SlideShare a Scribd company logo
CAMBRIDGE QUANTUM COMPUTING
				
The Need for Certifiable Quantum
Encryption and How to Solve it
Mark Jackson, Ph.D.
January 2020
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and How to Solve It
1) Post-quantum Encryption Algorithms
2) Quantum Communication
3) Certifiably Secure Key Generation
Outline
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and How to Solve It
Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and How to Solve It
Bit becomes Quantum Bit
Bit Qubit
Until we measure a qubit, it is in a
“superposition” of being both a 1 and 0
In 1994 Peter Shor discovered a
very important quantum
program: decomposing
integers into its prime factors
Shor’s Algorithm
433 x 937 = 405,721
easy (multiplying)
hard (factoring)
99% of
online
encryption}
Post-Quantum Encryption
}
26 Candidates
Announced by
NIST in January
2019
Quantum Annealing: The New Threat to Cybersecurity
April 2019: Chinese Claim to Use Annealing for Decryption
Annealing: Hacking Within ~5 years?
Credit: Fujitsu
Urgency: Mosca’s Inequality
TIME TO TRANSITION TO
QUANTUM ENCRYPTION
TIME WISHED FOR DATA
TO BE SECURE
TIME FOR PROCESSORS TO
BREACH CLASSICAL ENCRYPTION
Time
DANGER
Don’t wait - upgrade your encryption now!
Quantum Communication
QKD
Credit: Center for Quantum Technologies, Singapore
Absolute Security through Quantum Entanglement
Creating a Quantum Network
Works up to about
~100 km
Similar networks
being built in

China, Switzerland,
UK, and NYC
A Few Months Ago in the Washington Post
Credit: (l) Jeanne Whalen and Daniel Hertzberg for The Washington Post; (r) Defense Systems
August 2016: Micius Satellite
Last Month in the Washington Post
Start with a Secure Base
Certifiable

Random Numbers
Post-Quantum

Encryption Algorithms
Cybersecurity
Infrastructure
(Pseudo)Random Keys Can Be Hacked
June 2017
Example: Heartbleed
• In 2014 a vulnerability was
discovered in the OpenSSL
cryptographic library, making
secret keys accessible
• This allowed attackers to
eavesdrop on communications,
steal data, and impersonate from
services and users
What is a Certifiable Random Number?
• Cannot be predicted
• Cannot be known by anyone else
RNG needed for QKD
Agility
Shim
Policy
Server
IronBridge
(Remote)
Crypto Libraries
REST, PKCS#11, ICFS…
Post Quantum Crypto.
CQC Cryptographic / Engineering Team
Client
Infrastructure
Customer Environment
API
Enforce Policies for
Cryptographic Standards
On-Premise Deployment Cloud Deployment
IronBridgeTM Deployment
US Patent Pending
Conclusion and Forecast
Now 5 years 10 years
Quantum

Computers

Exist
Advantage from

Financial

Algorithms
Quantum

Encryption

Exists
Hacking

possible from

Quantum

Computers
Quantum

Computers

Fully

Integrated
Hacking

likely from

Quantum

Computers
Q&A

More Related Content

PDF
From Graph Convolutional Networks to Time Series
PPTX
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
PPTX
secure communication using quantum cryptography[1].pptx
PDF
Ad26188191
PDF
What is Quantum Cryptography and Know How Does QKD Work
PDF
Exploring Quantum Cryptography: Next-Generation Security Protocols
PDF
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
PDF
Report.pdf
From Graph Convolutional Networks to Time Series
Quantum-Cryptography-The-Next-Gen-Encryption-Revolution.pptx
secure communication using quantum cryptography[1].pptx
Ad26188191
What is Quantum Cryptography and Know How Does QKD Work
Exploring Quantum Cryptography: Next-Generation Security Protocols
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
Report.pdf

Similar to Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and How to Solve It (20)

PDF
Quantum Cryptography and its Applications
PDF
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
PDF
Post-Quantum Cryptography - Knowing the Unknown Cyber World | USCSI®
PDF
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
PDF
Quantum computing and its Impact to ICT industry
PDF
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
PPTX
Quantum Safety in Certified Cryptographic Modules
PPTX
McClansy Security Corporation
PPTX
Quantum computer in cryptography
PPTX
Shahzad quantum cryptography
PDF
Quantum Internet: Everything You Need To Know | Enterprise Wired
PDF
Three Party Authenticated Key Distribution using Quantum Cryptography
PDF
Domen Zavrl - The Quantum Future of Cryptography
PDF
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
PDF
Criptografía cuántica - fundamentos, productos y empresas
PPTX
Naman quantum cryptography
PDF
namanquantumcryptography-150820161809-lva1-app6892.pdf
PDF
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
PDF
Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...
PPTX
The convergence of IoT and Quantum Computing
Quantum Cryptography and its Applications
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
Post-Quantum Cryptography - Knowing the Unknown Cyber World | USCSI®
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
Quantum computing and its Impact to ICT industry
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Quantum Safety in Certified Cryptographic Modules
McClansy Security Corporation
Quantum computer in cryptography
Shahzad quantum cryptography
Quantum Internet: Everything You Need To Know | Enterprise Wired
Three Party Authenticated Key Distribution using Quantum Cryptography
Domen Zavrl - The Quantum Future of Cryptography
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Criptografía cuántica - fundamentos, productos y empresas
Naman quantum cryptography
namanquantumcryptography-150820161809-lva1-app6892.pdf
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
Apidays New York 2024 - Post-Quantum API Security by Francois Lascelles, Broa...
The convergence of IoT and Quantum Computing
Ad

More from CSNP (12)

PDF
Brian Sanders - Business Electronic Compromise (BEC)
PDF
David Klein - Defending Against Nation Sate Attackers & Ransomware
PPTX
Nicholas Dorans - The Evolution of Passwords
PPTX
Neil Desai - Data Driven Analytics
PDF
Emily Stamm - Post-Quantum Cryptography
PDF
Tarik Moataz - Encrypted Search: from Research to Real-World Systems
PDF
Elliptic Curves in Cryptography
PDF
DefendEdge - Negotiating Ransomware
PDF
Complyify Car Hacking & Cyber Risk
PDF
Aon Ransomware Response and Mitigation Strategies
PDF
Aon - Cyber Insurance in the World of Cyber Criminals
PDF
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Brian Sanders - Business Electronic Compromise (BEC)
David Klein - Defending Against Nation Sate Attackers & Ransomware
Nicholas Dorans - The Evolution of Passwords
Neil Desai - Data Driven Analytics
Emily Stamm - Post-Quantum Cryptography
Tarik Moataz - Encrypted Search: from Research to Real-World Systems
Elliptic Curves in Cryptography
DefendEdge - Negotiating Ransomware
Complyify Car Hacking & Cyber Risk
Aon Ransomware Response and Mitigation Strategies
Aon - Cyber Insurance in the World of Cyber Criminals
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Ad

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Weekly Chronicles - August'25-Week II
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Cambridge Quantum Computing - The Need for Certifiable Quantum Encryption and How to Solve It