cryptography quantum computing and evolutionary
play

Cryptography, quantum computing, and evolutionary computation Thijs - PowerPoint PPT Presentation

Cryptography, quantum computing, and evolutionary computation Thijs Laarhoven mail@thijs.com http://www.thijs.com/ CFMAI 2019, Bangkok, Thailand (December 13, 2019) Cryptography History Cryptography Classical cryptography Some operations


  1. Cryptography, quantum computing, and evolutionary computation Thijs Laarhoven mail@thijs.com http://www.thijs.com/ CFMAI 2019, Bangkok, Thailand (December 13, 2019)

  2. Cryptography History

  3. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 714881 × 448843 =

  4. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 =

  5. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683,

  6. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 188629334237 =

  7. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 11 × 13, 188629334237 =

  8. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 11 × 13, 188629334237 = 214729 × 878453.

  9. Cryptography Classical cryptography Some operations are easy to perform in one direction... 7 × 17 = 119, 714881 × 448843 = 320869332683, ...but are difficult to “invert”, or compute in the reverse direction 143 = 11 × 13, 188629334237 = 214729 × 878453. The security of modern cryptography depends on the hardness of such problems.

  10. Cryptography Protocols Example : Suppose Bob wishes to send a private message to Alice across the world.

  11. Cryptography Protocols Example : Suppose Bob wishes to send a private message to Alice across the world. Insecure solution : • Bob sends Alice the message in the clear over the internet. • Problem: Others can see the contents of the message.

  12. Cryptography Protocols Example : Suppose Bob wishes to send a private message to Alice across the world. Insecure solution : • Bob sends Alice the message in the clear over the internet. • Problem: Others can see the contents of the message. More secure solution : • Alice sends Bob a product (323), for which only she knows the factors (17,19). • Bob computes some function of his message modulo 323 and sends it to Alice. ◮ This function is easy to compute but hard to invert without the prime factors • Alice, knowing the prime factors, can invert and recover Bob’s message.

  13. Quantum computing Overview

  14. Quantum computing Applications to cryptography

  15. Post-quantum cryptography Ongoing efforts

  16. Post-quantum cryptography Candidates

  17. Lattices Basics O

  18. Lattices Basics b 2 b 1 O

  19. Lattices Basics b 2 b 1 O

  20. Lattices Shortest Vector Problem (SVP) b 2 b 1 O

  21. Lattices Shortest Vector Problem (SVP) b 2 b 1 O

  22. Lattices Evolutionary approach to SVP b 2 Basic lattice tools b 1 • Given a lattice basis, sampling a (long) lattice vector v ∈ L ( B ) is easy • If v 1 and v 2 are lattice points, then so is w = v 1 − v 2 O

  23. Lattices Evolutionary approach to SVP b 2 Basic lattice tools b 1 • Given a lattice basis, sampling a (long) lattice vector v ∈ L ( B ) is easy • If v 1 and v 2 are lattice points, then so is w = v 1 − v 2 Evolutionary approach • Construct random initial population of lattice vectors O • Combine parent vectors v i , v j to produce offspring w • Select the fittest parents and children for the next generation • Repeat until the population contains a shortest non-zero lattice vector

  24. Lattices Sample a list of random lattice vectors O

  25. v 9 Lattices v 12 Sample a list of random lattice vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  26. v 9 Lattices v 12 Collect all short difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  27. v 9 Lattices v 12 Collect all short difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  28. v 9 Lattices v 12 Repeat same procedure with difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  29. v 9 Lattices v 12 Repeat same procedure with difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  30. v 9 Lattices v 12 Repeat same procedure with difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  31. v 9 Lattices v 12 Repeat same procedure with difference vectors v 2 v 15 v 8 v 4 v 14 v 1 v 6 v 5 v 3 O v 7 v 11 v 10 v 13

  32. v 9 Lattices v 12 Repeat same procedure with difference vectors v 2 v 15 v 8 w 5 v 4 v 14 w 7 w 4 w 6 v 1 w 8 v 6 w 1 v 5 v 3 O w 10 w 3 v 7 v 11 w 2 v 10 w 9 v 13

  33. Summary • Cryptography : ◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring

  34. Summary • Cryptography : ◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring • Quantum computing : ◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes

  35. Summary • Cryptography : ◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring • Quantum computing : ◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes • Post-quantum cryptography : ◮ Relies on different hard problems, such as lattice problems ◮ Transitions are gradually happening, standardization in progress

  36. Summary • Cryptography : ◮ Methods for secure communication over insecure (public) channels ◮ More applications every day with an interconnected world ◮ Security currently relies on number-theoretic problems, like factoring • Quantum computing : ◮ Offers new opportunities in many areas, to solve harder problems ◮ Poses threat to currently-deployed cryptographic schemes • Post-quantum cryptography : ◮ Relies on different hard problems, such as lattice problems ◮ Transitions are gradually happening, standardization in progress • Artificial intelligence : ◮ Offers new powerful algorithmic tools and capabilities ◮ Evolutionary techniques improve state-of-the-art for lattice problems ◮ Only scratching the surface – more applications possible?

Recommend


More recommend