THE UNIVERSITY of EDINBURGH

DEGREE REGULATIONS & PROGRAMMES OF STUDY 2022/2023

Timetable information in the Course Catalogue may be subject to change.

University Homepage
DRPS Homepage
DRPS Search
DRPS Contact
DRPS : Course Catalogue : School of Informatics : Informatics

Undergraduate Course: Quantum Cyber Security (INFR11187)

Course Outline
SchoolSchool of Informatics CollegeCollege of Science and Engineering
Credit level (Normal year taken)SCQF Level 11 (Year 4 Undergraduate) AvailabilityNot available to visiting students
SCQF Credits10 ECTS Credits5
SummaryIn this course we cover a broad range of effects that the development of quantum technologies bring on the security and privacy of communication and computation. In particular we consider (i) post-quantum security: security of classical protocols when the adversaries have access to quantum computers or other quantum technologies and (ii) quantumly-enhanced security: when quantum technologies are used by honest parties to achieve better (in terms of security or efficiency) performance. We give an overview of the field, while in each case we focus on selected examples to illustrate how to handle security in a world with quantum technologies.
Course description This course deals with the various effects that developing quantum technologies will have on cyber security. Quantum computing and quantum information theory offers new possibilities (in terms of efficiency and security). Here we examine both the extra attacks that adversaries equipped with quantum technologies can perform and the extra possibilities opened when honest parties use quantum technologies.

The students first will be introduced to quantum information concepts (qubits, mixed states, operations, distance measures) as well as quantum algorithms (factoring, discrete logarithms, search) and their limitations. This will lead to LO1, namely learn the mathematical machinery and the power (and limitations) of quantum information and computation, in view of using these for cyber security.

The second part consists of learning and understanding quantum cryptography and specifically "quantum-key-distribution" protocols, including their security proofs and the how different implementations affect the performance (see LO4). The limitations (practical and theoretical) of quantum cryptography will also be analysed here (including impossibility results).

The third part deals with generalising classical notions such as encryption, authentication and secure delegated computation to quantum information. Introducing students in these concepts prepares them for the next generation of quantum cyber security that is bound to become relevant when large(r) quantum computers are constructed (LO5).

Finally, the last part of the course focuses on classical protocols and their security under quantum attacks. A cryptosystem based on the learning-with-errors problems will be introduced as a (key) example of this possibility (LO2). Furthermore, general quantum attacks (superposition attacks, the quantum random oracle model, etc) will be introduced and students will learn to analyse general quantum attacks on a given classical protocol (LO3).
Entry Requirements (not applicable to Visiting Students)
Pre-requisites It is RECOMMENDED that students have passed Computer Security (INFR10067) OR Research Methods in Security, Privacy, and Trust (INFR11188)
Co-requisites
Prohibited Combinations Students MUST NOT also be taking Quantum Cyber Security (UG) (INFR11227)
Other requirements MSc students must register for this course, while Undergraduate students must register for INFR11227 instead.
Course Delivery Information
Academic year 2022/23, Not available to visiting students (SS1) Quota:  None
Course Start Semester 2
Timetable Timetable
Learning and Teaching activities (Further Info) Total Hours: 100 ( Lecture Hours 20, Seminar/Tutorial Hours 8, Programme Level Learning and Teaching Hours 2, Directed Learning and Independent Learning Hours 70 )
Assessment (Further Info) Written Exam 75 %, Coursework 25 %, Practical Exam 0 %
Additional Information (Assessment) Exam 75%
Coursework 25%
Feedback Not entered
Exam Information
Exam Diet Paper Name Hours & Minutes
Main Exam Diet S2 (April/May)Quantum Cyber Security (INFR11187)2:00
Learning Outcomes
On completion of this course, the student will be able to:
  1. demonstrate their understanding of the power and limitations of quantum computation by evaluating the performance of quantum algorithms and be able to use the basic mathematical formalism for quantum information and quantum cryptography
  2. test whether a classical cryptosystem is secure against a range of quantum attacks
  3. analyse quantum attacks to classical protocols
  4. demonstrate their understanding of the security of quantum cryptography by analysing the security proofs including the effects of different physical implementations
  5. use security notions for quantum information, such as encryption and authentication, in quantum cryptographic protocols and their application to blind quantum computation
Reading List
The lecture notes as main source and as supplementary reading:
Quantum Computation and Quantum Information by Nielsen and Chuang
Quantum Information by Stephen Barnett
Post-Quantum Cryptography Editors Daniel J. Bernstein, Johannes Buchmann and Erik Dahmen
Additional Information
Graduate Attributes and Skills Not entered
Keywordscyber security,quantum cryptography,quantum computation
Contacts
Course organiserDr Petros Wallden
Tel: (0131 6)51 5631
Email: petros.wallden@ed.ac.uk
Course secretaryMrs Helen Tweedale
Tel: (0131 6)50 3827
Email: Helen.Tweedale@ed.ac.uk
Navigation
Help & Information
Home
Introduction
Glossary
Search DPTs and Courses
Regulations
Regulations
Degree Programmes
Introduction
Browse DPTs
Courses
Introduction
Humanities and Social Science
Science and Engineering
Medicine and Veterinary Medicine
Other Information
Combined Course Timetable
Prospectuses
Important Information