How quantum physics can make encryption stronger
-
0:01 - 0:05Recently, we've seen the effects
of cyber attacks on the business world. -
0:05 - 0:11Data breaches at companies like JP Morgan,
Yahoo, Home Depot and Target -
0:11 - 0:13have caused losses of hundreds of millions
-
0:13 - 0:16and in some cases, billions of dollars.
-
0:17 - 0:20It wouldn't take many large attacks
to ravage the world economy. -
0:21 - 0:24And the public sector
has not been immune, either. -
0:25 - 0:28In 2012 to 2014,
-
0:28 - 0:33there was a significant data breach
at the US Office of Personnel Management. -
0:33 - 0:37Security clearance
and fingerprint data was compromised, -
0:37 - 0:41affecting 22 million employees.
-
0:42 - 0:46And you may have heard of the attempt
by state-sponsored hackers -
0:46 - 0:51to use stolen data to influence election
outcomes in a number of countries. -
0:52 - 0:55Two recent examples are
the compromise of a large amount of data -
0:55 - 0:59from the Bundestag,
the national Parliament of Germany, -
0:59 - 1:03and the theft of emails from the US
Democratic National Committee. -
1:05 - 1:09The cyber threat is now affecting
our democratic processes. -
1:10 - 1:12And it's likely to get worse.
-
1:12 - 1:16As computer technology
is becoming more powerful, -
1:16 - 1:20the systems we use to protect our data
are becoming more vulnerable. -
1:21 - 1:25Adding to the concern
is a new type of computing technology, -
1:25 - 1:27called quantum computing,
-
1:27 - 1:30which leverages microscopic
properties of nature -
1:30 - 1:34to deliver unimaginable increases
in computational power. -
1:34 - 1:38It's so powerful that it will crack
many of the encryption systems -
1:39 - 1:40that we use today.
-
1:41 - 1:43So is the situation hopeless?
-
1:43 - 1:46Should we start packing
our digital survival gear -
1:46 - 1:49and prepare for an upcoming
data apocalypse? -
1:50 - 1:52I would say, not yet.
-
1:52 - 1:54Quantum computing is still in the labs,
-
1:54 - 1:58and it will take a few years
until it's put to practical applications. -
1:58 - 2:00More important,
-
2:00 - 2:03there have been major breakthroughs
in the field of encryption. -
2:03 - 2:06For me, this is
a particularly exciting time -
2:07 - 2:09in the history of secure communications.
-
2:10 - 2:11About 15 years ago,
-
2:11 - 2:14when I learned of our new-found ability
-
2:14 - 2:17to create quantum effects
that don't exist in nature, -
2:17 - 2:19I was excited.
-
2:19 - 2:22The idea of applying
the fundamental laws of physics -
2:22 - 2:24to make encryption stronger
-
2:24 - 2:25really intrigued me.
-
2:26 - 2:32Today, a select groups of companies
and labs around the world, including mine, -
2:32 - 2:36are maturing this technology
for practical applications. -
2:36 - 2:37That's right.
-
2:37 - 2:41We are now preparing
to fight quantum with quantum. -
2:42 - 2:44So how does this all work?
-
2:44 - 2:47Well, first, let's take a quick tour
of the world of encryption. -
2:47 - 2:49For that, you'll need a briefcase,
-
2:49 - 2:53some important documents that you want
to send your friend, James Bond, -
2:53 - 2:55and a lock to keep it all safe.
-
2:56 - 3:01Because the documents are top secret,
we're going to use an advanced briefcase. -
3:01 - 3:03It has a special combination lock
-
3:03 - 3:05which, when closed,
-
3:05 - 3:08converts all the text
in the documents to random numbers. -
3:08 - 3:12So you put your documents inside,
close the lock -- -
3:12 - 3:16at which point in time the documents
get converted to random numbers -- -
3:16 - 3:18and you send the briefcase to James.
-
3:19 - 3:22While it's on its way,
you call him to give him the code. -
3:22 - 3:25When he gets the briefcase,
he enters the code, -
3:25 - 3:28the documents get unscrambled, and voilà,
-
3:28 - 3:32you've just sent
an encoded message to James Bond. -
3:32 - 3:33(Laughter)
-
3:34 - 3:38A fun example, but it does illustrate
three things important for encryption. -
3:39 - 3:42The code -- we call this
an encryption key. -
3:42 - 3:44You can think of it as a password.
-
3:44 - 3:49The call to James to give him
the code for the combination lock. -
3:49 - 3:51We call this key exchange.
-
3:51 - 3:53This is how you ensure
-
3:53 - 3:57you get the encryption key
securely to the right place. -
3:57 - 4:01And the lock, which encodes
and decodes the document. -
4:01 - 4:04We call this an encryption algorithm.
-
4:04 - 4:08Using the key, it encodes
the text in the documents -
4:09 - 4:10to random numbers.
-
4:10 - 4:13A good algorithm will encode in such a way
-
4:13 - 4:16that without the key
it's very difficult to unscramble. -
4:18 - 4:20What makes encryption so important
-
4:20 - 4:23is that if someone were to capture
the briefcase and cut it open -
4:23 - 4:27without the encryption key
and the encryption algorithm, -
4:27 - 4:29they wouldn't be able
to read the documents. -
4:29 - 4:33They would look like nothing more
than a bunch of random numbers. -
4:35 - 4:39Most security systems rely
on a secure method for key exchange -
4:39 - 4:44to communicate the encryption key
to the right place. -
4:45 - 4:48However, rapid increases
in computational power -
4:48 - 4:52are putting at risk a number
of the key exchange methods we have today. -
4:53 - 4:57Consider one of the very
widely used systems today -- RSA. -
4:58 - 5:01When it was invented, in 1977,
-
5:01 - 5:06it was estimated that it would take
40 quadrillion years -
5:06 - 5:09to break a 426-bit RSA key.
-
5:10 - 5:14In 1994, just 17 years later,
-
5:14 - 5:16the code was broken.
-
5:17 - 5:20As computers have become
more and more powerful, -
5:20 - 5:23we've had to use larger and larger codes.
-
5:23 - 5:29Today we routinely use 2048 or 4096 bits.
-
5:30 - 5:35As you can see, code makers and breakers
are engaged in an ongoing battle -
5:35 - 5:37to outwit each other.
-
5:39 - 5:43And when quantum computers arrive
in the next 10 to 15 years, -
5:43 - 5:47they will even more rapidly
crack the complex mathematics -
5:47 - 5:51that underlies many
of our encryption systems today. -
5:51 - 5:56Indeed, the quantum computer is likely
to turn our present security castle -
5:56 - 5:59into a mere house of cards.
-
6:01 - 6:04We have to find a way
to defend our castle. -
6:05 - 6:08There's been a growing
body of research in recent years -
6:08 - 6:11looking at using quantum effects
to make encryption stronger. -
6:12 - 6:15And there have been
some exciting breakthroughs. -
6:15 - 6:18Remember those three things
important for encryption -- -
6:18 - 6:23high-quality keys, secure key exchange
and a strong algorithm? -
6:24 - 6:26Well, advances in science and engineering
-
6:27 - 6:30are putting two of those
three elements at risk. -
6:30 - 6:32First of all, those keys.
-
6:33 - 6:37Random numbers are the foundational
building blocks of encryption keys. -
6:37 - 6:40But today, they're not truly random.
-
6:41 - 6:43Currently, we construct encryption keys
-
6:43 - 6:47from sequences of random numbers
generated from software, -
6:47 - 6:50so-called pseudo-random numbers.
-
6:51 - 6:54Numbers generated by a program
or a mathematical recipe -
6:54 - 6:58will have some, perhaps subtle,
pattern to them. -
6:59 - 7:00The less random the numbers are,
-
7:00 - 7:04or in scientific terms,
the less entropy they contain, -
7:04 - 7:06the easier they are to predict.
-
7:07 - 7:11Recently, several casinos
have been victims of a creative attack. -
7:11 - 7:15The output of slot machines
was recorded over a period of time -
7:15 - 7:17and then analyzed.
-
7:17 - 7:19This allowed the cyber criminals
-
7:19 - 7:23to reverse engineer
the pseudo-random number generator -
7:23 - 7:25behind the spinning wheels.
-
7:25 - 7:30And allowed them, with high accuracy,
to predict the spins of the wheels, -
7:30 - 7:33enabling them to make big financial gains.
-
7:35 - 7:38Similar risks apply to encryption keys.
-
7:39 - 7:44So having a true random number generator
is essential for secure encryption. -
7:46 - 7:51For years, researchers have been looking
at building true random number generators. -
7:51 - 7:54But most designs to date
are either not random enough, -
7:54 - 7:57fast enough or aren't easily repeatable.
-
7:58 - 8:01But the quantum world is truly random.
-
8:02 - 8:07So it makes sense to take advantage
of this intrinsic randomness. -
8:08 - 8:10Devices that can measure quantum effects
-
8:10 - 8:14can produce an endless stream
of random numbers at high speed. -
8:14 - 8:17Foiling all those
would-be casino criminals. -
8:18 - 8:22A select group of universities
and companies around the world -
8:22 - 8:26are focused on building
true random number generators. -
8:26 - 8:30At my company, our quantum
random number generator -
8:30 - 8:33started life on a two meter
by one meter optic table. -
8:34 - 8:38We were then able to reduce it
to a server-size box. -
8:39 - 8:45Today, it's miniaturized into a PCI card
that plugs into a standard computer. -
8:47 - 8:52This is the world's fastest
true random number generator. -
8:52 - 8:57It measures quantum effects to produce
a billion random numbers per second. -
8:58 - 9:01And it's in use today to improve security
-
9:01 - 9:05at cloud providers, banks
and government agencies -
9:05 - 9:06around the world.
-
9:07 - 9:14(Applause)
-
9:15 - 9:18But even with a true
random number generator, -
9:18 - 9:21we've still got the second
big cyber threat: -
9:21 - 9:24the problem of secure key exchange.
-
9:24 - 9:29Current key exchange techniques
will not stand up to a quantum computer. -
9:30 - 9:32The quantum solution to this problem
-
9:32 - 9:36is called quantum key distribution or QKD,
-
9:36 - 9:40which leverages a fundamental,
counterintuitive characteristic -
9:40 - 9:42of quantum mechanics.
-
9:42 - 9:47The very act of looking
at a quantum particle changes it. -
9:48 - 9:50Let me give you an example
of how this works. -
9:51 - 9:56Consider again exchanging the code
for the lock with James Bond. -
9:56 - 10:00Except this time, instead of a call
to give James the code, -
10:00 - 10:04we're going to use quantum effects
on a laser to carry the code -
10:04 - 10:08and send it over standard
optic fiber to James. -
10:09 - 10:13We assume that Dr. No
is trying to hack the exchange. -
10:15 - 10:20Luckily, Dr. No's attempt to intercept
the quantum keys while in transit -
10:20 - 10:23will leave fingerprints
that James and you can detect. -
10:24 - 10:28This allows those intercepted keys
to be discarded. -
10:28 - 10:30The keys which are then retained
-
10:30 - 10:33can be used to provide
very strong data protection. -
10:34 - 10:38And because the security is based
on the fundamental laws of physics, -
10:38 - 10:42a quantum computer, or indeed
any future supercomputer -
10:42 - 10:44will not be able to break it.
-
10:45 - 10:48My team and I are collaborating
with leading universities -
10:48 - 10:49and the defense sector
-
10:49 - 10:51to mature this exciting technology
-
10:52 - 10:55into the next generation
of security products. -
10:56 - 11:02The internet of things
is heralding a hyperconnected era -
11:02 - 11:08with 25 to 30 billion
connected devices forecast by 2020. -
11:09 - 11:14For the correct functioning
of our society in an IoT world, -
11:14 - 11:19trust in the systems that support
these connected devices is vital. -
11:20 - 11:25We're betting that quantum technologies
will be essential in providing this trust, -
11:25 - 11:29enabling us to fully benefit
from the amazing innovations -
11:29 - 11:32that are going to so enrich our lives.
-
11:34 - 11:35Thank you.
-
11:35 - 11:40(Applause)
- Title:
- How quantum physics can make encryption stronger
- Speaker:
- Vikram Sharma
- Description:
-
As quantum computing matures, it's going to bring unimaginable increases in computational power along with it -- and the systems we use to protect our data (and our democratic processes) will become even more vulnerable. But there's still time to plan against the impending data apocalypse, says encryption expert Vikram Sharma. Learn more about how he's fighting quantum with quantum: designing security devices and programs that use the power of quantum physics to defend against the most sophisticated attacks.
- Video Language:
- English
- Team:
closed TED
- Project:
- TEDTalks
- Duration:
- 11:53
![]() |
Brian Greene edited English subtitles for How quantum physics can make encryption stronger | |
![]() |
Brian Greene edited English subtitles for How quantum physics can make encryption stronger | |
![]() |
Brian Greene approved English subtitles for How quantum physics can make encryption stronger | |
![]() |
Brian Greene edited English subtitles for How quantum physics can make encryption stronger | |
![]() |
Krystian Aparta accepted English subtitles for How quantum physics can make encryption stronger | |
![]() |
Krystian Aparta edited English subtitles for How quantum physics can make encryption stronger | |
![]() |
Krystian Aparta edited English subtitles for How quantum physics can make encryption stronger | |
![]() |
Ivana Korom edited English subtitles for How quantum physics can make encryption stronger |