• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Cryptography

      Quantum Computing & Cryptography: Moving From Binary to Superposition.

      • Posted by Nelly Moffett
      • Date September 5, 2019

      I’d like to thank Bruno Fedrici PhD in Physics and Quantum Technologies Advisor for the resources and advice on the subject. We had the opportunity to meet through the Microsoft AI class led by the programming school Simplon in Lyon.

      Since one of my priorities is helping the general public understand new technologies, I’ve been wanting to give Quantum Computing a try. I have to say that it is indeed a fascinating subject but when I saw the potential regarding cryptography, I couldn’t avoid thinking when quantum cryptography will make current encryption standards obsolete and how are we going to actually face it?

       

      Quantum Mechanics Basics

       First of all, is important to understand 3 quantum properties: Indeterminacy, Superposition and Entanglement.

      Indeterminacy is the fundamental limit to the precision that certain pairs of physical properties of a quantum state can be known, like its position and momentum (speed). This means that the more precise the position, the less precisely its momentum can be known and vice versa. A consequence of indeterminacy is the No-Cloning Theorem which states that it is impossible to create an identical copy of an arbitrary unknown quantum state (which is an important element of quantum cryptography).

      The second one is superposition, which refers to the quantum properties such as particles’ “position” that can take multiple values at the same time as illustrated by Schrödinger’s cat example. This means that the cat is in a state 50% alive and 50% dead before opening the box. When we open the box this is considered as observation/measurement making the system “the cat” falling to one specific component of the superposition: dead or alive.

      In classical computation we store information using binary values 0 and 1 before to process it thanks to a set of logic gates. Quantum computation uses quantum logic gates acting on two level systems in superposition (Qbits for quantum bits). This means it relies on the ability of manipulating both values 1 and 0 simultaneously, also called “quantum parallelism”.

      The third one is entanglement, which is just something spooky … Einstein literally referred to it as “Spooky action at a distance” which I find hilarious… Entanglement is when two quantum objects or more behave like a single system so measuring one subsystem affects the other, the idea is that the whole is more than a simple addition of the parts. It will be like if we run the Schrödinger cats’ experiment with two cats. If their state was entangled one will for instance always be dead when the other is alive even if they were physically separated in opposites sides of the universe!

       

      Quantum Cryptography

      As you know, a lot of our current online security depends on the effectiveness of public key cryptography. With quantum computers existing encryption standards will be obsolete at some point yes, but not in the near future. According to the state of the art quantum algorithms we need around 4000 Qubits to break existing public key encryption standards like the 2048-Bit RSA which is a lot compared to the 50 – 60 Qbits needed to have a quantum advantage or the 150-300 Qubits needed for calculations in quantum chemistry (like molecular simulations). Which explains why pharma and medicine will be one of the primaries business applications for this technology like Blockchain was for finance. Keeping this in mind it is suggested that businesses could be preparing for security threats from quantum computers in at least a decade. Even if is not in the near future, this shouldn’t prevent us for starting to prepare right away, sensitive data can be stored today and decrypted later when the technology will allow it.

      On the same subject, an article submitted on 28 Oct 2017 by Cornell’s University researchers stated that “ the elliptic curve signature scheme used by Bitcoin is much more at risk, and could be completely broken by a quantum computer as early as 2027, by the most optimistic estimates “.

      Most recently on May 13th 2019, an article from the Boston Consulting Group website said that “In 10 to 20 years, quantum computers are expected to achieve superior performance in tasks of genuine industrial significance”.

      As we can see this technology is in an early stage and is still quite expensive, sensitive and the error rate is high. The most advanced superconducting Qbits are between 50-100 Qbits and they are still fragile which results in errors in the form of “noise”. That is why we are currently in what is called the NSQI era (Noisy Intermediate-Scale Quantum).

       

      QKD Quantum Key Distribution

      If quantum physics is a threat to cybersecurity, it can also be used to protect us. QKD offers a different approach where information encoded on single photons can allow us to agree on a shared secret key that will allow us to encrypt and decrypt messages (I assume Kerckhoff would love this since he was all about protecting the private key). This new approach is very interesting since we switch from using mathematical algorithms to using the laws of physics to guarantee security.

      What I find amazing is QKD being possible thanks to quantum properties. Especially indeterminacy since it is central to quantum cryptography. Indeterminacy or No-Cloning means that since it is impossible to create a perfect copy of quantum particles, as an eavesdropper I would be forced to measure the original particle and altering it which ends up revealing my presence. On the other hand, if quantum states are entangled, they behave like a single system. That means I can’t intercept the key without disturbing states entangled properties and thus revealing my presence. More precisely, the idea of QKD protocols based on entanglement is that if a spy makes a measurement to acquire information, it will destroy this entanglement (measuring is a projective operation) and the results of the two communicating parties will no longer be systematically correlated.

      This makes undetected eavesdropping impossible which is a crucial difference with public key standards where the potential presence of an eavesdropper remains unknown all along a particular protocol.

      At first, I thought about this as being very theoretical but, in 2017 the Chinese satellite MICIUS did some trials on sending entangled photons between the Delingha station and the Lijiand station which are 1200km apart. I strongly believe that it is a good idea to keep an eye on the Quantum race and its disruptive potential (keeping in mind that error correction is one of the biggest challenges scientists will face in the coming years). I assume we will be hearing a lot from the public sector after billions euros/dollars recently invested through national initiatives in the US, EU and China, as well as from the private sectors with tech giants such as IBM, Google, Alibaba, or Atos, and spin off such as the American companies Rigetti, Zapata, IonQ and the Canadian 1QBIT to quote only a few of them.

      • Share:
      author avatar
      Nelly Moffett

      I help the general public discover New Technologies.
      I believe in "Innovation & Inclusion".
      I launched TAAL Project in France, a non-profit org to help people understand Blockchain Technology.
      www.taalproject.com

      Previous post

      How To Use Metasploit Auxiliaries
      September 5, 2019

      Next post

      Network Forensics with Tshark
      September 13, 2019

      You may also like

      secrets_370x208
      Unlocking Secrets: How to Crack SHA256 Passwords with Hashcat
      30 March, 2023
      domain-controllers_370x208
      Identifying Domain controller in a network
      24 March, 2023
      storm-braker_370x208
      Access Location, Camera & Mic of any Device 🌎🎤📍📷
      23 March, 2023

        1 Comment

      1. jhnwck
        jhnwck
        September 9, 2019
        Log in to Reply

        Nice, loved this.

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      ✔ Lifetime, unlimited access to course materials & training videos.

      ✔ Watch online or download lectures for offline use.

      ✔ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      ✔ Get answers from our Support Team within a maximum of 15 hours.

      ✔ Unlimited Updates.

      Get free 1 month VIP membership per course with:

      ✔ Live mentorship and Q&A session with the course instructor, Zaid.

      ✔ Instant support from community members through our private discord channel.

      ✔ Daily updates with the latest tutorials & news in the hacking world.

      ✔ Daily resources like CTFs, bug bounty programs, onion services and more!

      ✔ Access our VIP community & connect with like-minded people.

      ✔ Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance