How quantum physics can make encryption stronger | Vikram Sharma

64,116 views ・ 2018-04-18

TED


Please double-click on the English subtitles below to play the video.

00:12
Recently, we've seen the effects of cyber attacks on the business world.
0
12817
4404
00:17
Data breaches at companies like JP Morgan, Yahoo, Home Depot and Target
1
17245
5411
00:22
have caused losses of hundreds of millions
2
22680
2691
00:25
and in some cases, billions of dollars.
3
25395
2847
00:28
It wouldn't take many large attacks to ravage the world economy.
4
28792
3701
00:33
And the public sector has not been immune, either.
5
33229
3150
00:36
In 2012 to 2014,
6
36706
3768
00:40
there was a significant data breach at the US Office of Personnel Management.
7
40498
4279
00:45
Security clearance and fingerprint data was compromised,
8
45157
3430
00:48
affecting 22 million employees.
9
48611
4204
00:53
And you may have heard of the attempt by state-sponsored hackers
10
53561
4103
00:57
to use stolen data to influence election outcomes in a number of countries.
11
57688
5558
01:03
Two recent examples are the compromise of a large amount of data
12
63624
3619
01:07
from the Bundestag, the national Parliament of Germany,
13
67267
3310
01:10
and the theft of emails from the US Democratic National Committee.
14
70601
4733
01:16
The cyber threat is now affecting our democratic processes.
15
76807
4287
01:21
And it's likely to get worse.
16
81712
1933
01:24
As computer technology is becoming more powerful,
17
84141
3738
01:27
the systems we use to protect our data are becoming more vulnerable.
18
87903
4158
01:33
Adding to the concern is a new type of computing technology,
19
93093
3548
01:36
called quantum computing,
20
96665
1991
01:38
which leverages microscopic properties of nature
21
98680
2953
01:41
to deliver unimaginable increases in computational power.
22
101657
3909
01:46
It's so powerful that it will crack many of the encryption systems
23
106069
4413
01:50
that we use today.
24
110506
1200
01:52
So is the situation hopeless?
25
112625
2230
01:55
Should we start packing our digital survival gear
26
115228
2857
01:58
and prepare for an upcoming data apocalypse?
27
118109
3000
02:02
I would say, not yet.
28
122283
1658
02:04
Quantum computing is still in the labs,
29
124489
1922
02:06
and it will take a few years until it's put to practical applications.
30
126435
3490
02:10
More important,
31
130347
1206
02:11
there have been major breakthroughs in the field of encryption.
32
131577
3486
02:15
For me, this is a particularly exciting time
33
135497
3001
02:18
in the history of secure communications.
34
138522
2667
02:21
About 15 years ago,
35
141759
1429
02:23
when I learned of our new-found ability
36
143212
2326
02:25
to create quantum effects that don't exist in nature,
37
145562
3785
02:29
I was excited.
38
149371
1419
02:30
The idea of applying the fundamental laws of physics
39
150814
3287
02:34
to make encryption stronger
40
154125
1731
02:35
really intrigued me.
41
155880
1427
02:38
Today, a select groups of companies and labs around the world, including mine,
42
158069
6191
02:44
are maturing this technology for practical applications.
43
164284
3606
02:48
That's right.
44
168260
1151
02:49
We are now preparing to fight quantum with quantum.
45
169435
3467
02:53
So how does this all work?
46
173719
1881
02:55
Well, first, let's take a quick tour of the world of encryption.
47
175624
3611
02:59
For that, you'll need a briefcase,
48
179259
2047
03:01
some important documents that you want to send your friend, James Bond,
49
181330
3991
03:05
and a lock to keep it all safe.
50
185345
2067
03:08
Because the documents are top secret, we're going to use an advanced briefcase.
51
188122
5175
03:13
It has a special combination lock
52
193321
2064
03:15
which, when closed,
53
195409
1565
03:16
converts all the text in the documents to random numbers.
54
196998
3412
03:20
So you put your documents inside, close the lock --
55
200434
3716
03:24
at which point in time the documents get converted to random numbers --
56
204174
3482
03:27
and you send the briefcase to James.
57
207680
2400
03:30
While it's on its way, you call him to give him the code.
58
210736
3230
03:34
When he gets the briefcase, he enters the code,
59
214387
2936
03:37
the documents get unscrambled, and voilà,
60
217347
2984
03:40
you've just sent an encoded message to James Bond.
61
220355
3849
03:44
(Laughter)
62
224228
1055
03:45
A fun example, but it does illustrate three things important for encryption.
63
225966
