Quantum Computing: Introduction, Security Risk, & Migration
Presented by Mohammed Aldarwbi and Yaser Baseri
NRC Building, Rm# 119, 10am – 12pm, August 25, 2022
Introduction of Quantum Computing
Quantum Risk Assessment
Security Risks in Quantum Computing
Migration Strategy & Recommendations
-------------------------------
- Watch "Quantum key distribution: principles, types, challenges, & security promises" by Mohammed Al-Darwbi, youtu.be/tFXQlFisS6Y
- To learn more about the Canadian Institute for Cybersecurity watch, youtu.be/gYpEeJBZBx8.
#cybersecurityawareness #MohammedAldarwbi #YaserBaseri #RiskAssessment #PostQuantum #QuantumComputing #Migration #QKD #Canada
Stay connected with us!
Twitter: twitter.com/cic_unb
Facebook: fb.me/cicunbca
LinkedIn: linkedin.com/company/canadian_institute_cybersecurity/
Blog: cyberdailyreport.com/blog
Website: unb.ca/cic/
Canadian Institute for Cybersecurity
University of New Brunswick
46 Dineen Drive, Fredericton, NB E3B 9W4
0:00 Opening remarks
0:34 Outline
1:13 Classical computers
2:17 What can we do?
2:31 Quantum supremacy
3:39 Qubit
8:47 Quantum gates
9:18 Quantum supremacy: Entanglement
13:22 Quantum programming
13:29 Quantum supremacy
14:07 Types of quantum computers
15:38 Quantum threat
16:39 Shor's algorithm
18:28 Period finding to factor an integer
19:10 Grover's algorithm
20:15 Quantum risk
21:16 Quantum readiness & security impact
26:16 Migration strategy & risk assessment
27:46 Risk assessment & preparation
29:50 Migration strategy
30:51 Framework
34:19 STRIDE threat model
35:05 Methodology
39:22 Inflection points in migration path
40:40 Possible quantum-safe solutions
41:24 Quantum cryptography & quantum networks
41:38 Quantum mechanics advantages
42:15 No-cloning theorem
43:33 Wave-function collapse
45:31 Quantum internet
47:20 Stages in the development of a quantum internet
47:42 Quantum key distribution
48:27 Polarization
51:12 Quantum key distribution: BB84 protocol
51:51 Quantum key distribution
53:42 Post quantum cryptography
54:27 PQC Impact
58:30 Underlying problems
59:14 Timeline: NIST standardization
1:01:44 Evaluation criteria
1:04:45 NIST 1st, 2nd, 3rd and 4th rounds candidates
1:05:53 NIST 4th round candidates
1:06:48 KEM/ENC security comparison
1:07:37 Signatures security comparison
1:08:10 Attacks on PQC
1:11:31 Summary of attacks & countermeasures
1:12:53 Implementation library: Liboqs
1:14:03 KEM/ENC computation overhead comparison
1:14:57 KEM/ENC communication overhead comparison
1:15:05 Signatures computation overhead comparison
1:15:23 Migration strategy: recommendation -performance
1:16:33 Information security: how is data protected?
1:17:26 Network protocols
1:17:57 Protocols: TLS
1:18:21 Information technology: SSH
1:18:44 Virtual private networks: IPsec
1:19:23 Protocols: standardization
1:20:30 Hybrid approaches
1:22:02 Cryptography supporting goals
1:22:40 Data states
1:23:17 Data protection: data in-transit & secure communication
1:24:18 Secure communication
1:26:08 Hybrid approach for migration period
1:27:44 Hybrid approach: the advantages
1:29:00 Data protection
1:30:04 Hybrid post quantum standardization
1:33:40 Migration strategy: Steps
1:34:30 Migration plan: community
1:35:35 Migration plan: research
1:36:01 Migration strategy: crypto agility
1:37:47 Migration plan: automation & frameworks
1:38:03 Recommendations: to know
1:40:20 Recommendations: to do
1:41:13 Final remarks
1:42:16 Q&A
- Quantum Computing: Introduction, Security Risk, & Migration by Mohammed Al-Darwbi & Dr. Yaser Baseri ( Download)
- Quantum key distribution: principles, types, challenges, & security promises by Mohammed Al-Darwbi ( Download)
- 13. Quantum Computing & Cryptography - Professor Russell Esposito ( Download)
- An Introduction to Quantum Computing and How to Get Involved by Dr. Charlie Fancher ( Download)
- David Williams, CEO at ARQIT. Stronger, simpler encryption. ( Download)
- CPI Talk: Are we ready for the quantum era ( Download)
- Welcome to Quantum Computing Academy ( Download)
- Key Note TQCEBT - Introduction to Quantum Computing ( Download)
- The Role of Elliptic Curve Cryptography in the Post-Quantum Era ( Download)
- Quantum Cryptography Animated PowerPoint Slides ( Download)
- Quantum Encryption Algorithms and Error of Prime ( Download)
- Introduction to Quantum Computing (Ricky Dube, Tech Talk @ CodeDay Labs 2022) ( Download)
- Web Summit 2022: Quantum computing global race ( Download)
- Introduction to Quantum Computing ( Download)
- Quantum cryptography, the ultimate physical limits of privacy: A keynote by Mikhail Lukin ( Download)