Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This...

13
Quantum Security for Classical Computers Evelyn Krivorotova | Patrick Leggett | Wildenslo Osias

Transcript of Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This...

Page 1: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

Quantum Security for Classical ComputersEvelyn Krivorotova | Patrick Leggett | Wildenslo Osias

Page 2: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

● Preparing and Interpreting a problem to be solved by quantum computing using classical methods

● Conducting hands-on exercises using Network Miner, IBM Q Experience, Qiskit Aqua and the Falcon Sandbox API to demonstrate how quantum computing will impact forensics

Project Overview

Page 3: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

What is Quantum Computing ?● Quantum Computer vs Classical Computer● Classical bit vs Qubit● Superposition & Entanglement

Page 4: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

Literature Review • Quantum Computing, 2001

• Cryptographic distinguishability measures for quantum-mechanical states, 1999

• Quantum Algorithm Implementation for Beginners, 2018

• Stability of Grover’s algorithm in respect to perturbations in quantum circuit, 2017

Page 5: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

Quantum Algorithms

● Shor’s Algorithm - quantum algorithm for integer factorization

● Grover’s Algorithm - quantum algorithm that finds with high probability the unique input to a black box function that produces a particular output value

Page 6: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

Project Requirements● IBM Q Experience - cloud service that that gives users in

the general public access to a set of IBM's prototype quantum processors

● Qiskit/Qiskit Aqua - an open-source quantum computing software development framework. Qiskit Aqua is a library of quantum algorithms

● Falcon Sandbox Public API - open and free API that can be used to submit files/URLs for analysis, pull report data, but also perform advanced search queries

● Network Miner - open source forensic analysis tool

Page 7: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

Example of Qiskit Entire Workflow

Page 8: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

IBM Q Experience / Qiskit

• Qiskit - Initial Installation

– Anaconda Prompt– Pip– API Token

Page 9: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

Circuit Composer

• Ibmqx4 5-qubit computer• How does Grover’s Algorithm apply?• Building the circuit

Page 10: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

Qiskit & Qiskit Aqua • Qiskit (Powered by Jupyter) • QASM• Qiskit Aqua

Page 11: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

Qiskit Pseudocode Executing Satisfiability Problem

Page 12: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

Preliminary Findings:● 3-SAT probabilities ● 5-SAT probabilities would run slightly lower● Current systems can not carry all gates/device

strings

Future Work:● Building a system to perform computation tasks

before decohering● New components for Qiskit Aqua

Preliminary Findings & Future Work

Page 13: Quantum Security for Classical Computerscsis.pace.edu › ~ctappert › srd › a10s.pdf · This presentation uses a free template provided by FPPT.com Preparing and Interpreting

This presentation uses a free template provided by FPPT.comwww.free-power-point-templates.com

● Thank you!