Today’s government and private enterprise cyber security executives must address three important, near term quantum computing technology readiness issues:
Defeating Encryption: When is it expected quantum computing technology be deployed to defeat today’s public key encryption and what quantum computing performance metrics must be monitoring?
Post-Quantum Cryptography (PQ Crypto): What options are now available or in final stages of development that can be deployed to make applications safe from defeating encryption quantum computing.
Quantum Computing for Intelligence Gathering: While quantum computing developments for defeating encryption must be tracked so must intelligence gathering applications (artificial intelligence, machine learning, optimization, etc.) are under development and when are these applications projected to be ready for deployment.
Pre-Conference Track Quantum Computing Tutorials
Wednesday, September 5, 2018
1:30-2:30 PM
Understanding “The Very Basics” of Quantum Computing for Non-Engineers
Presented by: Jerry Lucas (Ph.D, Physics) President, TeleStrategies
2:45-3:45 PM
Understanding "Defeating RSA, Blockchain and Today's Cryptography" with Quantum Computing for Non-Engineers
Presented by: Jerry Lucas (Ph.D, Physics) President, TeleStrategies
4:00-5:00 PM
Understanding "Post Quantum Cryptography" for Non-Mathematicians
Presented by: Jerry Lucas (Ph.D, Physics) President, TeleStrategies
Post-Quantum Cryptography (PQCrypto) Sessions
Thursday, September 6, 2018
9:00-10:00
Preparing for the quantum era
Quantum computers will bring an unprecedented computing power to the world.
What are they? How can we benefit from quantum computers? When?
While it is too soon to know the full breadth of applications and implications of quantum computing, one thing is known:
they will decimate the current cryptographic foundations of our information and communication technologies.
The path to designing and deploying new foundations is long and hard, though progress is being made.
Will we be ready in time? Will this be part of our technology lifecycle management (and lead to more robust systems), or crisis management (and lead to weaker systems)? How will this impact blockchains? What can and should we do now? Dr. Michele Mosca, Institute for Quantum Computing, University of Waterloo
1:00-1:30 PM
Integrating Quantum Resistant Algorithms Into Applications
Lessons Microsoft has learned from our prototype integrations into real-life protocols and applications (such as TLS, SSH, and VPN), and Microsoft experiments on a variety of devices, ranging from IoT devices, to cloud servers, to HSMs. I’ll discuss the Open Quantum Safe project for PQC development, and related open-source forks of OpenSSL, OpenSSH, and OpenVPN that can be used to experiment with PQC today. I’ll present a demo of a full (key exchange + authentication) PQC TLS 1.3 connection. This work sheds lights on the practicality of PQC, encouraging early adoption and experimentation by the security community.” Christian Paquin, Microsoft
2:30-3:30 PM
Quantum-Safe VPN Appliance Solutions Dr. Michele Mosca, CEO, evolutionQ Tyson
Macaulay, Chief Product Officer, InfoSec Global
4:00-4:30 PM
NIST Post-Quantum Cryptography Standards Update
In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical phenomena to solve problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break the existing infrastructure of public-key cryptography. NIST has initiated a process to develop and standardize public-key cryptographic algorithms that are capable of protecting sensitive government information well into the foreseeable future, including after the advent of quantum computers. In this talk, I will provide an update on the NIST post-quantum crypto “competition”. Dr. Dustin Moody, Mathematician, NIST
4:35-5:00 PM
Open Quantum Safe Project Update Dr. Vlad Gheorghiu, University of Waterloo
5:00-6:00 PM
Networking Reception
Friday, September 7, 2018
8:30-9:30
Hardware Security Modules (HSMs) Solutions for PQ Crypto
It is important to highlight the need for HSMs to implement the hash-based signatures that are being standardized through RFCs in the IETF along with the likelihood that NIST will adopt one or both of these as a USG standard. There are also challenges that come with this approach including 1) the need to maintain state regarding the number of signatures issued as a critical security component, 2) the key generation process for hash-based signatures may take a significant amount of time, 3) larger key sizes. Also addressed will be protection against timing attacks for hash-based signatures in an HSM. Roberta Faux, Director of Research, Envieta
10:30-11:30
Challenges in securing the IoT in a Post Quantum World This talk will look at what makes securing the IoT such a challenge, even against today's hackers, with a special focus on addressing security at the device level. After a brief review of what the coming of quantum computers will mean to the security methods now used, we will look at the potential crypto tools and what may be available to address future security in the IoT. Louis Parks, CEO, Secure RF
12:00-1:00 PM
A Quantum Future Starts with Quantum Key Distribution (QKD) Today
This presentation will introduce Quantum Xchange’s technology for transmitting data securely over unlimited distances, how this technology that is based on the laws of quantum physics is not weakened by quantum computing or mathematical discoveries and promises unprecedented secrecy, as well as the company’s plans for building the first QKD network that will eventually span the entire US. John Prisco, CEO, Quantum Xchange
Quantum Computing Sessions
Thursday, September 6, 2018
11:00 AM -12:00 PM
Introduction to Quantum Computing, Prototype Applications, and Cybersecurity Analytics
This talk gives a brief overview of the two primary quantum computing architectures being developed currently, describes the D-Wave architecture at a high level, and reviews the growing number of prototype applications developed by early D-Wave users. Finally, we describe some early uses of the D-Wave system for cybersecurity analytics. Steve Reinhardt, Director of Customer Applications, D-Wave International
1:00-2:00 PM
Understanding "Quantum Computing and Artificial Intelligence" for Non-Data Scientists
Data science has been rapidly growing over the past decade, and its applications have become ubiquitous in our daily lives. As these applications consume more data and need faster response times, new technologies and algorithms are needed to meet the computational demands. Quantum computing is a highly promising emerging technology that could present significant opportunities to accelerate the training of machine learning algorithms and improve data science methods Dr. Maxwell Henderson, Senior Data Scientist, QxBranch
2:30-3:00 PM
US Election 2016: Conventional Polling Models Predicted a Hillary 99% Chance of Winning: Not so with a Quantum Computing Model Prediction
This presentation will provide a practical example fo a quantum machine learning algorithm to model the 2016 US Presidential election, showing potential in how quantum computing can be harnessed to advance machine learning Dr. Maxwell Henderson, Senior Data Scientist, QxBranch
3:00-3:30 PM
The 200-city World Capital Traveling Salesman Problem: Python Programming for a D-Wave Quantum Computer Joel M. Gottlieb, Ph.D., Senior Pre-Sales Analyst, D-Wave