100% found this document useful (1 vote)
101 views20 pages

Quantum Machine Learning and Threats To Existing Cryptography

This document discusses quantum machine learning and threats to existing cryptography. It begins with an introduction to quantum computing and quantum machine learning. It then discusses post-quantum cryptography and the threats quantum computers pose to modern cryptosystems. The document outlines candidate post-quantum cryptography algorithms under consideration for standardization and notes trends in increasing investment in quantum computing research and development. In the concluding remarks, it discusses challenges in migrating to post-quantum cryptography and the impact on crypto-assets.

Uploaded by

Eagle gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
101 views20 pages

Quantum Machine Learning and Threats To Existing Cryptography

This document discusses quantum machine learning and threats to existing cryptography. It begins with an introduction to quantum computing and quantum machine learning. It then discusses post-quantum cryptography and the threats quantum computers pose to modern cryptosystems. The document outlines candidate post-quantum cryptography algorithms under consideration for standardization and notes trends in increasing investment in quantum computing research and development. In the concluding remarks, it discusses challenges in migrating to post-quantum cryptography and the impact on crypto-assets.

Uploaded by

Eagle gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Quantum Machine

Learning and Threats to


Existing Cryptography

Presenter Name: Saira Shafi

Reg ID: 211862


Outline
 Introduction

 Quantum machine learning

 Quantum based cryptography

 Threats to existing cryptograph

 Latest Trends

 Summery

 References

Tuesday, May 31, 2022 Cryptography, S-22 2


Quantum computing is a game-changing technology that

Introduction affects modern cryptography and security systems.


The use of quantum phenomena like superposition and
entanglement to solve problems in classical machine learning
paves the way to quantum machine learning

Tuesday, May 31, 2022 Cryptography, S-22 3


Cont’d
 Quantum machine learning is at the intersection of two of the most sought after research areas
quantum computing and classical machine learning. Quantum machine learning investigates
how results from the quantum world can be used to solve problems from machine learning.
 In the quantum machine learning techniques, quantum algorithms are being developed to
operate the classical algorithms with the use of a quantum computer. Thus, data can be
classified, sorted and analyzed using the quantum algorithms of supervised and unsupervised
learning methods. These methods are again implemented through models of a quantum neural
network or support vector machine.
 Post-quantum cryptography refers to any type of cryptography, classical or quantum, that can
stand up to the attacks from quantum computers.

Tuesday, May 31, 2022 Cryptography, S-22 4


Post Quantum
Cryptography

Tuesday, May 31, 2022 Cryptography, S-22 5


Post Quantum Cryptography

• The goal of post-quantum cryptography (also known as quantum-resistant cryptography)


is to develop cryptographic systems that are secure against both quantum and
conventional computers and can interoperate with existing communication protocols and
networks.

• Some of the current, popular public key algorithms rely on the difficulty of solving
certain problems. However, Peter Shor came up with an algorithm based on quantum
computations that breaks these algorithms. The ability to survive quantum computing
attacks makes them a part of post-quantum cryptography.

• However, since they do not use quantum mechanics, they do not qualify as quantum
cryptography

Tuesday, May 31, 2022 Cryptography, S-22 6


Post Quantum Cryptography
Post-quantum cryptography schemes are classified into
• Codebased cryptography,
• Lattice-based Cryptography,
• Hash-based Cryptography,
• Multivariate-quadratic equations cryptography

Tuesday, May 31, 2022 Cryptography, S-22 7


Threats to
Existing
Cryptography

Tuesday, May 31, 2022 Cryptography, S-22 8


Threats to Existing Cryptography

• Quantum processors have powerful calculation capabilities and can dramatically


decrease the time to break existing encryption algorithms

• Currently, quantum computers pose a high threat to the cryptography that


underlies the safety of crucial networks. Cryptography is a powerful technique
for protecting data's authenticity, accuracy, IT infrastructure from malicious
hackers.

Tuesday, May 31, 2022 Cryptography, S-22 9


Threats to Existing Cryptography

• Modern cryptosystems are based on the fact that some mathematical problems are easier
to calculate in one direction but not in reverse. They are known as computationally
secure. It means that breaking these systems is not impossible but requires time that
grows nearly exponentially with respect to the input length.

• Quantum computers pose a real threat of breaking existing cryptography structure as


they provide algorithms for exponential speed-up.

Tuesday, May 31, 2022 Cryptography, S-22 10


Latest Trends

Tuesday, May 31, 2022 Cryptography, S-22 11


Latest Trends
• The recent increase in investment is motivated by a number of factors.
• First, an error correction methodology for quantum computing has been theoretically
developed. The error correction was necessary for computing, but its quantum
version was considered impossible during the early stage of development.
• Second, quantum supremacy was achieved empirically in 2019, Quantum supremacy
refers to the phenomena in which a quantum computer can solve a problem that
cannot be solved by any classical computer, including a supercomputer, within a
feasible time frame. The experimental achievement of quantum speedup is
considered empirically proven.
• Third, the Noisy Intermediate-Scale Quantum computer (NISQ) is expected

Tuesday, May 31, 2022 Cryptography, S-22 12


Latest Trends
• Quantum technology will induce greater threats and provides opportunities for more secure
encryption in the DER (Distributed Energy Sources) network. This research analysed that
possible quantum attacks in the future and predicts feasible timing and the results showed that
quantum attacks will be feasible in only three to five years.

Tuesday, May 31, 2022 Cryptography, S-22 13


Cont’d
• The National Institute of Standards and Technology (NIST) has been in the process of
standardizing post-
quantum cryptography (PQC), which is designed to be secure against quantum computers.
NIST has been scrutinizing the security and performance of 15 candidate algorithms (seven
finalists and eight alternate candidates). Timeline is as follows:
 Round 1until January 2019: NIST selected 26 algorithms out of 69 candidates
 Round 2 until July 2020: NIST selected 15 candidate algorithms (seven finalists and eight
alternate candidates
 Round 3 in 2020–2021: NIST continued the review process and will publish a draft of the
standards around 2022–2024.

• Number of researchers have expressed concerns that more time is needed to thoroughly
evaluate the candidate algorithms.

Tuesday, May 31, 2022 Cryptography, S-22 14


Candidate Algorithms for PQC Standardization

Tuesday, May 31, 2022 Cryptography, S-22 15


Candidate Algorithms for PQC Standardization

Tuesday, May 31, 2022 Cryptography, S-22 16


Concluding Remarks and Future Prospects
 Security of Cryptographic Algorithms in the Future
 PQC algorithms are expected to remain secure against attackers with ideal quantum computers; however, the
security of some classes of new PQC algorithms have yet to be thoroughly investigated,

 Challenges on Migration to PQC


 If new IT systems with PQC algorithms are developed during the algorithm migration, there will be a
heterogeneous mixture of systems with the new and old algorithms. As the migration proceeds, the old
systems will be gradually replaced while the new ones are deployed with backward compatibility.

 Impact on Crypto-Assets
 Participants of crypto-assets must agree in advance on new algorithms to be implemented and the timing of
the migration. In addition, existing signatures and hash values need to be protected in order to ensure the
integrity of past transactions and blocks

Tuesday, May 31, 2022 Cryptography, S-22 17


References
N. M. e. al, "Quantum Machine Learning: A Review," Data Management, Analytics and
Innovation, Advances in Intelligent Systems and Computing, vol. 1175, pp. 101 -145, 2021.

Y. K. Daniel Alvarez, "Survey of the Development of Quantum," in IEEE 11th Annual Computing
and Communication Workshop and Conference (CCWC), 2021.

S. G. Ajay Kumar, "State-of-the-Art Survey of Quantum Cryptography," in Archives of


Computational Methods in Engineering, Barcelona, Spain 2021, 2021.

K. K. a. M. Une, "Recent Trends on Research and Development of Quantum Computers and


Standardization of Post-Quantum Cryptography," MONETARY AND ECONOMIC
STUDIES , no. January 8, 2021, pp. JEL Classification: L86, L96, Z00, 2021.

A. Vinay Chamola, "Information security in the post quantum era for 5G and beyond
networks:," The International Journal for the Computer and Telecommunications Industry,
vol. 176, no. 1 August 2021, pp. Pages 99-118, 2021.
Tuesday, May 31, 2022 Cryptography, S-22 18
As every new technology can lead to both good and bad consequences, threat to

Summary the present cryptosystem is just one aspect. Threats to existing cryptography
discussed in this paper can have serious impact on the present cryptosystem. The
risk posed by a quantum computer to the present cryptosystem is an important
subject of discussion for researchers, and is being heavily worked upon.

Tuesday, May 31, 2022 Cryptography, S-22 19


Thank You

Tuesday, May 31, 2022 Cryptography, S-22 20

You might also like