https://www.youtube.com/watch?v=PDjAuSAcbY4 The impact of quantum computers in cybersecurity
-
0:00 - 0:02[Transcribed by Pekka P]
-
0:02 - 0:03(KYBS2004 course assignment at JYU.FI)
-
0:03 - 0:14♪ (37C3 intro music) ♪
-
0:14 - 0:18And with that, I would love it for you to welcome Alessandro and his great talk.
-
0:27 - 0:28Can everybody hear me okay?
-
0:29 - 0:29Yes.
-
0:30 - 0:30Okay.
-
0:30 - 0:31Okay.
-
0:31 - 0:33So, quantum computers.
-
0:33 - 0:43Dear community, dear hackers, it was December of 14 years ago that I attended my first CCC
-
0:43 - 0:44in Berlin.
-
0:44 - 0:49And it's also because of that experience and that community that I made a series of
-
0:49 - 0:56choice that led me here as a researcher studying quantum algorithms and quantum computation.
-
0:56 - 1:02And there are certain similarities that we can draw between hacking and writing quantum
-
1:02 - 1:03algorithms.
-
1:03 - 1:09The idea is that writing quantum algorithms is like hacking nature.
-
1:09 - 1:10Why?
-
1:10 - 1:18Well, because we can think of nature as a quantum mechanical system and programming it is like
-
1:18 - 1:24a way to make nature behave in a way that is not meant to be used.
-
1:24 - 1:27So, writing quantum algorithms is a lot of fun.
-
1:27 - 1:32It is a lot of fun in games, but how do I feel today?
-
1:32 - 1:37Well, today I feel a little bit meh.
-
1:37 - 1:38Why?
-
1:38 - 1:47Well, because the impact of quantum computers is not communicated very well in the press today.
-
1:47 - 1:50There is a lot of hype.
-
1:50 - 1:55So, we are here today to understand better what's the impact of quantum computers, especially
-
1:55 - 1:58in cyber security.
-
1:58 - 2:01So how do we measure impact?
-
2:01 - 2:11Well, we can say that a new paradigm for doing computation has impact if it's faster than
-
2:11 - 2:17the classical computers that we have or if it can give us better results, right?
-
2:17 - 2:24Like imagine we are approximating some solution of a problem like the price of a derivative,
-
2:24 - 2:29for example, and our quantum computers can give us a better estimate of a price in the
-
2:29 - 2:32same amount of time of a classical computer.
-
2:32 - 2:38Or maybe it's just cheaper to compute the same result in the same amount of time.
-
2:38 - 2:47Another way that we can expect quantum computers to impact our society is if they can
-
2:47 - 2:51allow us to do something that before we couldn't do, right?
-
2:51 - 2:57And an example is exponential speedups or big polynomial speedups.
-
2:57 - 3:03And I know you have in mind Shor's algorithm for factoring.
-
3:03 - 3:06But it's not that easy, right?
-
3:06 - 3:13Because we know from high school that asymptotically an exponential function will dominate a polynomial
-
3:13 - 3:14or linear function.
-
3:14 - 3:20Imagine that this is the cost of your computation and you can imagine to measure the cost in
-
3:20 - 3:23hours, okay?
-
3:23 - 3:29So asymptotically if we have a quantum algorithm that is exponentially or polynomially faster
-
3:29 - 3:34than a classical algorithm, then we know that it will be faster.
-
3:34 - 3:41But maybe we have to look at regimes that are relevant for us.
-
3:41 - 3:47And as you can see from this picture, there are cases where, you know, a linear time algorithm
-
3:47 - 3:55is slower than an exponential time algorithm, okay?
-
3:55 - 3:59So how do we measure the cost of quantum computation?
-
3:59 - 4:07Well, in theoretical computer science, what we do, even for classical computation, we measure
-
4:07 - 4:08the size of a circuit, right?
-
4:08 - 4:14And the size of a circuit is basically the number of logical gates that we execute.
-
4:14 - 4:20Or maybe we can measure the depth of a circuit, that is also known as parallel time.
-
4:20 - 4:22Or we can measure the space, right?
-
4:22 - 4:27The number of bits, the size of a memory that we use in our computation.
-
4:27 - 4:33Or we measure the number of queries that we perform to an oracle.
-
4:33 - 4:37But we also care about more practical things.
-
4:37 - 4:41And these practical things are maybe the money that it costs to run some computation, the energy
-
4:41 - 4:45that I use to run this computation.
-
4:45 - 4:51And more specifically in quantum circuits, we care about the number of Toffoli gates, which
-
4:51 - 4:55are a particular kind of three qubit gates.
