Question

In: Computer Science

Approximately 1000 word report (800-1300 words excluding Conclusion) on ONE of the following topics: 1. Quantum...

Approximately 1000 word report (800-1300 words excluding Conclusion) on ONE of the following topics: 1. Quantum Cryptography 2. Quantum Computing and its impact on Cryptography 3. Zero-knowledge protocols (or proofs) in Signature Schemes 4. Secret Sharing (or splitting) in Cryptography It is VERY important that references are included (Note: Wikipedia is NOT acceptable)

This assessment requires the student to choose a topic from a supplied list and write a report as if it were to be presented as a professional development lecture for their peers. The choice of topics may include but not be limited to, material covered throughout the subject. Potential topics not covered in lectures may include quantum cryptography and quantum computing. Students are expected to discuss their choice with their lecturer during the workshops. This assignment is designed to improve the student’s organisational skills and encourage independent research into other topics not directly covered in lectures. Please present your lecture in report format which includes the following sections: • Title page • Introduction • Body paragraph • Body paragraph • Body paragraph • Conclusion • References • Appendices (if necessary) The report should: • include diagrams explaining concepts • Include all references cited and must be referenced in Harvard AGPS

Solutions

Expert Solution

Quantum computers can be highly beneficial to scientific developments due to the new, speedy way of performing computing. Once available, they however could break currently used cryptography and undermine the protection of (personal) data.

What is quantum computing?

The physical laws of quantum mechanics allow for an alternative method to how today’s computers process information. Whereas traditional computers use bits (0 or 1) as a building block, quantum computers employ quantum bits, or qubits, that can be at the same moment a combination of |0⟩ and |1⟩. The possible spectrum of values one qubit can adopt is best depicted by the surface of the Bloch sphere in Figure 1. While bits allow for two discrete values, qubits can store a point in a two-dimensional continuum, a surface of a sphere. Quantum computing can take advantage of those more powerful qubits and carry out operations not only for a determined value |0⟩ or |1⟩, but also for all possible superpositions at the same time. Consequently, quantum computing attains an efficiency advantage over binary computing for selected tasks. Some tasks would be rendered only feasible due to this efficiency boost, if the appropriate quantum computer hardware were available. In sum, quantum computers have a speed advantage over classical computers for selected problems and could therefore perform types of computation not available to current classical computers.

What are the data protection issues?

There are many reasons why quantum computing could have significant implications for data protection in terms of data security and confidentiality of communications. One reason is the ability to break cryptography. Quantum computing can break many of today’s classical cryptography and as such harm severely IT security. The risk extends to the core internet security protocols. Nearly all of today’s systems that demand security, privacy or trust, would be affected.

II.1. Impact on public-key cryptography

Public-key cryptography, also known as asymmetric encryption, is a method of encrypting data with the use of cryptographic protocols based on algorithms. It requires two separate keys, a private and a public key. The Rivest-Sharmir-Adleman (RSA) algorithm is a cryptographic system that is used for public-key cryptography, and is commonly used when sending sensitive data over the internet. The RSA algorithm allows for both public and private keys to encrypt messages so their confidentiality and authenticity remain intact. Quantum computers would allow for public-key cryptography systems to be jeopardised by adversaries in possession of a sufficiently powerful quantum computer, that could carry out the decryption without prior knowledge of the private key. Effected could be for instance digital signatures, essential Internet protocols like HTTPS (TLS) required for secure browsing, online banking, online shopping, etc.

II.2. Impact on symmetric cryptography

Quantum computing can also bring negative consequences for security guarantees of symmetric cryptography systems such as the Advanced Encryption Standard (AES). Asymmetric (e.g. RSA) and symmetric (e.g. AES) cryptography are often used together such as with the use of HTTPS. Symmetric cryptography needs practical ways of exchanging private keys in a confidential manner. To guarantee data security, the private key exchange must remain secure. But the key exchange methods used in practice today are based on problems that quantum computing may put at risk. To guarantee data confidentiality, the whole key exchange must remain secure.

II.3. Retrospective decryption

The technological progress in binary computing hardware, meaning today’s widespread classic computers, is also a threat to IT security. With increasing computing power at decreasing costs, the retrospective decryption of data from the past becomes of use if the employed key lengths used at the time were sufficiently short. Security experts regularly call out for an increase of key lengths to keep data secure for a given period. Some governments’ secret services are reported to collect data purposefully for future retrospective decryption. Quantum computers though follow different laws and would allow retrospective decryption in many cases much earlier.

II.4. Practical quantum computers

To be able to execute quantum algorithms with practical impacts, quantum computers would need to have thousands or millions of qubits with low error rates. This is something which is beyond the reach of technology in the foreseeable future. In 2019, Google claimed to have demonstrated quantum supremacy with its 54-qubit quantum computer (Oliver 2019). The claim was that it took their quantum computer hundreds of seconds to perform computation that would take thousands of years for a powerful non-quantum supercomputer. While the solved task has no practical significance, it served as a proof of concept. It is likely that more similar results may be announced in this decade, but in the foreseeable future they will unlikely have a practical impact. According to current understanding, to execute useful algorithms of practical relevance there is a need to build a quantum computer with more qubits and smaller error rates than what is possible today. The creation of a large and usable quantum computer within the next ten years is highly unlikely, but difficult to predict. It is this unpredictability that eventually leads to risks for IT security today.

II.5. Post-quantum cryptography

Post-quantum cryptography or quantum-safe cryptography refers to cryptography whose security is believed to be unaffected by quantum computers. This is achieved by the use of very different mathematical building blocks, which incorporate mathematical operations that quantum computers cannot solve more efficiently than other computers.

Post-quantum cryptography however will likely come with performance drawbacks and require larger computing resources to e.g. encrypt and decrypt data or sign and verify signatures and more networking resources to exchange lengthier keys and certificates. Post-quantum cryptography is not yet standardised. Sufficient and convincing knowledge must be available to conclude in a so-called cryptanalysis that such a solution is safe for both quantum and binary computing. The US National Institute of Standards and Technology (NIST) is working towards a Post-quantum cryptography standard and estimates to publish a draft with a first algorithm in 2022 or 2024. Once standardised, algorithms will need to be integrated with standard internet protocols like HTTPS. As of 2020, prototypes. of (non-standardised) postquantum cryptography are available for testing in the form of source code, software libraries (e.g. for OpenSSL), cloud services (e.g. Amazon AWS and Cloudflare) and consumer software (e.g. Google Chrome). It is estimated that a full transition could even take as long as 15-20 years in practice. Organisations should consider for how long they need to guarantee absolute confidentiality of data and protection from retrospective decryption. Based on what we know today there is no immediate threat posed by a quantum computer in the foreseeable future. It may likely take decades to build a usable quantum computer that can execute known algorithms. But for data that needs to remain safe for very long, this uncertainty poses an issue that may require an early transition to post-quantum cryptography. For this reason, some organisations may be interested in preparing appropriate risk assessment as well as contingency and migration plans. Such plans should always prioritise guaranteeing data security with respect to today’s non-quantum security. When transitioning to post-quantum systems, organisations should consider existing risks and the usual considerations during migration of data that would guarantee data security (i.e. reliability, availability) as well as confidentiality (e.g. when the data is re-encrypted with post-quantum cryptography). The German Federal Office for Information Security (2020) has developed initial recommendations for the migration to post-quantum cryptography.

Note: Plzzz don' t give dislike.....Plzzz comment if u have any problem i will try to resolve it.......


Related Solutions

Write a report Approximately 1000 word report (800-1300 words excluding Conclusion) on ONE of the following...
Write a report Approximately 1000 word report (800-1300 words excluding Conclusion) on ONE of the following topics: 1. Quantum Cryptography 2. Quantum Computing and its impact on Cryptography 3. Zero-knowledge protocols (or proofs) in Signature Schemes 4. Secret Sharing (or splitting) in Cryptography 5. P vs. NP It is VERY important that references are included (Note: Wikipedia is NOT acceptable) Written Report for required format and marking criteria. Note: Diagrams and / or images should be included. Any words associated...
Choose one of the following topics and write a paper of at least 1000 words on...
Choose one of the following topics and write a paper of at least 1000 words on your chosen subject. Use your textbook and at least two additional resources from the online library. 1. Stem cell research 2. DNA testing (for example, to determine if one has the breast cancer gene) 3. Euthanasia Structure your paper as follows: 1. Intro paragraph (5 points) a. Introduce the topic you chose and discuss how/why the subject of your topic is done. b. State...
How Covid19 may affects the accounting field and word ?(800-1000 words)
How Covid19 may affects the accounting field and word ?(800-1000 words)
Research paper on the following topics: (1000 word minimum) The ability to write a well-documented research...
Research paper on the following topics: (1000 word minimum) The ability to write a well-documented research paper is critical to any legal role. supplement with traditional and Internet-based resources ?• REAL PROPERTY • FINANCIAL CRISIS • PERSONAL PROPERTY
Word limit: 800-1000 words Questions: Buyers determine demand while sellers determine supply. Both laws of supply...
Word limit: 800-1000 words Questions: Buyers determine demand while sellers determine supply. Both laws of supply and demand establish market forces that make economies work to search for their market equilibrium. The impact of COVID-19 is an unprecedented event that affects the global economy. The overall retail sales dramatically dropped by 34.8%, with jewellery and luxury goods drop of 67% but supermarkets increase of 12%, in the first five months of 2020. However, online-based consumption, like demand for food delivery,...
Two routine messages, 400-500 words per message (800 to 1000 words total). Format: One routine negative...
Two routine messages, 400-500 words per message (800 to 1000 words total). Format: One routine negative message in the form of an internal memo. One routine positive message in the form of a blog post. Objective: To announce organizational restructuring, write one routine positive message addressed to investors, and one routine negative message addressed to employees. What’s the purpose of a routine positive or negative message? Like an internal memo, routine positive or negative messages function as short-form documents with...
Choose one of the following topics and write a report with a minimum of 8 pages...
Choose one of the following topics and write a report with a minimum of 8 pages and 4 references. Topics: 1.History of the Gas Turbine engine development from 1900 until the present. 2.The history of reciprocating aircraft engine technology from 1900 until the present. 3.Which modern automotive technology could improve aircraft reciprocating engines and the problems associated with incorporating the technology into aviation. 4.Current and historical aircraft Diesel engines – pros, cons and current usage. 5.Current research on lead-free alternatives...
Pick one of the following topics on energy. Report back to class with a 3 to...
Pick one of the following topics on energy. Report back to class with a 3 to 5 paragraph mini-report in essay format on what you found including your own thoughts as to the time frame of if/when the energy source may become more commonplace. Your mini-essay should also contain a paragraph relating your alternate energy source to the chemistry concepts we've learned in lecture material, for example - discuss a balanced reaction, the chemical structure of the materials involved in...
IN 800 word counts please discuss the following 4 question in your own words if using...
IN 800 word counts please discuss the following 4 question in your own words if using internet source please cite in your answer and please add the reference Part 2: Identify a nonprofit health care organization and a for-profit health care organization of your choosing . Answer the following: • Summarize the types of services provided, clientele served, and provider groups involved. • Compare and contrast the strengths and weaknesses of each organization from patient, provider, administrator, and third-party payer...
In your own words, provide a 100-word discussion of each of the following eight topics. Each...
In your own words, provide a 100-word discussion of each of the following eight topics. Each mini-essay earns from zero to three points. Points earned are based on a writing skills rubric. The maximum points available for this assignment is 24 points. Topic #1: Compare and contrast managed care and case management. Topic #2: Discuss four milestones in the history and evolution of case management systems. Topic #3: Compare and contrast acute care case management vs. palliative care case management....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT