Introduction |
|
xxi | |
|
I Quantum Computing Primer |
|
|
1 | (126) |
|
1 Introduction to Quantum Mechanics |
|
|
3 | (28) |
|
What Is Quantum Mechanics? |
|
|
3 | (5) |
|
Quantum Is Counterintuitive |
|
|
4 | (1) |
|
Quantum Mechanics Is Real |
|
|
5 | (3) |
|
The Basic Properties of Quantum Mechanics |
|
|
8 | (19) |
|
Photons and Quantum Mechanics |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (4) |
|
|
14 | (3) |
|
|
17 | (3) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (2) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (2) |
|
Quantum Examples in Our World Today |
|
|
27 | (1) |
|
For Additional Information |
|
|
28 | (1) |
|
|
29 | (2) |
|
2 Introduction to Quantum Computers |
|
|
31 | (28) |
|
How Are Quantum Computers Different? |
|
|
31 | (13) |
|
Traditional Computers Use Bits |
|
|
31 | (2) |
|
Quantum Computers Use Qubits |
|
|
33 | (4) |
|
Quantum Computers Are Not Ready for Prime Time Yet |
|
|
37 | (1) |
|
Quantum Will Reign Supreme Soon |
|
|
38 | (1) |
|
Quantum Computers Improve Qubits Using Error Correction |
|
|
39 | (5) |
|
Types of Quantum Computers |
|
|
44 | (10) |
|
Superconducting Quantum Computers |
|
|
44 | (1) |
|
Quantum Annealing Computers |
|
|
45 | (2) |
|
Universal Quantum Computers |
|
|
47 | (2) |
|
Topological Quantum Computers |
|
|
49 | (1) |
|
Microsoft Majorana Fermion Computers |
|
|
50 | (1) |
|
Ion Trap Quantum Computers |
|
|
51 | (2) |
|
Quantum Computers in the Cloud |
|
|
53 | (1) |
|
Non-U.S. Quantum Computers |
|
|
53 | (1) |
|
Components of a Quantum Computer |
|
|
54 | (2) |
|
|
55 | (1) |
|
|
55 | (1) |
|
Quantum National Guidance |
|
|
56 | (1) |
|
|
56 | (1) |
|
Money Grants and Investments |
|
|
56 | (1) |
|
Other Quantum Information Science Besides Computers |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
3 How Can Quantum Computing Break Today's Cryptography? |
|
|
59 | (26) |
|
|
59 | (15) |
|
|
59 | (13) |
|
|
72 | (1) |
|
|
73 | (1) |
|
How Quantum Computers Can Break Cryptography |
|
|
74 | (9) |
|
|
74 | (2) |
|
|
76 | (3) |
|
What Quantum Can and Can't Break |
|
|
79 | (3) |
|
|
82 | (1) |
|
|
83 | (2) |
|
4 When Will the Quantum Crypto Break Happen? |
|
|
85 | (14) |
|
It Was Always "10 Years from Now" |
|
|
85 | (1) |
|
Quantum Crypto Break Factors |
|
|
86 | (4) |
|
Is Quantum Mechanics Real? |
|
|
86 | (1) |
|
Are Quantum Computers Real? |
|
|
87 | (1) |
|
|
87 | (1) |
|
Is Peter Shor's Algorithm Real? |
|
|
88 | (1) |
|
Do We Have Enough Stable Qubits? |
|
|
88 | (1) |
|
Quantum Resources and Competition |
|
|
89 | (1) |
|
Do We Have Steady Improvement? |
|
|
89 | (1) |
|
|
90 | (1) |
|
When the Quantum Cyber Break Will Happen |
|
|
90 | (5) |
|
|
90 | (3) |
|
|
93 | (2) |
|
|
95 | (3) |
|
Stays in the Realm of Nation-States for a Long Time |
|
|
95 | (2) |
|
Used by Biggest Companies |
|
|
97 | (1) |
|
|
97 | (1) |
|
Most Likely Breakout Scenario |
|
|
97 | (1) |
|
|
98 | (1) |
|
5 What Will a Post-Quantum World Look Like? |
|
|
99 | (28) |
|
|
99 | (15) |
|
Weakened Hashes and Symmetric Ciphers |
|
|
100 | (3) |
|
Broken Asymmetric Ciphers |
|
|
103 | (1) |
|
