The Quantum Computing : India’s Leap into the Future
support615598
193 views
34 slides
Jul 28, 2024
Slide 1 of 34
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
About This Presentation
The AI Dev Day India was organized by AgileWoW. This topic was presented by Venkata Subramaniam.
Quantum computing is an emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.
While quantum computing won’t be able to solve all pro...
The AI Dev Day India was organized by AgileWoW. This topic was presented by Venkata Subramaniam.
Quantum computing is an emerging technology that harnesses the laws of quantum mechanics to solve problems too complex for classical computers.
While quantum computing won’t be able to solve all problems, it is expected to offer improvements over classical computers in solving complex problems. These areas in which we expect quantum computing to offer computational advantages include:
Simulations, such as modeling processes and nature systems
Mathematics and processing data with complex structure
Search and optimization
Improved nitrogen-fixation
process for creating ammonia-
based fertilizer
New catalysts to make CO
2
conversion into hydrocarbons
more efficient and selective
New classes of antibiotics to
counter the emergence of
multidrug-resistant bacterial
strains
Better financial models to
improve stability, predictability
and growth of world economies
bits to represent the energy
configuration of a single caffeine
molecule at a single instant in a
classical computer.
This is 1 to 10% of the total number
of atoms in the Earth.
10
48
=
1,000,000,000,000,000,
000,000,000,000,000,000,
000,000,000,000,000
24
•Goal: Improve Phishing detection in Ethereum
transaction networks using Quantum ML algorithms
•Core Idea : Created classical ensemble of
Quantum-classical ML models. Achieved least false
positives with QSVM and ensembles created with
QSVM.
•Buisness Impact – Banks and other financial
institutions are interested in fraud detection, anti-
money laundering and other anomaly detection
problems.
•The overall code is generic for any classification and
regression task, thus these algorithms can be used
to create other QML applications.
QML Application for Anomaly Detection (IBM + IITM)
25 AUG. 21, 2020
Example: Web Traffic Encryption via TLS
QUANTUM RISKS
26 AUG. 21, 2020
Example: Web Traffic Encryption via TLS
QUANTUM RISKS
1)Server presents signed
public key (=certificate) to
client
2)Agreement on session key
3)Channel encrypted using
symmetric encryption
27 AUG. 21, 2020
Cryptography today
QUANTUM RISKS
•Key distribution with public key cryptography:
Public key = Private key =
•Examples: Web traffic, Email, Virtual Private Networks, Remote Connections …
•Currently used “best-practice” public key algorithms, e.g. RSA, Diffie-
Hellman, Elliptic Curve Crypto (ECC)…, rely on three mathematical problems:
1.Integer Factorization
2.Discrete Logarithm
3.Elliptic Curve Discrete Logarithm
…recognized to be hard problems for a classical computer but could be solved
efficiently on a quantum computer (Peter Shor, 1994)
28 AUG. 21, 2020
Security time value of data – the Risk Timeline
QUANTUM RISKS
Time
Today
Data at Risk
Product Development Product Life Span
Crypto – Clock hits 0
Product Security Lifespan
0 10 20 30
HIPAA – 6 years from its last use, Securities exchange act
Toxic Substances Control Act / Occupational Safety and Health Act
Trade secrets, Mergers and Acquisitions
Guide 0068 - Clinical Trials 25 Years
Tax Records 7-10 Years in most countries, Sarbanes Oxley
Years
29 AUG. 21, 2020
Cryptography that is resistant against a quantum attacker
QUANTUM RISKS
Quantum Key Distribution
(“Quantum Cryptography”)
•Key distribution exploiting quantum
physics (e.g. use of ‘single photons’)
•Provably secure against (quantum)
eavesdropper
•Requires special infrastructure:
optical fibers/satellites
•Range limitations & low bitrate
Quantum-Safe Cryptography
(“Post-Quantum Cryptography”)
•Classical algorithms based on ‘hard’
mathematical problems
•Considered secure against quantum
attacker
•Can be implemented on todays
infrastructure (e.g. update of TLS)
•No range limitation / limitation in
bitrate
Journey to Quantum Safe
GSMA Telco
Consortium
IBM Quantum Safe
z16US Government
establishes timeline for
transition to CNSA 2.0-
compliant algorithms
Support industry
transition to quantum-
safe cryptography
Support client
transition to quantum-
safe cryptography
First Quantum-safe
platform
U.S.National Institute of Standards and
Technologyannounced the first quantum-
safe cryptography protocol standards for
cybersecurity (July 2022), three of which
were created by IBM in collaboration with
industry and academic partners.
Purpose Algorithm
Public-key Encryption and Key
establishment Algorithms
CRYSTALS-Kyber
Digital Signature Algorithms CRYSTALS-DILITHIUM
DSA (alternate) Falcon
DSA (alternate) SPHINCS+
NIST Selected Algorithms, July 5
th
2022. NIST recommendedtwo
primary algorithmsto be implemented
for most use cases:CRYSTALS-
KYBER(key-
establishment)andCRYSTALS-
Dilithium(digital signatures).