4490
03:50
The code -- we call this an encryption key.
64
230776
2841
03:53
You can think of it as a password.
65
233641
2102
03:56
The call to James to give him the code for the combination lock.
66
236093
4849
04:00
We call this key exchange.
67
240966
2031
04:03
This is how you ensure
68
243442
1493
04:04
you get the encryption key securely to the right place.
69
244959
3769
04:09
And the lock, which encodes and decodes the document.
70
249164
3699
04:12
We call this an encryption algorithm.
71
252887
2619
04:15
Using the key, it encodes the text in the documents
72
255530
4968
04:20
to random numbers.
73
260522
1396
04:21
A good algorithm will encode in such a way
74
261942
2762
04:24
that without the key it's very difficult to unscramble.
75
264728
3733
04:29
What makes encryption so important
76
269529
1993
04:31
is that if someone were to capture the briefcase and cut it open
77
271546
3736
04:35
without the encryption key and the encryption algorithm,
78
275306
3262
04:38
they wouldn't be able to read the documents.
79
278592
2516
04:41
They would look like nothing more than a bunch of random numbers.
80
281132
4150
04:46
Most security systems rely on a secure method for key exchange
81
286575
4849
04:51
to communicate the encryption key to the right place.
82
291448
4467
04:56
However, rapid increases in computational power
83
296862
2976
04:59
are putting at risk a number of the key exchange methods we have today.
84
299862
4365
05:04
Consider one of the very widely used systems today -- RSA.
85
304776
4460
05:09
When it was invented, in 1977,
86
309855
3301
05:13
it was estimated that it would take 40 quadrillion years
87
313180
4500
05:17
to break a 426-bit RSA key.
88
317704
3536
05:22
In 1994, just 17 years later,
89
322006
4333
05:26
the code was broken.
90
326363
1531
05:29
As computers have become more and more powerful,
91
329355
2571
05:31
we've had to use larger and larger codes.
92
331950
2667
05:35
Today we routinely use 2048 or 4096 bits.
93
335117
5998
05:41
As you can see, code makers and breakers are engaged in an ongoing battle
94
341831
5031
05:46
to outwit each other.
95
346886
1794
05:50
And when quantum computers arrive in the next 10 to 15 years,
96
350553
4096
05:54
they will even more rapidly crack the complex mathematics
97
354673
4186
05:58
that underlies many of our encryption systems today.
98
358883
3690
06:03
Indeed, the quantum computer is likely to turn our present security castle
99
363034
5408
06:08
into a mere house of cards.
100
368466
2587
06:12
We have to find a way to defend our castle.
101
372815
3500
06:17
There's been a growing body of research in recent years
102
377474
2603
06:20
looking at using quantum effects to make encryption stronger.
103
380101
3221
06:23
And there have been some exciting breakthroughs.
104
383760
3267
06:27
Remember those three things important for encryption --
105
387474
2929
06:30
high-quality keys, secure key exchange and a strong algorithm?
106
390427
4893
06:35
Well, advances in science and engineering
107
395831
2667
06:38
are putting two of those three elements at risk.
108
398522
3237
06:42
First of all, those keys.
109
402450
1865
06:45
Random numbers are the foundational building blocks of encryption keys.
110
405006
4230
06:49
But today, they're not truly random.
111
409260
2579
06:52
Currently, we construct encryption keys
112
412641
2738
06:55
from sequences of random numbers generated from software,
113
415403
3809
06:59
so-called pseudo-random numbers.
114
419236
2563
07:02
Numbers generated by a program or a mathematical recipe
115
422712
3317
07:06
will have some, perhaps subtle, pattern to them.
116
426053
3761
07:10
The less random the numbers are,
117
430784
1552
07:12
or in scientific terms, the less entropy they contain,
118
432360
3344
07:15
the easier they are to predict.
119
435728
2067
07:18
Recently, several casinos have been victims of a creative attack.
120
438917
3922
07:22
The output of slot machines was recorded over a period of time
121
442863
4349
07:27
and then analyzed.
122
447236
1357
07:28
This allowed the cyber criminals
123
448982
1968
07:30
to reverse engineer the pseudo-random number generator
124
450974
3667
07:34
behind the spinning wheels.
125
454665
1999
07:36
And allowed them, with high accuracy, to predict the spins of the wheels,
126
456688
5307
07:42
enabling them to make big financial gains.
127
462019
3467
07:47
Similar risks apply to encryption keys.
128
467122
3158
07:50
So having a true random number generator is essential for secure encryption.
