← All talks

Quantum Computing and Security Implications

BSides Calgary · 20222:03:4110 viewsPublished 2022-12Watch on YouTube ↗
Speakers
Tags
DifficultyAdvanced
About this talk
An exploration of quantum computing fundamentals and their security implications across multiple domains. Covers quantum mechanics concepts like superposition and entanglement, applications to cryptography and threat detection, and the strategic need for organizations to begin quantum readiness planning now to avoid being unprepared when practical quantum systems emerge.
Show transcript [en]

foreign

[Music] Slade this is a Quantum Computing and the security implications thereof uh and all my details if you want to snapshot that don't worry about it we've got another screen coming up um I am speaking on possibly the most advanced topic that you've got today and I am a great grandfather this is my great grandson so anyways if you want all my details uh there's a QR code which you can safely uh uh take a shot of um with all your phones um bearing in mind that I did get my start in security as a uh security uh a virus computer virus researcher and I know every possible way to get somebody to install uh bad things on

their machine so take that as red and anything else that I need to tell you about myself I don't know anyways do we understand Quantum Computing um we don't understand quantum mechanics uh for the most part and so some of the stuff that I'm going to be covering today is is going to be dealing with um uh quantum mechanics and uh this is uh stuff that's really pretty twisted um at least from our perspective we generally think of the world in terms of Newtonian mechanics uh quantum mechanics uh really it puts a strain on on those ideas and so you get some some real weirdnesses there um but we can we can use those weirdnesses they uh will help us out

um hopefully hopefully uh and and so for the next uh three hours uh we will be exploring uh this not going into too much detail in the quantum mechanics and and all the really fancy uh mathematics involved there uh hopefully we're gonna get fairly quickly into actual application to uh security and and how it can be used in a variety of the domains of security um but we do have to start with with a little bit about uh quantum mechanics and and Quantum Computing uh off the top uh now some of the uh Concepts here um we don't have bits we have qubits now a classical bit uh in in traditional computers is either going to be a zero

or a one qubits in in quantum Computing devices can be zero and one at the same time and in fact can be set um depending on the technology that's being used for the quantum processing device at any point in between 0 and 1. so you know our classical bits where we we have um the standard uh you know one it's it's all just ones and zeros um that doesn't work with uh with quantum mechanics it's it's not all just ones and zeros it can be one and zero at the same time or it can be something in between one and zero and uh that is is only the beginning of um uh the weirdnesses in in Quantum

computing um superposition is this business of being one and zero at the same time uh so we can uh set up a Quantum Computing device we can start with everything in in superposition and then start the processing uh input whatever uh process we're gonna have and it will in a sense go through every possible combination of ones and zeros for us in one operation and come up with the right answer that takes you know it can take years in in traditional computers um because of you know so many different possibilities and happens uh if we've done it properly you know in one operation in a quantum computer so um now then there there is um entanglement where

um and uh we have two Quantum entities um very often we can think of it as as photons although there there are a number of ways that that this can be created where where two uh of these entities are brought together and get entangled that is that they become somehow tied together even when you separate them and so uh we can entangle two entities uh take them apart and uh by observing one make a change in the other uh and this business of of observing it and uh making a change is called the observer effect and it is of course gives us the the jokes about uh Schrodinger's cat shorting his cat is alive and dead Schrodinger's phone until

you look it's both cracked and not cracked you know that this is the uh the kind of thing so the uh when we observe something and of course we're doing all of that all the time in Quantum Computing um the you know making an observation is essentially uh doing the processing so um yeah as I say this stuff is really twisted in in comparison to what we usually think of in terms of computing and what we usually think of in terms of of the world and Newtonian mechanics and Niels Bohr one of the big names in the field if someone says that he can think or talk about quantum physics without becoming dizzy that shows only that he

has not understood anything whatever about it so even the people who are specialists in this find it weird so now uh before we get into the big areas of quantum Computing and and the applications of quantum computers to security we are starting to use quantum technology in traditional computers as we are making uh computers and circuitry smaller we are getting into the the size ranges where Quantum effects start to come into play and so we are already seeing that and involved in in some of the circuitry uh that's being made um today and and in some cases that means we have to be careful about it as we get the circuitry closer and closer together we have to take care to avoid

things like Quantum tunneling where we will uh possibly in in two discrete wires uh create a situation where a current can actually flow between them even though those wires are separated if they are close enough together quantum effects can come into play here and and we'll get those kind of oddities happening within our traditional computers on the other hand uh you know we we want to get down to these size ranges because smaller is faster smaller is less power and and so on and so forth and indeed um we can use these uh Quantum effects to our advantage to create new kinds of traditional computers um of course um everybody knows about the touring machines the universal computer and so

you know anything that we can do with a traditional computer we should be able to do with a quantum computer and and vice versa just you know difference in uh time scales in in terms of the operations uh but one of the things that uh quantum computers will be able to do which traditional computers do not is a reversible computations with traditional computers it's an irreversible computation when when you you know add something in in a computer you get a result you can't then reverse that you know put the result in and get back your original numbers you can do that with a Quantum compute and because it's reversible that means that the power consumption

that happens within a quantum computer can be made arbitrarily small so we're pursuing this in in terms of traditional computer we're always trying to get um you know a more uh Computing for our you know ERG or die or whatever um we want to uh you know save battery we want to have our devices last longer in that sort of and with Quantum devices still using traditional uh you know ones and zeros uh in in terms of the bits but using Quantum technology in traditional computers we can get down in in terms of making the the power arbitrarily small so uh that is is something that is happening with Quantum technology in traditional computing at this point I I really want to stress

there is uh something that you you need to keep front of Mind anytime somebody is talking about Quantum computing and that is the difference between Quantum cryptography which is a a real thing but fairly Limited and the he hypothesized ability to use quantum computers to create Universal decryption and that isn't real yet that is hypothesized I mean that um they do have an algorithm which seems to be working um for certain things now this is a an algorithm that works on uh factoring numbers so it's going to work against RSA it's not necessarily going to work against the field and it's not necessarily going to work against Olympic cryptography so you know there uh there are some

limitations on this supposedly Universal decrypter even in terms of of the hypothesized operation uh but Quantum cryptography is real now it's it's limited um Quantum cryptography is uh looking at something like uh Photon polarization and well uh sorry it is I I mean in in terms of the real commercially available Quantum cryptography systems um the thing is it's not cryptography it's just key exchange that's all it is uh you uh you polarize a photon um you you don't have um uh maybe angular uh polarization may be vertical and horizontal um uh whatever it may be you you have to uh choose randomly the detector angle and the data that you're going to exchange you exchange the the angle but not the

value and you use Photon entanglement here to detect eavesdropping so we we've got lots of fun things that we can do with Quantum cryptography in theory um I uh I was going to do a demo here but um in in this case it's not that we don't have the time but the fact that I can't get any feedback from anybody uh would make this difficult unless our our moderator here can gather data from a bunch of you is uh and and presented to me in chat do you think that that's possible

anyway I'm not seeing anything uh there in the chat so that we probably won't be able to do it um so I'll have to I'll have to do my best to describe it um we have our our good old um Allison Bob uh our eavesdropper Eve um uh wanting to know what's happening so so Alice and Bob um they uh set up their uh their transmission and their detectors with photons they're they're trans going to give you certain values they're using certain polarization to transmit those values and uh they can exchange the the you know publicly talk about the angles that they're using but not the values they're they're transmitting now if Eve is in

there trying to uh detect uh the the photons as they go through and read the values uh Eve has a 50 chance of changing the values when she's detecting them uh that being the case then Alice and Bob can then determine oh you know what we transmitted isn't what's coming across obviously somebody's listening in on the line so for the first time eavesdropping is uh you know he's stopping his is normally a passive attack you can't you you don't know you cannot detect when somebody's in it now we can with with Quantum uh cryptography um unfortunately uh because we're dealing in the real world we have to make some provision for error there's going to be slight variations

going on here so we we have to have some margins uh built into the system as I said it's a commercial system and unfortunately in order to do that make it commercially viable the uh the margins that we use have to be big enough that uh somebody can actually get in there and that's what the system can detect uh what we're using without us being able to detect that they're doing it uh you know we have to send Cascades of photons so we're not actually uh you know uh relying on on one single Photon um it's it's really interesting when you when you have a Quantum cryptography setup commercially you have to have dedicated single mode fiber optic cable

and if you've got dedicated single mode fiber optic Abra I mean why do you need cryptography for you know that stuff is is very difficult to uh to tap anyways um the uh the Chinese have have been doing some testing um uh with this stuff uh from space from from satellites uh Satellite Communication protected by Quantum cryptography again in those cases you really have to use Cascades of photons and uh you know this it would be interesting to uh you know actually uh do some some attacks on on those systems and see how easy it would be I would think that it would be remarkably easy to uh you know really listen in on on what's going on on those

things and build up your knowledge of the the key um so uh there's that oh another one um uh I was talking to a guy working for Bank in Singapore and uh they are thinking of using this kind of Technology um for uh communicating with ATMs and and not this you know this would be an unhackable way of submitting uh your key your your you know pin or or whatever it is your Authentication to the ATM because I mean in that case you're you're actually standing right there and you could see if somebody was standing between you with a detector um and uh you know ensure that you have a confidential uh communication with the

ATM um on on the basis of being protected with with Quantum cryptography but again Quantum cryptography is only exchanging a key that's that's it it's it's not actually a cryptographic algorithm of itself it's it's just an exchange of the key um you can go in and look up the bb84 algorithm if if uh you want to look at the demo that we would have done if we could have set it up but uh anyways now uh third Point uh to make here um quantum computers um you have to be careful is this a true quantum computer or is it a Quantum processing device and the the quantum processing devices are um more similar to analog computers

uh now uh you've never heard of an analog computer yes you have uh some of you have probably even used them um so we'll we'll get into some of those so now the the simplest one uh here is the these spaghetti computer which is used for sorting you get pieces of spaghetti you cut them to length of the the numbers that you're trying to sort um you uh take them loose in your hand loosen up that they can slide back and forth against each other but not so loose that you're going to lose them you slam you're piss down on the table one operation they're all sorted and you just you know take out the longest one first and Away you go

it's all done for you now that is a special purpose that is a special application it is a single application that is all the spaghetti computer we do but it does it in one operation it does you know sorts as many numbers as you want in in one operation uh slide rules uh those are the ones that you probably have used um and this uh provides for an exact computation it relies on well it is limited we are limited in terms of taking an imprecise meeting but a slime Google uh gives you an exact computation of uh you know multiplication those those sorts of things as long as you can place it exactly um and of course it does it very quickly I

can remember um when pocket calculators uh first came out a friend of mine got one was very very proud of the fact and we actually had a little contest uh and uh we we set up a computation and he did it on his uh Frozen you know uh calculator I did it on slide rule uh and uh not only did I finish first but I also noted where he went wrong and and got a wildly uh incorrect answer by the time he was he was finished as he he was going through uh so you know slide rules uh were pretty handy devices um that's another form of an analog computer now in terms of quantum computers uh of the

d-wave computers are not and and some people will make a very big deal over this they are not true full quantum computers uh d-wave is uh nearby here um in BC in Burnaby and they have been selling these these computers you know they tend to call them computers uh two various uh entities uh NASA's got one I believe Google's got one I'm not sure maybe not saying Google is sharing them uh I'm pretty sure the NSA has one at least you know somebody in the military in the United States has one um and uh but they are not true for quantum computers they are quantum co-processors uh they're very interesting they can do uh some very interesting things and and

they're getting uh bigger and faster and and that sort of thing um but they can't do everything in particular one of the things they cannot do is run the shore algorithm which is is the one that people are so concerned about in terms of breaking RSA um so the you know the name wave machines do not uh go in that direction cannot do that uh kind of processing but they do do uh Quantum processing and uh and they are being used and they're commercially available uh so whether or not it's a true quantum computer it is a Quantum processing device and it is it it uses this analog form of quantum Computing now what it

does do is it uses the least energy function the least energy provides the best answer and we can do a lot of things with this we can go into least path analysis we can go into best comparisons uh very important as we see uh we can do a lot of stuff with simulation in there so the the D wave Orion already can give us uh most of what I'm talking about in or we'll be talking about in terms of Quantum uh computers being able to help us in security so so we will get into then the applications and implications um I I have structured it by a security domain just just because that is a convenient way to break this down and

not look at everything at once and then start to structure how how I'm going to present some of this stuff I am not pushing ISE to jargon on anybody here it's it's uh you know it's a good way to define things as a matter of fact what I use in in this presentation is the original 10 domain model not the current a domain model uh because I find the original tan domain is a lot easier academically in terms of structuring either courses or presentations and and breaking down analysis in terms of what we want to uh to examine here and and remember we're looking at these General functions which which all quantum computers in including the

d-wave machines will be able to provide us with and that is lease path analysis simulation and pattern matching these are areas that can do us a lot of good and are very difficult with current Technologies so uh anyways uh but before we jump into that I should probably ask are there any questions yet anybody I I presume that you guys can communicate with the moderators um anything that has come up that the moderators want to pass along right now uh that I can answer before we we get into the specific applications

see I am not seeing anything in chat so either I completely misunderstand uh the situation or uh their everybody has gone to sleep already yeah okay uh well I will assume that we're okay with um that we don't have any specific questions and we can go on with the applications now the uh these uh oh what are threat actors doing with Quantum at the moment uh the threat actors probably don't have an awful lot of access I I mean they're uh there are relatively few uh quantum computers in the world uh there are the uh relatively small number of d-wave machines um IBM has has a machine which you can actually uh play with um you can sign up get yourself a um an

account on on their test quantum computer and this is an actual true uh quantum computer uh the one from IBM um but again um you know the limited number of machines uh you know definitely limited uh processing uh time on these machines and so they're going to be verifying uh basically everybody who is is using them I do not know that the the Russians and the Chinese as as the biggest nation state threat actors um in our environmental sphere uh are doing with regard to you know obviously they are going to be pursuing this or or at least uh one one assumes that they are going to be pursuing this but whether or not they have uh any

capabilities to to actually turn out Machines of their own whether Quantum co-processors or uh trunk quantum computers um you know we we don't have an awful lot of information there but uh it's unlikely uh any machines they do have are again likely to be a test bed level uh type machines and they're going to be limited um but I will uh go through as as we go through the different domains um want threat actors could do with quantum computers as they start to come online and as they start to become more widely available so uh yeah as we go through I'll be you know dealing with with attacks and and problems that Quantum Computing can be presenting as it

no anyways uh just to to expand these uh particular areas uh these these three categories of uh what we know we can do uh the least path is uh the the classic one is the traveling salesman problem yeah salesman has a um a certain number of clients in a certain number of areas he has to travel to see them all what is the the least path what is the shortest distance that he can travel and visit all his customers and of course as we increase uh the number of uh entities clients in the driving salesman problem um we this problem becomes intractable and um not too many years ago uh it's been about 17 years ago now uh maybe a little

longer uh well I guess it would have been uh longer um uh somebody did a a traditional um attack on the traveling salesman problem in terms of all the towns in Norway what was what would be the shortest path to go through all the 11 000 towns in Norway and I believe it took seven years for you know a huge group of computers to actually you know solve that problem and then come up with the the shortest path by which of time of course they've built other roads in Norway but um so you know this is something uh that um a a quantum computer would would be able to address in terms of the least

path um minimum spanning trees another basically another way of uh saying the same thing um there are all kinds of uh applications for this lease path analysis uh scheduling is is one that's uh non-trivial if any of you have have ever had to deal with scheduling problems you know how time consuming that can be uh efficiency studies and anything with multiple requirements uh so uh you know this this type of uh least path analysis is is something which has lots and lots of applications and and as we go through the security domains um you will see uh just how many times we look at this least death analysis and and this is something that even the the

d-wave uh computers uh processing devices uh can do for us uh right now so um the uh you know various entities are doing at the Bank of Canada is looking at uh cryptocurrencies the the uh assessing the impact of the adoption of cryptocurrencies and again you know this is a situation right with all kinds of of uh variables uh to do your analysis and and so using uh quantum annealing uh their uh Contracting with a company called Multiverse computing you know it's just getting into the naming and the metaverse and all that kind of stuff and then you know do not get too uh uh confused with with multiple Technologies here but they are using uh Quantum

Computing at a formula called Quantum annealing which does this lease math analysis to assess the impact of the adoption of cryptocurrencies um and it's uh something that I do another presentations on is cryptocurrencies and and decentralized finance um uh simulation uh to move on from from Louise path analysis when we are looking at climate models and of course you know with climate change going on here and everything you know even weather forecasts are uh Tough Enough um you know but but looking at the climate models this is why we can't get the climate models to agree with each other you make you know very very minor changes and they they go off on wildly different directions because

what you're doing with with climate modeling for the most part you are breaking the uh atmosphere up into cells and then you look at the effects of changes on on one cell and of course that cell when when it changes it changes the cells around it so then you have to reprocess all the cells uh that are contiguous to that cell and and so on and so it goes and and so we have to do you know multiple iterations of processing every single cell and you know what happens when I change to one cell impacts adjacent cells and and so on and so forth so um uh you know as I said climate models are

the the biggest one here but even you know weather forecasting um uh uses the same kind of of effect um the same kind of analysis and and it's very very time consuming on traditional computers simulation in in quantum computers is is much better and as I say you know the business of having you know uh a cubit being one and zero at the same time allows you to essentially look at all the possibilities at once in a single operation and so you know Quantum Computing we're going to need a very very big quantum computer in order to do something like climate models you know and even for for weather forecasting but um it will allow us to do the processing

much faster uh than we are doing it uh currently with with traditional computers uh pattern recognition now yeah there's you know a picture of uh you will have immediately recognized it as as airplanes uh you probably would have immediately recognized it as military aircraft as well so people are really good at pattern recognition computers are very bad at pattern recognition because any uh you know we see uh variations and we can tolerate the variations you know pattern recognition with computers if we don't build all kinds of extra things into our uh processing algorithm then uh computers um when they hit something that doesn't match you know they'll just say no match um you know they're very literal very

you know looking for exact matches of ones and zeros and you know having things that are a little bit odd a little bit different uh they can't handle that and and match it to say yes this is the same thing or a similar thing um in terms of pattern recognition um and and we we have problems with this we are doing all the time we are doing uh data representation and data reduction and this comes particularly into things like our um Access Control uh Biometrics you know when when you uh check somebody's fingerprints you don't compare the fingerprints you've got a representation of a fingerprint and you re you know reduce the data involved in in what the fingerprint

actually is uh to get that representation and so now we've we've lost an awful lot of data and we are in a situation where we're not comparing the full thing we're not comparing the full um uh fingerprint in in terms of Biometrics we're just comparing this representation and that allows for you know false positives false negatives because we're not actually comparing the real thing with uh Quantum Computing we are going to get much closer to being able to compare the real thing and then you know we're going to have a much better time doing pattern recognition than we can with traditional computer we aren't going to be tripping up as much with with those types of

things so into uh some of the domains of security and starting off with Security Management risk management now when we when we do risk management and particularly the tools that we are doing risk management with these days you take uh all the all the threats all the vulnerabilities all the exploits that are out there uh you know we look at the threats uh we look at the risk that they pose to us we look at our uh countermeasures our safeguards our controls that we use you know we plug all of this stuff into a huge spreadsheet and and we're saying you know okay we've got you know this much risk because of that uh you know we're doing

quantitative risk analysis um and this is why nobody does quantitative risk analysis is you know spreadsheet that we're we're dealing with here is huge all the different threats all the different controls and and safeguards and countermeasures against those threats how effective they are in in proportional terms and you know what we come out at the end you know how how much total risk we are left with and so you know with in in terms of our budget which is always going to be fixed and there's never going to be enough how you know what's uh our best uh protection situation what you know if we Sorry uh when we've got this spreadsheet when we're fully populated the spreadsheet

then we can start do what if analysis and this is uh what the the risk analysis tools do for us is allow us having gathered all the data in the first place to play these what if things what if we reduced the controls here and increase them over here does that give us a better security posture and you know we have to do that you know that what if on an individual basis you know you you reduce this you increase that and and there's you know possibly hundreds of different things for you to increase and decrease bump around on it so uh you know this is going to take us a long time and and we have to be involved

there's no sort of automated way to say okay give me the best result not with traditional computers but there is with Quantum Computing because of the least path analysis it will you know we can as you know as I said we have to collect all this data in the first place and plug it into the the spreadsheet but then once we have done that with a quantum computer we will be in a situation and say okay play with this find me the shortest path find me the least path here um and and therefore come up with the best security situation the best security posture how much do we spend on this how much do we spend on that do we

reduce this do we you know increase that you know what do we do in in terms of manipulating all of those variables remember multiple variables that we got involved here all of those variables uh uh get manipulated adjusted up and down again you know a quantum computer can look at that and say okay with everything you know it's one and zero at the same time what are all the possibilities and which one gives us the bend best result in the end uh that is um you know a something that that we would dearly love to have that certainly management would dearly help me out and and you know we would be able to know this is this is the best this is uh the

best we can get I mean we would love to have it because we could go to management and say okay you know this is the best posture that we've got we're still short we know it's the best posture we can uh prove that it's the best moisture our you know quantum computer has gone through uh the the Hoops for us has has examined every possible combination this is the best and we're still falling short we need more money so you know management is is gonna like it they know that uh they are going to have the best posture and and we are going to like it because you know we will be able to say you know

for sure um you know it's there's nothing else we can do with jiggling things around here we are still falling short and we are falling this much short and you know we need more resources uh for this and once we get more resources equipment and put it back into the with one computer and say okay with the expert resources where do we put them to improve our security posture to the greatest extent uh so that's uh that's it now we are coming up on uh 20 minutes after the hour and I with this being a three hour presentation I figured that I would want to give you guys uh some breaks here so moderator and

participants would you like a 10-minute break now this one

question is this being used by Homeland Security answer not yet um I am sure that they are starting to look into this this is definitely uh something that they are going to want to use I I did have a conversation with a fellow from the U.S Navy um outlining this uh this type of analysis with with Quantum Computing and he got very very excited about it um he uh uh he saw it in terms of battle management and he's right um you know it's not just Security Management you know all kinds of management can do it in in this and we'll talk about it a bit later in in business continuity planning but um uh in terms of battle Management on a

you know a a battleship um as they say you know no plan survives first contact with the Enemy you are always adjusting what is happening during a battle and and right now it's just you know people have to do that because traditional computers cannot do this analysis fast enough to give us any help in the immediacy of a battle quantum computers will be able to do that quantum computers will be able to do that quickly we will be able to uh be you know do management analysis in real time in a lot of these situations in in battles in disasters that sort of thing we will uh look at that as we come to uh

to business continuity in more detail um and yes uh you do want to break so we'll have a break uh we'll go to the half hour um so we'll be starting up again um I guess for 10 30 for you guys it's 9 30 for me uh so we'll we'll see in a bit hey uh question has come in when will they be able to do this with these computers um in a sense uh they can do it now there's um uh you know there are computers as I say the the d-wave orions can can do this type of processing the the testbed computers uh that IBM is making available and and a number of the other

uh research test beds um they are uh definitely um able to to do this type of thing it's just uh at the moment the the limitation is how much data um you have to have a um you know a certain number of pivots built into the the computer um in in a sense I mean you know memory is [Music] um convenient in traditional computers it you know it helps us speed up things in uh quantum computers it's absolutely vital because the the processing actually sort of takes place in the memory um and so for example if you want to if we're using the short algorithm to break a an RSA key if you want to break a

thousand bit key and I don't know how many people are still using mere thousand bit keys for RSA but anyways if you want to break it at a thousand bit key you need twice as many qubits so you need a [Music] a quantum computer with 2 000 qubits um you know if you want to break a 4 000 bit rsat you need a quantum computer with 8 000 qubits and the the situation with regard to how big the the computers are these days um I yeah not sure that I have the you know the latest figures on them but I I think that um uh d-wave is is selling their uh processors and of course their

their processors can't uh process you know the shorter algorithm but um their machines which are the biggest machines that are available right now I are selling in the range of 500 qubits for the best of my knowledge um all the other ones are are considerably smaller but um you know for example the IBM uh test bed that is a photo on you know proper uh quantum computer but it's it's smaller so you know it's it's probably on the order of of 100 cubes so now when when will we be able to get computers that have enough qubits for some of this stuff to become practical and useful that is um you know it's a difficult question to

answer um because of course you're you're trying to predict the future and and predict um uh improvements in technology and and how fast somebody's gonna make discoveries that allow us to improve uh what we're doing in in this regard and of course as somebody has said uh you know you should never make predictions especially about the future now um a number of years ago how many years ago was it okay it was um that was five years ago five years ago I made a prediction and I said in 10 years you will at least be able to have a Quantum co-processor on your laptop um so I got I got five years left before I'm wrong

on that prediction the the thing is that when technology you know technology always takes longer to get to uh a threshold of practicality than we expect we always think you know all it's coming soon it's coming soon you know real soon now and it you know but once it reaches that threshold then it takes off and and after that the increases the improvements in that technology are so much faster than we expect so um plan now you know that that's that's why we should be paying attention to this now even though there aren't uh you know these applications that are are useful and practical right now they will be shortly and and when they are they will

come on like gangbusters they're you know gonna be everywhere and if we are not prepared if we are not looking at this technology what it can do what it can't do and what as uh the previous question had uh what the threat actors um can and and will be able to do in in terms of attacking us and and working against us um all of those uh things are going to be happening faster than we imagined um so you know study it now it's it's going to be too late when it finally starts showing up uh you're going to have to be prepared so um okay on with Security Management um now information classification we

kind of dropped the ball on information classification we gave up because uh information classification uh has been a difficult task and and we haven't understood it and and we've known that as you know we got more seriously into uh computer security it wasn't enough just to say you know read write execute access um to to things uh you know and secret top secret we have to actually look at information classification in in a multivariate wave uh we've got to look at the confidentiality requirements we've got to look at the Integrity in the clients we've got to look at the availability requirements you know what you know that should be going into our information classification we were

already falling down on a job and so most people just gave up well you know everything's secret or or it's not secret or or we don't care we don't really know you know it's company confidential is about as close as we'll get to something and that's not the data itself that's you know the end result of some kind of report so um but pattern matching uh with quantum computers will allow us to do much faster and much more intricate information classification we you know we will be able to look at individual pieces of data and assess quickly you know the computer will be able to to do this for us in terms of of indicating you know how this

information should be protected and in what ways so um you know in quantum computers uh we'll probably bring back our ability to usefully do information classification um now there's there's another thing and this goes back to this question and when will we be able to do it with these computers um we're gonna have to do a risk assessment ourselves and this is a risk assessment you know this can be quantitative this is not um something that we have to uh do an awful lot of uh processing on you know I mean we can we can figure it out from uh you know scenario based qualitative risk analysis are we going to invest in Quantum Computing is our company

going to invest in Quantum computing we need to do those you know do that analysis we need to look at those risks if we don't get into Quantum Computing are we going to be left behind are we the ones going to be the ones making buggy weeks when everybody else is is you know has put the money in put in the time to look at Quantum computing and and we're not you know we're still struggling uh trying to do our risk analysis trying to do our our Security Management trying to do our information classification um also you know are there threats yes as have been asked before what are the threat actors doing with Quantum

um you know are there threats to our business that uh are going to be enhanced with Quantum yeah are they going to be new threats to our business because of capabilities that this is going to give threat after it and that they will be able to attack Us in in new ways you know we will talk about some of those but you need to look at your business and think about it you know what um what kind of time do we need to do in terms of analysis of both the benefits to us of of quantum Computing the risks to us of not getting involved in Quantum Computing and the threats that are going to come along because

so we're gonna have to we're gonna have to look at that now security architecture um there are going to be completely new architectures here I I mean you know we are already in uh situations where uh the architecture is a mess um we have uh you know multiple devices networked together connected to the internet um we've got bring your own device situations we certainly got an awful lot of work from home situations that have increased here with regard to the pandemic um you know internally our machines are looking at you know multi-core processors uh we are looking at um uh threads and you know our our operating systems are uh incredibly complex we you know we used to be able

to at least understand what was going on in uh the internals of of the machine nowadays boy you you know you've got to know so much in terms of the internals uh these days and and we're having you know we've got race conditions happening within our own computers and anytime you've got a race condition happening you've got instabilities you've got you know possible vulnerabilities there so you know we've got all of this happening already with our traditional computers and now we're going to be throwing a completely new architecture into the mix um you've got to look at this in in terms of the vulnerabilities that that is going to introduce it's going to be very complex

um we are you know probably going to have to be looking at more uh formal analysis of our architecture than we did in the past because of the complexity that we're going to have with it a mix of uh Quantum and traditional computers in in our workplaces as as this comes along so uh you know we're we're really going to have to do some analysis in that but quantum computers will help us out they will provide for simulation of the vulnerabilities and protections so you know we we can then look at the vulnerabilities and and quantum computers will be able to uh with with simulations um show us which of the protections are going to be most useful to us

um we're going to see situations I um Quantum devices are very very subject to to noise and error um so uh well the d-wave computers they've been uh their error checking is actually voting um they just run the process multiple times and you know see which processes you know which results agree with each other and that's the answer that they take type of thing that's not a terribly sophisticated way of of doing error checking um we are though looking at uh and this can be helpful in terms of resilient Computing um Quantum error detection this is a a recent development a new field of research um they are uh looking at you know how Quantum devices can themselves detect

their own errors um internal to the architecture and uh therefore you know correct uh fears before we you know you know start polluting our our data and our processing uh so you know fault tolerant Computing is is um going to benefit when we have developed that uh error correction um access control as I mentioned uh Biometrics um uh pattern matching is is going to make this much more accurate we are going to have uh biometric Access Control devices that are a lot uh better or are doing better matching um our data representation is is going to be better our uh data reduction I'm not sure whether you know how much more uh data will do

but we will be able to process that data faster and definitely much more accurately Google you know this evening much better in all areas of Biometrics so that you know that pattern matching is really going to help us out there but there's other areas of Access Control the information flow and covert Channel analysis least path and simulation capabilities with quantum computers are definitely going to help us there you know very seldom do we do we see uh major you know nation-state actors Military Intelligence people uh you know we we don't see companies doing an awful lot of information flow analysis and then covert Channel analysis uh for a lot of using three you know um

it's time to Market and you can use get something out there you know a covered Channel it comes up well you know you deal with it when somebody detects it or starts exploiting it um but doing uh the analysis in in advance is is just too hard these days well you know quantum computers with with obese bathroom simulation functions are going to be able to make it uh much easier to do intrusion detection this is something that's uh you know we we usually find after the fact you know it's it's something that we realize that something's gone along if somebody is careful and doesn't nest with our systems are we're not you know we're probably not

going to depend an intruder somebody can get in somebody can look around our our places you know as long as they don't mess with anything then they get out with a bunch of our data and it's only you know six months later when they come out death threaten us with disclosure that that we have any idea uh that it happened huh but uh you know a pattern matching capabilities are are going to allow us new tools and intrusion detection is is one that we'll see a few more uh as we go through these various things now cryptography we've already talked about uh Quantum cryptography and the uh the parallel decryption the universal decryption [Music] um

we are uh you know looking at that and and that's that's sort of interesting but there's more work here um now for one thing um this business that you know RSA is is going to be attackable uh eventually um when uh Quantum mediators get bigger um that is uh you know something that they're trying to address and they are looking at new algorithms uh which are not crackable by either traditional or Quantum uh computers uh it was interesting um in the past couple of weeks one of the candidates for this um you know a new form of algorithm uh was released for you know a first crack and you know people having it an attack on it and and the thing was

broken so easily uh so it you know this is this is non-trivial uh work that has to be done here but uh you know the work is going forward there's still on a number of candidates that are you know you know in in the Pipeline and we will see what you know there's there's some good ones out there show some some good prompts so we'll deal with that but you know Randomness Randomness is vitally important cryptography um you know here's uh it's over in our random number generator are you sure that's random that's the problem with Randomness you can never be sure that's a very a very uh deep idea there and anyways um the the generation of random numbers

is too important to be left to chance as somebody has said uh you know random Randomness random numbers uh that is vitally important to encryptography and we you know we need that and it's been very hard to do because we cannot uh algorithmically you know there's no program we can run to generate a random number we have to you know do other things well we can't do it you know in in terms of an algorithm with points on computers but because of the noise and and because of certain functions that we can actually set up and and process there we can actually Generate random data with Quantum devices uh we can you know set up situations

where you know fifty percent of the time it's going to return at one fifty percent of the time it's going to Return To Zero we can even buy us some of these things so that if we already have something that's uh uh you know giving us random data but it's a little bit by you know it's giving us too many ones it's giving us too many zeros we can tune a a Quantum device to balance that and so now we got you know Randomness from our our you know biased Source we've got Randomness from our uh uh Quantum source and and we get a good you know balanced uh set of random data out of that

um so uh that you know here is is something we're really in a quantum uh Computing Quantum technology uh is going to give us a lot of help in terms of cryptography and it's always the implementation details when you go to attack a a crypto system you go after the implementation and so you know simulation is going to allow us analysis of implementation problems that are much more accurate and much faster basis that has been now you know it's it's not you know when when somebody goes in a you know does an analysis of an algorithm it's it's not you know is is the algorithm that they're attacking you know they can but they can have a perfectly good algorithm

put it into you know a problematic implementation and at that point the uh uh the people who are doing uh be implementation well it doesn't it doesn't matter if the algorithm is solid if the implementation has a fault unit uh you know we're we're toast in terms of the cryptography and it's you know this is what the the quantum commuter will give us is the analysis of the implementation problem uh and that's not an area that we have been you know seriously looking at except for you know somebody exploits it oh yes okay that was an implementation problem so uh open yeah uh uh open SSH now uses the ntru prime uh algorithm which is

believed to resist the tax enabled by quantum computers as well as traditional computers so uh you know they they are something promising uh algorithms that are coming out here good stuff now physical Area physical security and again you know physical security is one of the areas that we uh tend to wonder you know do we really need to to look at this and the answer is yes but anyways um all kinds of issues here um first being we are going to have to protect these computers in different ways um part of the problem with uh errors in Quantum devices is noise radio frequency interference electromagnetic interference um that uh quantum processors of all things are just you

know really really susceptible to these disturbances they're very sensitive and the uh you know so we're gonna have to have special protections um temperature is is one of the things when we are uh running uh say d-wave devices in the Orion device [Music] um room temperature is a hundred times greater than the temperature of interstellar space but when the d-wave Orion computer uh is is operating Interstellar space is a thousand times hotter than the core of the Orion device that's that's the temperatures that we're dealing with with these things and and there's other you know that is one technology there are other technologies that may operate at room temperature but are susceptible to other uh areas um light uh physical

disturbances in all kinds of things that we have to deal with in terms of the physical protection of these processors right now so you are going to have to you know make sure not just the building doesn't burn down but others so there's special costs going to be associated with that there's going to have to be special protections for devices but again you know why did it take some one-handed it gives back with the other physical Access Control Biometrics for physical access control is going to be a lot easier a lot quicker a lot more accurate because of the pattern matching with the biometrics so okay on to business continuity planning um and you know what do we do first

business impact analysis what areas of our business are you know the areas that we need to protect them up so Louise path analysis is going to help us with that with uh you know areas and and with the analysis itself as we start setting up scenarios as we start uh looking at the risks in in various areas you know at least math analysis function that uh all quantum computers are going to give us is really going to help us with with that area and then there's the testing of the business continuity plan once we've developed our plans are they good enough simulation is going to help us there you know is this uh the the right way to do it

uh now I I mentioned back when we're talking about um Security Management and the uh the management involved there the the real-time analysis when we are looking at disasters again in the same way that this U.S Navy Captain was talking about the Battle management um when uh we're looking at disaster management but we have to do this planning right now in advance we do not know the the traditional computers cannot give us these answers fast enough we we need to look at them in advance run the the simulation because a disaster is happening in real time so if the disaster doesn't follow the path that we predicted our Advanced planning we we you know may

already know well it's you know it's gone bad but we don't know how much and and we can't fix it because we can't do that analysis fast enough well with the simulation with with Quantum computing's ability to take all that you know we put it all in there then we can just tweak the the changes that we are seeing as the disaster unfolds and actually do real-time analysis and real-time redirection of resources we you know that will change the nature of our management during a disaster during a crisis we won't have to rely on Advanced planning as much anymore we we will be able to to modify things to reflect the latest data too to direct our

uh our activities because of what is really happening in real time and that I find that incredibly exciting and I uh have been involved in emergency support services and Emergency Management for a number of years and you know it's this is always an issue where you can actually save lives you certainly can reduce suffering you know if you can manage the resources better in a disaster and you know I I you know from my perspective this is this is the most exciting area uh personal bias but I you know you really can't save lives and heal people and produce suffering so again disaster management direction of the resources to maximum effect um we will have to

uh consider what we're going to do for these special devices this is uh you know these are unusual devices um uh you know in physical security we're talking about you know the temperature and and interference and those sorts of issues but with some of these devices um for example there's uh some of the things where your CPU is is electrons balancing in the troughs of intersecting laser beams and if your power fails in a situation like that you don't just lose you know a few minutes or hours of uh of processing you lose your CPU you lose your your quantum computer you know you have to wait and for you know I mentioned advantageous situations to

to recreate it again uh so you know we're gonna have to look at that in terms of continuity of operations if if this is important to us um if we are doing real time disaster management with a quantum computer we better make sure that quantum computer is going to keep operating for us so you know either it's it's well out of the way of the disaster in terms of regional disaster uh and in that case of course we we need to you know think about what we need to do in terms of communications um you know or we have multiple devices so that if one goes down um you know we've still got it back up

so uh things that we have to consider in terms of our business continuity with respect to one of them application security uh and of course you know this is this is a huge mess for us uh you know same way as the architecture our our applications are growing expanding we're pushing them faster we we need to do testing but how do we do testing how do we do this in accurate I mean how do we do testing fast enough to to give us useful information this is actually a uh from the military uh the sort of outlines there their plan for uh the testing part of software development and and so you know here it

is you know software testing at a glance or to you know it's you know it's so so complex here here okay it's it's very complex so we need a tool like at quantum computers that can through simulation give us an edge on on what's going to happen with this thing is there going to be a problem so yeah testing simulation is is useful going to be very useful in in that regard and of course why uh quantum computers can do it much faster much more accurately than we can do it with traditional computers we are not good at simulations

um database analysis I mean really depressing there's a book um what was in 1992 it said research directions and database security to this day um only one of the the the problem of uh entrance attacks we are starving to get a bit of a handle on that in terms of uh differential privacy but differential privacy is is something that people are only just starting to study this you know uh right now I regardless of what Apple says in there doing it in terms of differential crisis not well down the road but you look at you know Apple making a big noise of a differential privacy and then you look at what they're doing that they

say is coming out of differential privacy it may be simplistic stuff so we uh you know aren't are not developing very far very fast in terms of all the problems with database security so database analysis pattern matching here that you know quantum computers are going to give us you know some real Tools in terms of figuring up and and of course looking at the cost in terms of privacy versus the benefit in terms of safety but you know look at things like the pandemic we had the um uh vaccine registration vaccine cards vaccine passports and you know people were saying what uh you know what are we giving up in terms of privacy what's the cost of having the

vaccine pets versus the the safety that it provides in terms of having everybody and knowing who is is uh inoculated and protected and who can be allowed into a situation we can uh again the you know the this type of analysis is is not something that we have been able to do quickly not quickly enough you know we could do an analysis but it's going to take years by which side effect is over um database aggregation problem analysis A game pattern matching and simulation help us out there um you know we've database aggregation attacks and problems are you know they have been around forever as long as we've done data uh so you know at least now quantum

computers will give us a tool to help with that analysis to look at issues in regard to that and work on on that area so um now uh artificial intelligence uh really interesting stuff um learning machine learning uh we are running into all kinds of issues you you know about the famous one with Microsoft they set up some Twitter bot which within hours developed into this foul mode uh uh jerk basically uh because of the the machine learning it was doing what it was doing was was figure out everybody on on Twitter is a jerk matching itself to that type of activity really interesting stuff when we're doing machine learning um we need some way to check that

neural Nets are an interesting one and you're on that a different you know way of looking at machine learning a specific area um and we are you know using those types of machine learning using neural Nets using these types of analysis to try and get new results that we couldn't do other ways so how do we test that they are in fact doing the right thing neural Nets um are very subject to what's known as superstitious learning they they learn relations that don't actually exist um I will give you an example of this if you talk to uh emergency room workers police ambulance attendance nurses doctors anybody who works in that environment they will tell you that on the night of

the full moon everybody goes crazy and this is just yeah it's a known fact that uh you know full moon is out you got the nachos the the thing is when you look at actual data it's not true but what happens is when if you were an emergency room worker uh that you were going crazy one night there you know all kinds of crazy things are happening and you finally get two minutes to go out and catch your breath and you walk outside and look up and there's the big full moon and you think oh of course reinforces the idea that full moon crazy people if it's a crazy night and it's not a full moon you don't notice anything

if it's a regular night and it is a full moon you don't notice anything so this is a self-reinforcing and and the same thing happens with neural Nets you know we do it neural Nets do it too they they learn superstitions the same way that we do and we don't know when we're setting up a neural net if it's going to be finding these false relations and building that into the neural net the the more often it encounters something that's it's sort of confirmation bias in in machine learning and uh you know every time it comes across something that looks like this relationship whether it is or not you know it just strengthens that um

uh that relationship that that isn't a relationship and Alan Earl is there you know when we we write programs that learn it turns out that we do and they don't uh and that's kind of you know an unfortunate uh fact of artificial intelligence like but the thing is that um Quantum computing gives us a different way to look at and attack uh these kinds of problems and see if we get the same result you know if we get the same result with neural networks and Quantum computing because they're coming at it from two different directions then we can have a bit more um uh confidence that yes this does work this is uh you know we are getting a

valid answer here um and so Quantum Computing will give us a check against the you know what we can expect we we don't know what to expect when we're using these uh artificial inhabitants programs I mean that's part of the point of having them when we want to find things that we couldn't find in other ways so you know we need other ways to to assess whether or not what we've found is actually a valid result and you know we we can't do that with traditional computers because you know we're going after things that we couldn't do before so yes that's you know let's do this uh let's work on this Let's uh use the the quantum computers

and and the results that they are getting and check other things and and use neural Nets to check what we're getting out of the quantum computers as well so we're gonna have to grab uh so we're coming up to a break any any questions uh you know sorry firing questions into the moderate or something require some questions of me um malware net detection uh the pattern matching that we can do with quantum computing uh gives us uh you know better detection of malware you know how do we determine malware now ultimately this is an unsolvable problem but you know this gives us another tool that gives us a better chance of of finding more of this

stuff uh botanists Bond net operations that are going on in in our networks using our Networks using our computers and forming their own Networks you know what type of detection can we do on that again you know pattern matching is is going to give us better tools with regard to that and it's really interesting to look at the uh the botnets particularly looking at the the operation control and ownership it's um it's very fluid and uh what you think is a a single block that does seem to be under uh the control of a bunch of different actors that um again this analysis is going to be much better much more accurate with the assistance of of

quantum computers without pattern matching what they can do um can allow us to track the uh the ownership the management how these things are actually running and when we know how they are being managed of course we can interfere with that management and therefore uh you know probably take down uh more Nets um at the very least identify them and and identify the input from so um you know again uh this will give us additional tools um for greater accuracy in this kind of analysis uh and greater ability to uh to deal with these things but uh we are going to have completely new paragraphs and you are uh not you know we we've already got uh

things between the procedural uh you know good old traditional uh basic programming or or Fortran or something like that and of course all that object oriented uh stuff and and all the variations that are going on here so we've got you know those differences in in different kinds of Parts you're going to have to think completely differently in terms of of quantum Computing again the IBM test bed is a very good uh way to get some experience there going and get yourself an account on that system and start playing with it start toying around with it and seeing what how you have to think about programming because it's it's going to change you know it's

we already have the changes we've got the different uh uh paradigms that that we're working under uh right now um and this is going to have to give us completely new ones and then of course you're going to have to get used to dealing with you know uh functional computers and object-oriented tools and uh quantum computers and how they they work and think um this is I I mean if you if you look at artificial intelligence um this is uh something that becomes blindingly obvious um it's uh it's it's not just uh you have to learn different commands when you were going from procedural to object-oriented program you have to start thinking in a different way and you know when you're

it it becomes much clearer when you move into artificial intelligence programming and the languages that they use that are also different there most of the languages particularly for expert systems um you know we've got Loops of all kinds in most of our procedural languages you've got no Loops in expert system languages uh you look at something like prologue you know there's there's no loots there's no case structures there's no go-to's there's no four um it's it's it's dropped through programming and you have to think that way you you know if you are going to be successfully dealing with those kind of applications in those kind of languages in those kind of environments you have to develop new

mindsets new ways of thinking about it and and it's very difficult to switch from one to another you know um people who who move into object-oriented programming do not want to go back to procedural people who uh you know are working in uh expert systems do not want to go into object oriented situation uh it's it's just you know too difficult having to re-orient your mind to how you need to think in order to get those things done so having dealt with that we will take another break here uh go to uh 11 30 for you guys uh 10 30 for me and and then we'll get into operation security and somebody good stuff there I'm still not seeing

any questions here so hopefully uh this this stuff is reasonably clear see you in a bit