-
4:55 - 5:01And we also care, obviously, about the work clock time of our computation and the number
-
5:01 - 5:03of physical qubit.
-
5:03 - 5:06So there is a difference between physical and logical qubit.
-
5:06 - 5:10I won't get into the details of this because it's related to error correction, a very difficult
-
5:10 - 5:11topic.
-
5:11 - 5:16But you just have to know that in order to obtain something that we call physical qubit,
-
5:16 - 5:21we need to, something that we call a logical qubit, we need to use a certain amount of physical
-
5:21 - 5:22qubit.
-
5:22 - 5:26And now the ratio is 1 to 1000.
-
5:26 - 5:31So how do we estimate these more practical and interesting measures?
-
5:31 - 5:33We do what's called the resource estimation.
-
5:33 - 5:40And the resource estimation is basically a procedure where we take the theoretical complexity
-
5:40 - 5:45of an algorithm, we look at the real problem that we have to solve, perhaps we use some
-
5:45 - 5:52tricks to optimize the circuit, and then we can count the number of resources that we
-
5:52 - 5:57really need to solve the problem that we care about.
-
5:57 - 6:03Okay, so what are we going to see today is three topics.
-
6:03 - 6:09The first, the impact of quantum computing in the cryptography that we use today.
-
6:09 - 6:13So RSA and LiptevCurveCrypto.
-
6:13 - 6:19And there the too-long-didn't-read is that there is a long way to go, but we will eventually
-
6:19 - 6:22get there.
-
6:22 - 6:27We will see if there is any impact in post-quantum cryptography.
-
6:27 - 6:35So we will show some research estimation of post-quantum attack on post-quantum cryptography.
-
6:35 - 6:41And there the result is that lattice-based crypto is safe even when considering practical
-
6:41 - 6:45implementations of the attacks.
-
6:45 - 6:48And then we will see the impact of quantum machine learning.
-
6:48 - 6:49Why?
-
6:49 - 6:56Because machine learning is used in cybersecurity and we will just try to explore a little bit
-
6:56 - 7:00this area with methodology.
-
7:00 - 7:05And the conclusion there, and this is not just in cybersecurity, but is that we will see a
-
7:05 - 7:08speed-up only for massive datasets.
-
7:08 - 7:13But we have a lot of good ideas and a lot of hopes.
-
7:13 - 7:21So in this part, I'm going to present some results of the internship that Adi did in Invariant
-
7:21 - 7:31with me and Varun and also Antonio joined later this project.
-
7:31 - 7:35So factoring, right.
-
7:35 - 7:40The state-of-the-art on factoring is this paper by Craig Gidney.
-
7:40 - 7:47And basically in this work, he is showing how to break RSA 2048 using 20 million physical
-
7:47 - 7:53qubits and approximately eight hours of quantum computation.
-
7:53 - 8:00So he is assuming to work with a particular kind of hardware made of superconducting qubits, with
-
8:00 - 8:04a gate error of 10 to the minus three.
-
8:04 - 8:11And he is using concatenated surface code to achieve these estimates, right?
-
8:11 - 8:14So in order to perform a resource estimation, you have to do some assumption on the hardware
-
8:14 - 8:21that you expect to have in the future.
-
8:21 - 8:30What he is using in his circuit is this idea of windowed arithmetic.
-
8:30 - 8:35So in his circuit, he needs to perform, let me be very technical for five seconds, phase
-
8:35 - 8:40estimation on an oracle that is performing modular exponentiation.
-
8:40 - 8:44So basically he needs to perform arithmetic in his circuit.
-
8:44 - 8:48To perform arithmetic, he is using this idea called windowed arithmetic.
-
8:48 - 8:52And windowed arithmetic is basically a way to have space-time trade-offs.
-
8:52 - 8:58So instead of running a circuit that is computing the function that you want to compute, you
-
8:58 - 9:02pre-compute this function classically and you store some results in memory and you just
-
9:02 - 9:07query the memory when you run the quantum computation.
-
9:07 - 9:14And in order to look up the memory at some point, since the computation is quantum and it needs
-
9:14 - 9:19to be reversible, at some point you need to uncompute some garbage.
-
9:19 - 9:30And for that, he is also using a trick that allows him to save some gates in these settings.
-
9:30 - 9:40So our contribution is that we can do some improvements in the way this unlookup is done, especially when
-
9:40 - 9:45we have nested loops in the circuit.
-
9:45 - 9:51And in modular exponentiation, you do windowed arithmetic using nested loops.
-
9:51 - 9:57And therefore, you can have a little bit of saving in the number of gates.
-
9:57 - 10:07So the performance improvements that we were able to get is around 1% for cryptographic relevant
-
10:07 - 10:09numbers.
-
10:09 - 10:20So RSA keys of 2048, basically, 0.7%, is a modest improvement, but it's still non-negligible,
-
10:20 - 10:22and we hope to do more in the near future.
-
10:22 - 10:31And it's basically saving 15 minutes over 8 hours.
-
10:31 - 10:38There is another problem that you face when you're trying to do Shor's algorithm, which
-
10:38 - 10:42is implementing Boolean functions in general.
-
10:42 - 10:46So imagine you have a Boolean function.
-
10:46 - 10:51You can write your classical circuit for implementing this Boolean function.
-
10:51 - 10:57Using some tricks from classical computer science, you can make this circuit reversible, and then
-
10:57 - 11:00you can obtain a quantum circuit for this Boolean function.
-
11:00 - 11:05But again, you will see that you have a problem of performing a computation.
-
11:05 - 11:09But in literature, we have this thing called measurement based on computation, which allows
-
11:09 - 11:16you to have savings in expectation when you run the on-computation of the circuit.
-
11:16 - 11:21And applying this trick to something that we thought was very well analyzed and optimized,
-
11:21 - 11:31that we realized that you can have savings in the circuit that is performing modular addition.
-
11:31 - 11:34And where is the circuit for modular addition used?
-
11:34 - 11:42Well, it's used also in the circuits that are used for breaking elliptic core cryptography.
-
11:42 - 11:51And here, the state-of-the-art for resource estimation of ACC is this paper by Littinsky.
-
11:51 - 11:56It's again another corollary of the Shor algorithms.
-
11:56 - 12:04It's using some particular kind of architecture called active volume, which is assuming basically
-
12:04 - 12:07to work with photonic qubits with a similar gate error.
-
12:07 - 12:15And the number of logical qubits that is using is 6,000 logical qubits.
-
12:15 - 12:22So after our trick, we were able to save, again, a little bit less than 1%, but we have
-
12:22 - 12:29other tricks under our sleeves to improve this result further.
-
12:29 - 12:34And the message here is that there is a lot, really, really a lot to do in the whole stack
-
12:34 - 12:43of quantum computing to improve these attacks and algorithms.
-
12:43 - 12:54So in the second part, I'm going to present briefly some results of our team at CQTeam, where
-
12:54 - 13:01me and Joao are super lucky to have Georgios and Aditya helping us studying the resource
-
13:01 - 13:04estimation of post-quantum cryptography.
-
13:04 - 13:13So we are focusing on lattice attack, and this is the only math part of this talk, I promise.
-
13:13 - 13:20So a lattice is basically the set of all integral linear combination of a set of n linearly independent
-
13:20 - 13:22vectors.
-
13:22 - 13:27And the problem that you have to solve here is I give you the basis, and you have to find
-
13:27 - 13:30the shortest vector of this basis.
-
13:30 - 13:35Shortest vector in, let's say, Euclidean norms.
-
13:35 - 13:37Why this is important?
-
13:37 - 13:43Because if you know how to find the shortest vector, then you are able to break post-quantum
-
13:43 - 13:45cryptography.
-
13:45 - 13:51Fortunately, we don't have polynomial time algorithms.
-
13:51 - 13:57We don't have polynomial time quantum algorithms and classical algorithms for solving this problem.
-
13:57 - 14:03So theoretically, we know that at some point for big lattice dimension, we are safe.
-
14:03 - 14:10But the question is, are we safe even when we look at the constant factor of the attack
-
14:10 - 14:13when we implement it?
-
14:13 - 14:16And there are already works in this direction.
-
14:16 - 14:23Namely, the first one is studying some version of an algorithm called gauss-siv.
-
14:23 - 14:29And the second one is implementing and studying enumeration attacks.
-
14:29 - 14:33So what we did, well, we implemented the gauss-siv.
-
14:33 - 14:39And here you can find the code online of the attack.
-
14:39 - 14:41That's great.
-
14:41 - 14:43But let's look at the results.
-
14:43 - 14:47So what's the real complexity of the circuit?
-
14:47 - 14:51Well, from this plot, you see the following thing.
-
14:51 - 14:57Well, the dotted green line is the cost of the classical algorithm.
-
14:57 - 15:05And the dotted red line is the cost, the asymptotic cost, the theoretical cost of the quantum algorithm.
-
15:05 - 15:11The two non-dotted lines are the number of Toffoli gates, a particular kind of gates
-
15:11 - 15:19in the circuit, and the blue line is the duration in hours.
-
15:19 - 15:30So you can see that the slope of the two non-dotted lines is compatible with the red dotted lines.
-
15:30 - 15:37And yes, so it means that we are safe from quantum attacks.
-
15:37 - 15:42Unless someone finds a new quantum algorithm that is more efficient asymptotically.
-
15:42 - 15:46And then we have to repeat this study again.
-
15:46 - 15:48Okay.
-
15:48 - 15:56In the last part, we study quantum machine learning and applications in cybersecurity.
-
15:56 - 15:59As I said before, why are we doing this?
-
15:59 - 16:04Well, because machine learning is ubiquitous in cybersecurity.
-
16:04 - 16:10And we want to see if quantum has something to say.
-
16:10 - 16:15So the idea of quantum machine learning is that you want to use a quantum machine for training
-
16:15 - 16:26a model, so the training part, and or the predict phase of a machine learning algorithm.
-
16:26 - 16:30Let me say that there are two ways of doing quantum machine learning.
-
16:30 - 16:34One stems from the theoretical computer science community.
-
16:34 - 16:42And there you have a theorem stating, I can do this computation with certain probability
-
16:42 - 16:45and certain approximation error.
-
16:45 - 16:50And the other community is saying, okay, we have very small devices.
-
16:50 - 16:54Let's see what we can build on top of those.
-
16:54 - 17:01And this is very similar to what people are doing in deep learning and with neural networks.
-
17:01 - 17:03I belong to the first community.
-
17:03 - 17:08So what I do is I take a classical machine learning algorithm and I try to come up with
-
17:08 - 17:12a quantum version for it.
-
17:12 - 17:18And in our work, what we do is we study the query complexity of an algorithm.
-
17:18 - 17:19Why?
-
17:19 - 17:24Well, because if we know the number of queries that we do to the input, then we just need
-
17:24 - 17:27to understand what's the cost of performing a query.
-
17:27 - 17:34And we know the final cost of performing the whole algorithm.
-
17:34 - 17:43So this problem is basically reducing to understanding when the left-hand side of this equation is smaller
-
17:43 - 17:45than the right-hand side.
-
17:45 - 17:51Let's not delve into the details of the meaning of all these symbols.
-
17:51 - 17:57But the only important thing here is that on the left-hand side, we don't have n.
-
17:57 - 18:04And n is the number of samples in our data set.
-
18:04 - 18:13So there is hope that a quantum algorithm should scale much better than a classical algorithm
-
18:13 - 18:16in terms of number of samples, right?
-
18:16 - 18:19But what about the other parameters?
-
18:19 - 18:26So in order to understand that, we developed this methodology to try to see for data sets
-
18:26 - 18:31that we care about, what are the parameters in the runtime of a quantum algorithm so we
-
18:31 - 18:35can compare the runtime with a classical runtime.
-
18:35 - 19:00So we tested this on a few data sets that are standard in cybersecurity, and the result is that we need 10 to the 7 elements in our data set in order to start to feel a little bit of quantum advantage in terms of query complexity.
-
19:00 - 19:05So without taking into account the cost of query to the Q-RAM.
-
19:05 - 19:06Okay.
-
19:06 - 19:20So maybe there are other data sets and problem that we can look at to get advantage.
-
19:20 - 19:26And so, well, the answer is there is some hope.
-
19:26 - 19:30And there is this particular problem that I found many years ago.
-
19:30 - 19:33And the problem is related to malware detection.
-
19:33 - 19:41So DGA, domain generation algorithm, is an algorithm that malware is using in order to contact the command and control server.
-
19:41 - 19:45They are basically generating random domains.
-
19:45 - 19:52And they are trying to connect to a web server that is answering behind one of these randomly generated domains.
-
19:52 - 19:59And the randomly generated domains are very different from the domain that we humans generate.
-
19:59 - 20:04Take, for example, google.com versus randomletters.com.
-
20:04 - 20:09So I took as a training set the top one million domains.
-
20:09 - 20:11And I did some pre-computation.
-
20:11 - 20:17And I obtained an n-gram matrix where the number of rows is one million.
-
20:17 - 20:23And in the columns you have the n-grams that you built out of the training set.
-
20:23 - 20:33And in any row you have one if the n-gram in the column you are considering is appearing in the domain in that row.
-
20:33 - 20:34Okay.
-
20:34 - 20:38So what's interesting here is that this matrix is very sparse.
-
20:38 - 20:42And I tell you later why it's interesting.
-
20:42 - 20:52But then when you build this n-gram matrix with a classical computer, you can only afford to pay linear time to process it.
-
20:52 - 20:59So you cannot do linear algebra on this matrix on a classical computer.
-
20:59 - 21:06And my idea was, hey, let's use a quantum algorithm to extract something out of this matrix.
-
21:06 - 21:07Great.
-
21:07 - 21:14So I wrote, my first paper was a quantum algorithm for something called slow feature analysis,
-
21:14 - 21:18which is exactly equivalent to something called fissure linear discriminant.
-
21:18 - 21:20You might know this.
-
21:20 - 21:30And so I wrote a classical simulation of a quantum algorithm to extract this feature out of this
-
21:30 - 21:33very big and very sparse matrix.
-
21:33 - 21:40And then I used this feature in a classification step.
-
21:40 - 21:42So the game is the following.
-
21:42 - 21:43You give me a domain.
-
21:43 - 21:46I have a classifier, a machine learning classifier.
-
21:46 - 21:55I use the feature I just extracted from the matrix to add a new input to this classifier.
-
21:55 - 21:57And I looked at the results.
-
21:57 - 22:02And I compared the classical results with the quantum results.
-
22:02 - 22:10And you can see that this feature is improving a little bit the results of a classification.
-
22:10 - 22:15So the moral of the story is that if you think hard enough, maybe there is some hope to get
-
22:15 - 22:21quantum advantage in the future.
-
22:21 - 22:23So conclusions.
-
22:23 - 22:35Well, the results and the paper that we see nowadays are kind of the following script.
-
22:35 - 22:37We know how to perform linear algebra.
-
22:37 - 22:41We find a problem where linear algebra is needed or is a bottleneck.
-
22:41 - 22:44And we write a quantum algorithm for it.
-
22:44 - 22:49It's interesting, but maybe we want to understand and we want to get a new algorithmic paradigm
-
22:49 - 22:51for writing new quantum algorithms.
-
22:51 - 22:53Different kind of speedups.
-
22:53 - 23:03A common trend that is limiting the quantum advantage in practice is something called QRAM.
-
23:03 - 23:07So the quantum version of random access memory.
-
23:07 - 23:11And there is a lot of research to do there.
-
23:11 - 23:17And if you're asking me when this will happen, I really do not have the answer.
-
23:17 - 23:20You have to ask a physicist.
-
23:20 - 23:31There are many other topics in quantum computing that might impact cybersecurity, namely the delegation
-
23:31 - 23:32of quantum computation.
-
23:32 - 23:40So the idea that not only you can do encrypted computation over the cloud, but you can also
-
23:40 - 23:44delegate and encrypt the computation that you are delegating.
-
23:44 - 23:46Quantum key distribution.
-
23:46 - 23:52There were other talks at CCC previous years about QKD.
-
23:52 - 23:55Something called position-based cryptography.
-
23:55 - 24:02And if you want to learn more about the computational aspects, so the algorithmic aspect of what we
-
24:02 - 24:04do is quantum computing.
-
24:04 - 24:11You can find an open source project set of lecture notes on quantumalgorithms.org.
-
24:11 - 24:19And the last thing, I'm hiring at CQT, postdoc internship for PhDs and research assistant positions.
-
24:19 - 24:23So thank you so much.
-
24:23 - 24:33So we actually have a lot of time for questions.
-
24:33 - 24:38Please, people who are leaving, leave very, very quietly.
-
24:38 - 24:39And please take your trash.
-
24:39 - 24:41But questions.
-
24:41 - 24:42Do we have any questions?
-
24:42 - 24:44We have four microphones on the floor.
-
24:44 - 24:49And we have the signal angels on the internet.
-
24:49 - 24:55You have to go to the microphone, sorry.
-
24:55 - 24:58So if you have a question, step up to the microphones.
-
24:58 - 25:01All right.
-
25:01 - 25:02Microphone one.
-
25:02 - 25:04Hi.
-
25:04 - 25:10You mentioned that you were speeding up the Tifoli gates with some enhancements.
-
25:10 - 25:15Were these enhancements for lattice general, or was it specific to learning with errors,
-
25:15 - 25:17or short integer solutions, or was it...?
-
25:17 - 25:20Can you repeat the beginning of the question?
-
25:20 - 25:21Yeah.
-
25:21 - 25:26The enhancements on the Tifoli gates that you showed earlier, was it on all lattice algorithms,
-
25:26 - 25:29or was it specific to learning with errors or short integer solutions?
-
25:29 - 25:31It was for general lattices.
-
25:31 - 25:32All of them.
-
25:32 - 25:35Yeah, but the algorithm is not done by us.
-
25:35 - 25:37We just implemented it.
-
25:37 - 25:38Thank you.
-
25:38 - 25:41So, microphone number three.
-
25:41 - 25:42Hi.
-
25:42 - 25:43Hi, Alessandro.
-
25:43 - 25:45Thank you for your time.
-
25:45 - 25:49I have somewhat of a more different question.
-
25:49 - 25:54So, you've shown a lot of resource estimation where we look into how much does it cost to compute
-
25:54 - 25:55this.
-
25:55 - 26:00Do you also have work where you look into the adversarial cost, as in how much does it cost
-
26:00 - 26:05to do this in an attack, as in compared to a classical attack path, where you do, for
-
26:05 - 26:08example, in the short algorithm, you usually decrypt things.
-
26:08 - 26:14So, you look into an attack on crypto, and usually it's, you know, at the end of the
-
26:14 - 26:18attack chain, after exfiltration, to decrypt certain things.
-
26:18 - 26:23Can you more elaborate, maybe, how the attack path looks like in comparison, the adversary
-
26:23 - 26:27cost to use a quantum computer versus a classical thing, and what the timeline would be?
-
26:27 - 26:33That's a great question, and I'm afraid I don't have an answer for that.
-
26:33 - 26:37There's probably more research to do to understand that.
-
26:37 - 26:38Yeah.
-
26:38 - 26:40So, we have a question from the internet.
-
26:40 - 26:41Yes.
-
26:41 - 26:42Thank you.
-
26:42 - 26:47The internet is wondering if you could go into more details about the differences and
-
26:47 - 26:53the synergies between a classical neural network and a quantum neural network.
-
26:53 - 27:01To answer properly this question, it takes more than one PhD, for sure.
-
27:01 - 27:02What can I say?
-
27:02 - 27:13Well, I mean, the similarities is that you have a quantum circuit, and a quantum circuit
-
27:13 - 27:19is composed of gates, and the quantum gates are somehow more general than classical gates,
-
27:19 - 27:23so you have angle of rotations.
-
27:23 - 27:30And the idea is that you can do gradient descent or other optimization algorithms on these parameters,
-
27:30 - 27:34and this is similar to the weights of a neural network.
-
27:34 - 27:37So, that's a similarity.
-
27:37 - 27:42And the difference, well, the difference is that one is quantum, the other is classical.
-
27:42 - 27:50So, we still don't know if one is more powerful than the other, if one is trainable,
-
27:50 - 27:52if it's trainable, maybe it's classically simulable.
-
27:52 - 27:58So, it's a very open area of research.
-
27:58 - 28:00Microphone number three.
-
28:00 - 28:01Sorry, one.
-
28:01 - 28:02Hi.
-
28:02 - 28:04Thank you for the talk.
-
28:04 - 28:11I was wondering if you could quickly explain the similarities and differences between time
-
28:11 - 28:16complexity classes for classical versus quantum algorithms.
-
28:16 - 28:17Exactly.
-
28:17 - 28:19Another great question.
-
28:19 - 28:24It requires more than a PhD.
-
28:24 - 28:38But, I mean, complexity theorists try to take complexity classes and add quantum somehow.
-
28:38 - 28:44And then they try to compare these classes between quantum and classical.
-
28:44 - 28:47So, there are a lot of open questions.
-
28:47 - 28:56If you have any more precise thing, maybe we can discuss it later.
-
28:56 - 29:01But, yeah, it's a big, big topic of research.
-
29:01 - 29:02Thank you.
-
29:02 - 29:03Thank you.
-
29:03 - 29:04Thank you.
-
29:04 - 29:06Microphone number three.
-
29:06 - 29:07Hi.
-
29:07 - 29:08Thanks for the great talk.
-
29:08 - 29:16First of all, I wonder if you heard about the first theoretical, practical approach, research
-
29:16 - 29:37of Harvard University, and logic-based coprocessor they found with natural atoms, where they found a methodology to build up a processor for quantum computers with less physical qubits than it's foreseen.
-
29:37 - 29:42Because it's helpful for the next threat, let's say.
-
29:42 - 29:44So, I wonder if you know about it.
-
29:44 - 29:54And I wonder if you could use this approach for this open research themes as a thing of the memory-based problems and challenges.
-
29:54 - 29:55Thanks.
-
29:55 - 29:56Thank you.
-
29:56 - 29:57Great question.
-
29:57 - 30:01Are you referring to this recent result of a few weeks ago?
-
30:01 - 30:02Yeah.
-
30:02 - 30:06I think, I mean, it seems to be solid research.
-
30:06 - 30:08So, I'm very happy.
-
30:08 - 30:10But, again, I'm not a physicist.
-
30:10 - 30:19So, like, between me and them, there's a whole stack of people that needs to connect our results, basically.
-
30:19 - 30:21But, yeah, I'm hopeful.
-
30:21 - 30:22That's great.
-
30:22 - 30:23That's great.
-
30:23 - 30:28So, we have a question from the internet.
-
30:28 - 30:29Thank you.
-
30:29 - 30:36The internet is wondering if what you showed is also applicable to special quantum computers, especially quantum annealers.
-
30:36 - 30:44And they're referring to an announcement made by Lockheed Martin a couple of years back here that they were able to do something like Shaw's algorithm here.
-
30:44 - 30:46Great question.
-
30:46 - 30:51I usually do gate-based quantum computing.
-
30:51 - 31:04So, the thing is that you can put whatever you want in an annealer because the thing that the annealer is solving is very general.
-
31:04 - 31:07It's very simple to see that you can reduce factoring to an optimization problem.
-
31:07 - 31:08Right?
-
31:08 - 31:19You have N, the number you want to factor, equal P times Q. And you do N minus P times Q. And you are trying to minimize the difference between these two things.
-
31:19 - 31:32So, the difference is zero for the right P and Q. But if you try to do this on an annealer, you don't have a proof that the runtime is polynomial.
-
31:32 - 31:37For the annealing thing, it's like quadratic or cubic in something called spectral gap.
-
31:37 - 31:42And for factoring on annealer, we don't have any bound on this thing.
-
31:42 - 31:44So, microphone two.
-
31:44 - 31:45Right.
-
31:45 - 31:46Joran?
-
31:46 - 31:49Thanks for your talk.
-
31:49 - 31:53What I want to know is what the...
-
31:53 - 31:57Well, I know quantum computers are still experimental.
-
31:57 - 32:10And how well do your algorithms break or scale or break up to the currently available systems, physical systems, or...?
-
32:10 - 32:12Well, it's a great question.
-
32:12 - 32:18And unfortunately, the answer is they don't run very well because they really require a lot of qubits, a lot of gates.
-
32:18 - 32:25So, I need error correction to run anything meaningful.
-
32:25 - 32:28Question from microphone three.
-
32:28 - 32:29Yeah, hello.
-
32:29 - 32:31My question also relates to this.
-
32:31 - 32:33And I want to be a bit more specific.
-
32:33 - 32:44So, it's really hard, as you mentioned, to judge how well things are going and how well are things progressing, apart from all the hype that's been going on.
-
32:44 - 32:51So, one thing that I was asking myself, so how far are we actually with factoring numbers?
-
32:51 - 33:07And despite the progress that we've been seeing in quantum processes in the past years, I believe that except for certain publications that maybe happen once or twice a year where they factored a really long number, but like they've pre-chosen that number to optimize for it.
-
33:07 - 33:08Exactly.
-
33:08 - 33:09Yeah.
-
33:09 - 33:17And I believe the current record still is more or less factoring 15, and that has been since 2012.
-
33:17 - 33:20Why hasn't anything happened since then?
-
33:20 - 33:24I think they may have gotten up to 21 by now.
-
33:24 - 33:28Great question.
-
33:28 - 33:29I don't know.
-
33:29 - 33:30I don't know.
-
33:30 - 33:33I don't know.
-
33:33 - 33:38Well, maybe because also the attention shifted to other topics.
-
33:38 - 33:39Maybe.
-
33:39 - 33:40Yeah.
-
33:40 - 33:41Thank you.
-
33:41 - 33:44I think we have another question from the internet.
-
33:44 - 33:47Yes, thank you.
-
33:47 - 33:55And the question is if you have ever had the chance to look into the cybersecurity application for quantum certified deletion.
-
33:55 - 33:59So quite special, maybe, but maybe you have some experience.
-
33:59 - 34:02Quantum certified deletion.
-
34:02 - 34:03Yes.
-
34:03 - 34:05Never heard of that.
-
34:05 - 34:07Yeah, I just Googled it.
-
34:07 - 34:09It's a paper may.
-
34:09 - 34:10Okay, cool.
-
34:10 - 34:12Microphone three.
-
34:12 - 34:19Hey, so when you talked about quantum machine learning, you made a distinction between predictive model and variational model.
-
34:19 - 34:28I was wondering how do they differ in terms of what happens when you need to measure in intermediate steps or the wave function collapse in general?
-
34:28 - 34:30What is the difference between those?
-
34:30 - 34:32And if there is more than that?
-
34:32 - 34:35Because you named two, but maybe there is more.
-
34:35 - 34:38Yeah, good question.
-
34:38 - 34:56So, as far as I know, you don't measure much during the computation in variational algorithms, but you can measure intermediate things in provable algorithms.
-
34:56 - 35:01There are other models.
-
35:01 - 35:05For example, annealing is one of those.
-
35:05 - 35:14Also, there are two, three papers where they try to do something in between variational and provable.
-
35:14 - 35:19It works by Kerenidis and Prakash, some recent results from them.
-
35:19 - 35:24But no, this is what I know.
-
35:24 - 35:28So, just these two, three things.
-
35:28 - 35:33So, we still have a little bit of time and we have a question yet again from the internet.
-
35:33 - 35:35Yes, internet is on fire today.
-
35:35 - 35:36Okay.
-
35:36 - 35:44So, the question is, is there an equivalent for, in quotes, gigahertz or speed measure for quantum computers?
-
35:44 - 35:45Absolutely.
-
35:45 - 35:46Yeah, yeah, yeah.
-
35:46 - 35:47Absolutely.
-
35:47 - 35:53I think, depending on the hardware, you have different clock speeds.
-
35:53 - 36:00I didn't mention that, but it's really platform dependent.
-
36:00 - 36:13Some architecture are faster than others, but in general, for superconducting, I think the clock speed is in megahertz.
-
36:13 - 36:25So, this is also why we are very slow to get practical quantum advantage, because the clock for quantum computers is much slower than the clock of classical computers.
-
36:25 - 36:27Question from microphone three.
-
36:27 - 36:37I come from a math background, so maybe the question is stupid, but the matrices where you said you need linear time with classical algorithms to process it.
-
36:37 - 36:44How do you get the matrix in sub-linear time into your quantum computer to process it?
-
36:44 - 36:45No, no.
-
36:45 - 36:46So, imagine you...
-
36:46 - 36:47No, no.
-
36:47 - 36:49It's a very good question.
-
36:49 - 36:52You give the matrix classically.
-
36:52 - 36:57And then, in linear time, you can build quantum access to this matrix.
-
36:57 - 37:03And then, the quantum algorithm is polytime or whatever time it is.
-
37:03 - 37:04Okay.
-
37:04 - 37:05Yeah.
-
37:05 - 37:07So, one...
-
37:07 - 37:09I get maybe final question from microphone one.
-
37:09 - 37:13So, this is more of a general question.
-
37:13 - 37:15You said that there's a lot of hype.
-
37:15 - 37:20I mean, there is a lot of hype around quantum computing in general.
-
37:20 - 37:23And I'm curious, what are your opinions on...
-
37:23 - 37:30Not the hype, but what is the most promising application that quantum computing can bring?
-
37:30 - 37:34And if any, or are there some things currently being overhyped?
-
37:34 - 37:35Or what do you think?
-
37:35 - 37:36What's your general opinion?
-
37:36 - 37:37Great question.
-
37:37 - 37:38Okay.
-
37:38 - 37:51So, I mean, for the crypto that we're using nowadays, I'm sure it will eventually work.
-
37:51 - 37:57Maybe quantum finance is slightly overhyped.
-
37:57 - 38:02So, quantum algorithm for pricing derivatives and these kinds of things.
-
38:02 - 38:05Estimating the risks of something.
-
38:05 - 38:16But maybe quantum chemistry is something where we can have advantage in the next years.
-
38:16 - 38:23So, new molecules, new material, estimating ground state of things.
-
38:23 - 38:24Yeah.
-
38:24 - 38:26Maybe that.
-
38:26 - 38:27Okay.
-
38:27 - 38:28Thanks.
-
38:28 - 38:29Thank you.
-
38:29 - 38:34I don't see any further questions, so let us thank Alessandro for this fantastic quantum talk.
-
38:34 - 38:35Thank you.
-
38:35 - 38:36[Transcribed by Pekka P]
-
38:36 - 38:42(KYBS2004 course assignment at JYU.FI)
- Title:
- https://www.youtube.com/watch?v=PDjAuSAcbY4 The impact of quantum computers in cybersecurity
- Description:
-
more » « less
The impact of quantum computers in cybersecurity
In in this talk we explore the potential ramifications of quantum computing in the field of cybersecurity We'll delve into two critical aspects: the application of quantum machine learning algorithms for defence and the impact of quantum attacks on cryptography and post-quantum cryptography for offence. We'll present insights on the theoretical advantages of quantum algorithms, improvements in factoring large numbers, and the impacts of post-quantum crypto attacks. While the hype around quantum technologies is growing, the estimates in the resources needed to run a quantum algorithm and the current number of qubits pose caution in the enthusiasm. The limitations in terms of available qubits, error rates, and scalability are critical factors that need to be considered when assessing the real-world applicability of quantum computing.We will start with a fundamental introduction to quantum computing to ensure that the audience has a solid grasp of this model of computation, but without discussing the technicalities of quantum physics. Taking a "software development" perspective, we introduce the problem of estimating the resources needed to perform a quantum computation. Then, we will shift our focus to the two facets of our investigation: applications for offence and defence.
- Video Language:
- English
- Duration:
- 38:58