Weakened and Broken Random Number Generators |
|
|
103 | (1) |
|
Weakened or Broken Dependent Applications |
|
|
104 | (10) |
|
|
114 | (2) |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
115 | (1) |
|
Quantum Cryptography Will Be Used |
|
|
116 | (1) |
|
|
116 | (1) |
|
Quantum Networking Arrives |
|
|
117 | (1) |
|
|
117 | (9) |
|
Better Chemicals and Medicines |
|
|
118 | (1) |
|
|
118 | (1) |
|
True Artificial Intelligence |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
Better Weather Prediction |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
More Precise Military and Weapons |
|
|
122 | (1) |
|
|
122 | (4) |
|
|
126 | (1) |
|
II Preparing for the Quantum Break |
|
|
127 | (104) |
|
6 Quantum-Resistant Cryptography |
|
|
129 | (38) |
|
NIST Post-Quantum Contest |
|
|
129 | (7) |
|
NIST Security Strength Classifications |
|
|
132 | (1) |
|
|
133 | (1) |
|
Formal Indistinguishability Assurances |
|
|
134 | (1) |
|
|
135 | (1) |
|
Types of Post-Quantum Algorithms |
|
|
136 | (7) |
|
|
136 | (1) |
|
|
137 | (1) |
|
Lattice-Based Cryptography |
|
|
138 | (2) |
|
Multivariate Cryptography |
|
|
140 | (1) |
|
Supersingular Elliptic Curve Isogeny Cryptography |
|
|
140 | (1) |
|
|
141 | (1) |
|
Symmetric Key Quantum Resistance |
|
|
142 | (1) |
|
Quantum-Resistant Asymmetric Encryption Ciphers |
|
|
143 | (13) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (2) |
|
General Observations on PKE and KEM Key and Ciphertext Sizes |
|
|
155 | (1) |
|
Quantum-Resistant Digital Signatures |
|
|
156 | (8) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
General Observations on Signature Key and Sizes |
|
|
162 | (2) |
|
|
164 | (2) |
|
|
164 | (1) |
|
|
165 | (1) |
|
Lack of Verified Protection |
|
|
165 | (1) |
|
For Additional Information |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (22) |
|
|
168 | (9) |
|
Random Is Not Always Random |
|
|
168 | (2) |
|
Why Is True Randomness So Important? |
|
|
170 | (2) |
|
|
172 | (5) |
|
Quantum Hashes and Signatures |
|
|
177 | (3) |
|
|
177 | (1) |
|
Quantum Digital Signatures |
|
|
178 | (2) |
|
Quantum Encryption Ciphers |
|
|
180 | (8) |
|
|
181 | (7) |
|
|
188 | (1) |
|
|
189 | (18) |
|
Quantum Network Components |
|
|
189 | (10) |
|
|
189 | (2) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (2) |
|
Quantum Network Protocols |
|
|
196 | (3) |
|
Quantum Network Applications |
|
|
199 | (4) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
204 | (3) |
|
|
207 | (24) |
|
Four Major Post-Quantum Mitigation Phases |
|
|
207 | (7) |
|
Stage 1 Strengthen Current Solutions |
|
|
207 | (4) |
|
Stage 2 Move to Quantum-Resistant Solutions |
|
|
211 | (2) |
|
Stage 3 Implement Quantum-Hybrid Solutions |
|
|
213 | (1) |
|
Stage 4 Implement Fully Quantum Solutions |
|
|
214 | (1) |
|
The Six Major Post-Quantum Mitigation Project Steps |
|
|
214 | (16) |
|
|
215 | (5) |
|
|
220 | (5) |
|
|
225 | (1) |
|
|
226 | (2) |
|
Step 5 Take Action/Remediate |
|
|
228 | (2) |
|
Step 6 Review and Improve |
|
|
230 | (1) |
|
|
230 | (1) |
Appendix: Additional Quantum Resources |
|
231 | (8) |
Index |
|
239 | |