1、2022 Mandiant2024 MandiantSecuring todays secrets against tomorrows threatsThe quantum-cryptographic threat landscape19 March 2024Stephen BegleyPrincipal Consultant at Mandiant ConsultingIntroduction01IntroductionOverview of Quantum ComputingQuantum Threats and TimelinesWhat Can We Do Today?Q&A01020
2、30405AgendaStephen Begley-Mandiant UK&Ireland Red Team Lead2.5 year tenure at MandiantPreviously 6 years Big 4 ConsultingPreviously earned a Masters and PhD in experimental Quantum ComputingWho Am I?Overview of Quantum Computing02Quantum computers represent a new paradigm in computing,but are not ju
3、st extremely powerful versions of our current(“classical”)computers:Faster than a classical computer at certain specific tasks In most cases,currently slower than classical computers Good at simulating other quantum systems Also good at factoring large numbers Limited other applications and algorith
4、ms currentlyQuantum Computing OverviewQuantum physics enables a range of other technologies relevant to cryptography,including:Quantum Key Distribution(QKD)Uses quantum-mechanical superposition and entanglement for key generation and sharing Makes it possible to detect whether key material has been
5、interceptedQuantum Random Number Generation(QRNG)Enabled fast generation of large numbers of“truly random”numbersCryptographic Quantum TechnologiesQuantum Threats and Timelines03Asymmetric EncryptionVulnerable to attack.This has implications for:Communications Message and software signing E.g.PGP fi
6、le encryptionSymmetric EncryptionNot vulnerable to attack by quantum computers(with todays key sizes).E.g.AES Establishing and transporting shared keys still a problemHash FunctionsNot vulnerable with currently known quantum algorithms.QCs can speed up collision attacks via Grovers algorithm but onl