foreign

coming along so uh hopefully that's a good sign and not a bad sign um finding myself a little bit out here by myself in this one but anyways uh on to operation security uh we uh as as mentioned previously in uh in terms of architecture the combinations of of traditional and Quantum devices and operations is is going to create complexity and of course complexity is the enemy of security always always so uh you know we're gonna have to be dealing with uh weirdness is enough in terms of troubleshooting but you know we we are going to have uh some serious issues with regard to uh whether or not um uh this introduces new uh vulnerabilities

new exploits you know you know somebody else figuring out our systems before we do uh now again it's uh on on the one hand yes uh it's gonna create problems with troubleshooting but it's also giving us tools for troubleshooting the uh simulation side there uh is going to allow us new ways of of looking at our systems finding uh the the problems uh quickly and and probably more accurately than than we do now um so again you know tools involved there that that are going to help us as as well as uh the tools themselves giving us new problems uh an interesting uh one here the the only Insider attack um and that which has always been the

problem and and certainly um uh Quantum Computing is not going to be a Panacea for it but again the issue of pattern matching we should be able to find uh patterns of Insider attack actions the the precursor uh precursor operations you know what what is it that this person is doing that is common to people uh who have you know gone bad and uh you know become The Insider attacker um in the past so uh again you know tools here that help us with these uh intractable problems um same as as malware detection same as intrusion detection you know all these different types of attacks that we cannot uh ultimately deal with 100 but you know

another tool that gets us closer that gives us more that that can maybe uh give us an alert quicker so that we can head off some of the damage that The Insider can do so into uh telecommunications and and networking and and some of the stuff we've already looked at the the intrusion detection systems we looked at that in terms of access control as as well so intrusion detection systems Network intrusion detection uh botnet detection and assessment we talked about it in terms of application security looking at the command and control looking at the ownership uh particularly in regard to fast flux networks that uh change themselves very very quickly that that set up an attack

and and tear it down uh before we can respond to it you know if we have Quantum Computing analysis tools that can do this detection and assessment we may be able to get real-time reaction accurate reaction to block net type attacks in in various ways uh and and certainly you know in terms of network attack analysis we should be able to get much more accurate information about how uh these attacks progress uh what constitutes an attack how we can identify them um you know all of this uh the the various tools of uh Quantum Computing are are going to uh assist us in in this regard uh spam you know we we have not been

able to eliminate spam um uh you know even Bayesian analysis that that was going to be the big thing at one point you know that that was gonna solve spam probably well it hasn't you know I still get spam you still gets man everybody still gets spam uh but you know yet another tool uh in terms of spam detection uh identification new tools looking at pattern matching uh different types of different ways to to figure out what it is that's that's going on here um now uh Quantum encryption requires special channels like I said uh the Quantum cryptography dedicated single mode by rocket cable you know let me get into that you're gonna have to have this stuff and it's it's

delicate and uh weird stuff to work with uh but Quantum devices are for the foreseeable future you know as you say you know uh are the threat actors anyway no there's not enough uh so there's you know it's going to be uh time sharing again yeah back to uh using somebody else's computer and and not just in terms of the cloud you know these are you know a few specialist devices and they are going to need remote access and we are going to have to be very careful about that in particularly in regard to some of the initial tasks for these computers that are going to be very sensitive information they're going to be we're going to be testing them out

with intractable problems and and you know when they get uh Solutions results out of these things you want to have that information quite confidential so all kinds of issues with regard to telecommunications and networking that they are going to uh need to address uh I mean we we know how to address remote access we're just you know it's going to be more of a requirement for the next little while as these devices are uh you know Limited in in number and uh in distribution and people are going to want access to them um networking though itself is is going to be interesting here um yeah some of this Quantum stuff is is has implications for

uh networking and Communications um sending single photons they they are able to apply uh various uh kinds of coding two uh these entities and uh in in one case uh you know as I say more than one bit for per photon one one photon in in one test was sent carrying an updated for a small graphic about 128 bits I believe was was what they did so you know one proton carrying all that information um and then there are well there's the you know we talked about the continuous variability right at the beginning in terms of the qubits um are we going to be able to create uh you know analog photons that's that's a

weird concept a quantum and and the breakdown of the distinction between Quantum and well I mean Quantum itself up until now has been used for uh a you know stepwise um uh distinction in in data you know if it was quantized Data it had you know steps to it and you know now we're talking about analog quantum it's you know like I say you know this stuff will make your head hurt if you get into some of it so um but there you know there are ways it means that they're doing it and and they're already talking about Quantum networking um mostly with regard to the error detection and correction which again we talked about earlier

um but uh they are talking about um the necessity for tying together the uh uh the parts of the processors uh with regard to you know all these qubits that all have to talk to each other somehow uh you know there's a passive entanglement and sometimes with other means um but at that at the moment we in in some situations reaching the limits of what you can do how many qubits you can get to talk to each other and so now we've got to network these um clusters of qubits so that we can get a uh device that works as a full quantum computer so you know all kinds of issues of networking that there's going to be

networking going on inside the machine inside the CPU of some quantum computers uh so um you know Quantum networks and and some people are announcing this and um they they talk about you know Quantum networks and my immediate reaction is is always you know what okay what's the application what are you going to be able to do with this thing uh Quantum local area networks um is is as I said you know engineering a solution to the the mesh connections that need for uh these massive numbers of pivots in order to build a computer so are we now building a distributed quantum computer not a a quantum computer itself um it that is is going to have

implications for what we are going to be able to do and how and so on into law and investigation um this is going to give us new forensic analysis tools uh again the pattern matching and simulation uh that's going to be involved there is is definitely going to uh provide us with with new tools here but what are we going to do with that in court you know remember when you are dealing with technical evidence in court you are dealing with two lawyers who may be very nice and intelligent people um but they they are not specialists in the technology they are specialists in the law and a judge who is by definition you will remember an old lawyer

and 12 people who were too stupid to think of a way of getting out of jury duty you know so taking this really sophisticated technical material and trying to present it in court so that you can convince all of those parties just identified and give them enough information so they can decide whether or not this result actually means you know this person is guilty of this person whatever it means you know or this happened or it didn't have whatever it is that's going to be a problem it is going to be considerable wrong of course uh you know using these tools we can we can have the tools we can come up with a result

which to our satisfaction guilty or innocent or whatever it may say but how are we going to present that in acorn anyways I um am a little bit ahead of the game here uh sorry about that uh the lack of the demonstration uh didn't help um and it's it's always uh a little bit weird when you're not getting any feedback on these things but uh any any final uh questions before I I take off here I hope you are all enjoying besides Calgary and particularly those of you who are there