather than large scale networking, at least for the immediate future. So that's going to be an interesting field of research and law and investigation. We're going to have new forensic analysis tools. The pattern matching and simulation there could be very helpful. But the presentation and acceptance in court, as per the earlier discussion on presenting technical evidence in court, is definitely going to be problematic. So we're going to have to deal with that. And we managed to get through all the slides.
...

Robert Slade

Malware Researcher

Robert Slade's twitter account



Join the community!

Learn for free, join the best tech learning community for a price of a pumpkin latte.

Annual
Monthly
Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Delayed access to all content

Immediate access to Keynotes & Panels

Community
$ 8.34 /mo

Immediate access to all content

Courses, quizes & certificates

Community chats

Join the community (7 day free trial)