129
470815
5160
07:57
For years, researchers have been looking at building true random number generators.
130
477815
5254
08:03
But most designs to date are either not random enough,
131
483093
3373
08:06
fast enough or aren't easily repeatable.
132
486490
2733
08:10
But the quantum world is truly random.
133
490053
3151
08:13
So it makes sense to take advantage of this intrinsic randomness.
134
493546
4991
08:20
Devices that can measure quantum effects
135
500165
1912
08:22
can produce an endless stream of random numbers at high speed.
136
502101
3930
08:26
Foiling all those would-be casino criminals.
137
506421
3000
08:30
A select group of universities and companies around the world
138
510485
3577
08:34
are focused on building true random number generators.
139
514086
3422
08:37
At my company, our quantum random number generator
140
517895
3658
08:41
started life on a two meter by one meter optic table.
141
521577
3787
08:46
We were then able to reduce it to a server-size box.
142
526085
3804
08:50
Today, it's miniaturized into a PCI card that plugs into a standard computer.
143
530736
5772
08:59
This is the world's fastest true random number generator.
144
539482
4134
09:04
It measures quantum effects to produce a billion random numbers per second.
145
544053
5073
09:09
And it's in use today to improve security
146
549877
3349
09:13
at cloud providers, banks and government agencies
147
553250
3674
09:16
around the world.
148
556948
1150
09:18
(Applause)
149
558788
6928
09:27
But even with a true random number generator,
150
567319
2568
09:29
we've still got the second big cyber threat:
151
569911
2896
09:32
the problem of secure key exchange.
152
572831
2682
09:36
Current key exchange techniques will not stand up to a quantum computer.
153
576315
4552
09:41
The quantum solution to this problem
154
581865
1929
09:43
is called quantum key distribution or QKD,
155
583818
3700
09:47
which leverages a fundamental, counterintuitive characteristic
156
587893
4335
09:52
of quantum mechanics.
157
592252
1400
09:54
The very act of looking at a quantum particle changes it.
158
594077
4907
10:00
Let me give you an example of how this works.
159
600173
2319
10:02
Consider again exchanging the code for the lock with James Bond.
160
602927
4707
10:07
Except this time, instead of a call to give James the code,
161
607974
4158
10:12
we're going to use quantum effects on a laser to carry the code
162
612156
4048
10:16
and send it over standard optic fiber to James.
163
616228
3909
10:20
We assume that Dr. No is trying to hack the exchange.
164
620774
4349
10:26
Luckily, Dr. No's attempt to intercept the quantum keys while in transit
165
626530
5243
10:31
will leave fingerprints that James and you can detect.
166
631797
3666
10:36
This allows those intercepted keys to be discarded.
167
636043
3468
10:40
The keys which are then retained
168
640026
1757
10:41
can be used to provide very strong data protection.
169
641807
3345
10:45
And because the security is based on the fundamental laws of physics,
170
645815
4286
10:50
a quantum computer, or indeed any future supercomputer
171
650125
4063
10:54
will not be able to break it.
172
654212
1934
10:56
My team and I are collaborating with leading universities
173
656768
2936
10:59
and the defense sector
174
659728
1294
11:01
to mature this exciting technology
175
661046
2436
11:03
into the next generation of security products.
176
663506
3133
11:07
The internet of things is heralding a hyperconnected era
177
667895
5738
11:13
with 25 to 30 billion connected devices forecast by 2020.
178
673657
6118
11:20
For the correct functioning of our society in an IoT world,
179
680569
5111
11:25
trust in the systems that support these connected devices is vital.
180
685704
4828
11:31
We're betting that quantum technologies will be essential in providing this trust,
181
691704
4823
11:36
enabling us to fully benefit from the amazing innovations
182
696887
4559
11:41
that are going to so enrich our lives.
183
701470
2898
11:46
Thank you.
184
706046
1150
11:47
(Applause)
185
707220
4930
About this website

This site will introduce you to YouTube videos that are useful for learning English. You will see English lessons taught by top-notch teachers from around the world. Double-click on the English subtitles displayed on each video page to play the video from there. The subtitles scroll in sync with the video playback. If you have any comments or requests, please contact us using this contact form.

https://forms.gle/WvT1wiN1qDtmnspy7