Title of the course

Training Workshop: Integrating Quantum Concepts into Cybersecurity

Indication of the desired length of the course

A Full Day Course

One to two paragraphs of introductory text about the course.

The potential for realising quantum based networks and distributed systems has now been realised through reports of networks in excess of 2000km and commercial quantum based private communication networks reported as complete. Quantum based cloud services are now under development on a commercial basis and a quantum based internet is proposed for the future. Associated with these and other developments in for example, types of computer, programming paradigms, operating systems, and event ordering, issues emerge as new quantum concepts are integrated into the cybersecurity landscape.

 

In this workshop, aimed primarily at researchers new to quantum concepts, we consider a range of underlying concepts employed in the development of ‘secure’ systems for both classical and quantum based networks and distributed systems. From a quantum perspective we will discuss different types of qubit, qudits, superposition, discrete and continuous states, multipartite states, mixed states, entanglement, gates and measurement and their incorporation into the cybersecurity environment.

 

Research in quantum distributed systems and networks is now said to be in its second wave developing the potential for applications in, for example, satellite communication, quantum based resources and secure communication. 

Identification of any prerequisites for the course

            Elements from linear algebra (vectors, matrices, … )

Identification of any textbooks for the course

            The course will be self-contained though we will reference where appropriate.

 

Required Equipment

            Attendees should bring a laptop.

 

 

Outline for the Training Workshop.

We propose to compare and contrast classical and quantum communication systems with a view to identifying similarities and differences that exist between the two, to present a selection of advantages and disadvantages in employing such paradigms and to consider a selection of vulnerabilities from each, within for example an attacker defender perspective. From a hands on perspective we seek to present a selection of activities that participants can engage in, in order to develop and extend their understanding in working with quantum systems

1.    Introduction (ppt)

a.    Overview

b.    Assets, Motivation, Attackers and Vulnerabilities

c.    A comparison of Classical and Quantum States

d.    Reversible and irreversible Gates

e.    Activity 1    a) States and Gates

                   b) Qiskit 1

                   c) Qiskit 2

 

2.    Classical and Quantum Networks (ppt)

a.    Communication Channels

b.    Activity 2a Threat models – Communication Channels

c.    Networks and Distributed Systems (ppt)

d.    Activity 2b       a) Threat Models – Teleportation and Entanglement Swapping

                        b) Qiskit 3

3.    Algorithms

a.    Key agreement protocols (ppt)

b.    Activity 3a

c.    Shors and PQC/Quantum Free Algorithms

d.    Activity 3b

 

4.    A selection of Attack vectors and their Defence (ppt)

a.    Intrusion Prevention and Detection

b.    Quantum Malware

c.    Activity 4

 

Author: Dr William Joseph Spring

Address: University of Hertfordshire, School of Computer Science. College Lane, Hatfield, Hertfordshire, UK. AL10 9AB.

Email: j.spring@herts.ac.uk

Telephone: +44 (0)1707284351

Mobile: +44 (0) 7981830473

 


 

 

 

One to two paragraphs of biographical information about the instructor

 

            William Joseph Spring PhD, MSc, BSc(Hons), PGCE

 

Dr William Joseph Spring is currently a senior lecturer in the Department of Computer Science at the University of Hertfordshire in the UK. As a member of the University STRI Research Centre and School Algorithms, AI and Information Research Groups his research interests include Classical and Quantum Based Security for Distributed Systems, (Cybersecurity, Voting Schemes, Cryptography, Protocols, Risk, Algorithms, Programming Paradigms), Modelling and Problem Solving Strategies, and Quantum Stochastic Theory. His PhD students are engaged in areas relating to the above. He was co-author on the first paper written on quantum based voting schemes.

 

From a lecturing perspective he is involved in a range of modules that include cybersecurity at both the postgraduate level (Distributed Systems Security, Secure Systems Programming, Computational Algorithms and Paradigms) and at the undergraduate level (Quantum Computing, Cyber Security). In addition to his lectures in the UK he has also delivered short courses in India relating to classical and quantum cryptography, and on classical and quantum networks, and to the British Computer Society in the UK he has lectured on quantum distributed systems.

 


 

Membership of Professional Bodies and Learned Societies

 

I am a member of the following professional bodies and learned societies:

 

° AQPIDA (Association of Quantum Probability and Infinite Dimensional Analysis)

° IAMP (International Association of Mathematical Physicists)

° IACR (International Association for Cryptographic Research)

° IMA (Institute of Mathematics and its Applications)

° LMS (London Mathematical Society)

 

 

Public output from research and scholarly activity

 

P. Kandwal, J. Spring, and H. Xiao, Quantum Based Networks, Quantum Cagliari, Soft Computing, 2019, (Pending)

 J. Abegunde, H. Xiao, and J. Spring, A Smart Game for Data Transmission and Energy in the Internet of Things, IEEE Internet of Things Journal, (2019)

A. Febro, H. Xiao, and J. Spring, Distributed SIP DDoS Defence with P4, (IEEE WCNC), 2019

P. Kandwal, J. Spring, and H. Xiao, Quantum Based Networks - Analysis of Teleportation and Entanglement Swapping, Transactions on Collaborative Computing, 2019

A. Febro, H. Xiao, and J. Spring, Telephony Denial of Service Defence at Data Plane (TDoSD@DP), The First IEEE Workshop on Programmable Data Plane (PDP) in the IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World (2018)

Paul Wernick, Bruce Christianson and Joseph Spring, Simulating Perceptions of Security, Security Protocols, 25th, Cambridge, UK, Stajano, F. (ed.), Lectures in Computer Science, Springer Verlag, (2017)

J. Abegunde, H. Xiao, and J. Spring, A Dynamic Game with Adaptive Strategies for IEEE 802.15.4 and IoT, IEEE Trustcom (2016)

J. Abegunde, H. Xiao, and J. Spring, Resilient Tit-For-Tat (RTFT) - A Game Solution For Wireless Misbehaviour, IEEE Xplore, (2015)

J. Abegunde, H. Xiao, and J. Spring, A Resilient MAC Protocol for Wireless Networks, IMA Conference on Game Theory and its Applications, (2014)

W. J. SPRING, A Quantum Stochastic Calculus, PhD, University of Hertfordshire, (2012)

W. J. SPRING, Multidimensional Quantum Stochastic Integrals, Quantum Communication, Measurement and Computing (QCMC), AIP Conf Proc., vol. 1363 , AIP. (2011)

W. J. SPRING, Multiparameter Quantum Stochastic Processes, QPRT 30, Quantum Probability and White Noise Analysis, (2010)

W. J. SPRING, Multiparameter Quantum Processes over the Clifford Sheet, International Journal of Pure and Applied Mathematics, (Invited), 49, (No. 3), (2008)

W. J. SPRING, Quasi-Free Stochastic Integrals and Martingale Representation, (CCR), Quantum Probability and White Noise Analysis, 23, (2008).

Vaccaro, J., Spring, W J. & Chefles, A, Quantum Protocols for Anonymous Voting and Surveying, Physical Review A, 75, 012333 (2007)