Quantum Technology: A next generation solution for secure communication
|
|
- Anabel Green
- 6 years ago
- Views:
Transcription
1 Quantum Technology: A next generation solution for secure communication Abdul R Mirza 1,2 and Francesco Petruccione 1,2,3 1 University of KwaZulu-Natal, Westville Campus, Durban, South Africa 2 QZN Technology (Pty) Ltd, Durban South Africa 3National Institute for Theoretical Physics, South Africa Abstract: Quantum Information Processing and Communication has the capability to revolutionize the ICT sector in the 21st Century, as did the semiconductor-based transistor in the previous century (USA United States of America, Committee on Technology, National Science and Technology Council, 2008). It fuses the laws of quantum physics into the current ICT framework to expand the limits of conventional ICT solutions. Quantum communication is the most advanced QIPC technology. It is driven by quantum encryption or, more correctly, Quantum Key Distribution (QKD): a secure method of transferring encryption keys between two distant parties, thus forming the base for inviolable global communication networks (Austria, ERA PROJECT Quantum Information Sciences and Technologies, 2005). This method of encryption differs from conventional methods in that it encodes data within quantum two-level systems (qubits). One is therefore required to physically measure the qubit in order to retrieve any intelligible data. As the measurement of an observable in a quantum system creates a perturbation in the complementary properties of the system, an eavesdropper will necessarily need to break the established laws of quantum mechanics in order to decipher the data while remaining unnoticed. Many physicists have mathematically proven that QKD is completely secure even if an insecure communication channel is used. This security is further independent of the adversary s technological advantage. Charles Bennett and Gilles Brassard initially developed the technology in 1984 as the BB84 protocol (Bennet and Brassard. 1984). Since then, a global effort has been undertaken in order to bring QKD on par with current ICT technology and mature the technology to an industrially acceptable standard. In this paper we provide an overview of this technology and its current status. Introduction: Conventional Information and Communication Technology (ICT) services the ever-growing need of today s knowledge-based society. Consumers continuously demand for faster, smaller and ecofriendly devices. This has necessitated the higher packaging density of components on computer chips to decrease inter-communication times. With this trend set to continue, the electrons per device will continue to decrease exponentially and are predicted to enter the quantum regime by 2015 (Spiller 2006). In accordance to Moore s Law, this has driven the ICT sector into the quantum paradigm by operating at an atomic scale where coherent quantum mechanical processes begin to dominate the physical properties. Quantum mechanical principles will therefore no longer be negligible in conventional data manipulation techniques. This has created a need for an alternative approach to information technology to provide capabilities beyond what conventional concepts can offer. Quantum Information Processing and Communication (QIPC) limits the technological manipulation of information only by the laws of physics (Corker 2005). Information can therefore be characterized, quantified and processed using the basic rules of quantum mechanics. Exploiting some of the fundamental features of the quantum world, such as Heisenberg s uncertainty principle, superposition and entanglement (Nielsen, 2000), QIPC is an enabling resource for future ICT solutions. Quantum cryptography is the most matured field in QIPC. The process uses a physical encoding of a quantum data carrier to secure communications at an OSI layer 1 level. It has been catalysed by the continuously expanding e-commerce industry, developments in efficient quantum factorization and the fact that quantum cryptography is the only known solution to provide long term data security (Corker 2005). The cryptographic industry has realized the potential threat that quantum computing and mathematical developments pose to conventional cryptography and therefore many leading IT firms (Toshiba, NECTEC, IBM, HP) have invested into the development of quantum
2 cryptographic technology while other companies dedicated to quantum-based technologies (QZN Technology) have been established in the past few years to cater for this emerging market. Various other quantum-powered technologies exist today. A quantum Random Number Generator (RNG) produces random bits as the result of a hardware-based, quantum physical process. This method of generation is therefore independent of the user environment unlike software-based generators commonly in use today. A generator with any form of dependence may be predictable to a certain degree and therefore create a compromise in the security system. Single photon sources and detectors are further quantum-enabled technologies with an extremely high intensity resolution. The devices are designed to produce and detect quantum particles of light (photons). This provides the basis for high precision instrumentation for application in research, sensory, imaging and metrology markets. Conventional Encryption Conventional key distribution routines, such as the Deffie-Hellman method [2], use mathematical algorithms to encapsulate the key bits during its distribution process. In particular, they use oneway functions that can efficiently be computed in one direction but require large resources to compute the inverse function. This makes the decryption infeasible relative to the value of the encrypted data. In the case of public key cryptography, the multiplication of large prime numbers serves as the one-way function. Due to the mathematical nature of the scheme, it is susceptible to decryption through advances in computing power and potential mathematical discoveries. This potentially compromises the future integrity and security of information encrypted in such a manner. Conventional techniques of parallel computing continue to challenge today s communication security standards within reasonable time scales. A prime example of this is the decipherment of the RSA 1024 encryption algorithm in 100 hours by researchers at the University of Michigan in May 2010 (Pellegrini 2010). Further to this, the nature of quantum computers provides an intrinsic capability to efficiently decipher current cryptographic systems (Nielsen 2000). Thus the development of such computing power will render conventional cryptography obsolete. Quantum-powered Encryption Quantum communication, or more correctly named, Quantum Key Distribution (QKD), is a cryptographic primitive for the generation of secure random cryptographic keys. It encodes the key bits using a physical parameter of a quantum two-level system (qubit). In this case, the qubit is the data carrier and hence any form of data retrieval requires a measurement of a physical property of the qubit. As the qubit evolves within a quantum regime, it obeys the respective laws. As the properties of quantum mechanical particles change fluidly when an observer interacts with them, there is no way to determine its complete quantum nature. The measurements of certain parameters of a quantum system create perturbations in the various other characteristics of system. This is known as Heisenberg s Uncertainty Principle and provides an intrinsic physical security for the next generation of communication systems. QKD shifts the security basis away from algorithms towards physical techniques of security through the encapsulation of data in quantum mechanical particles. Any form of measurement by an unauthorized party will result in a change of the qubit. The users will necessarily detect this, thus exposing any eavesdropper. QKD therefore offers secure communication independently of an adversary s technological advantage (Renner 2005).
3 Figure 1: The BB84 protocol is based on the fact that the two polarization sets are indistinguishable if encoded onto a single particle of light. This ensures that if an eavesdropper tries to intercept the communication, she will create errors, thereby notifying the legitimate users. Though there are many different ways to implement QKD, the original procedure that is still use by many platforms today encodes information within the polarization of light. Light is an electromagnetic wave that vibrates in a particular orientation. This phenomenon is known as polarization. A Polaroid sheet is only transparent to light of a particular polarization. This reduces the intensity of the light and may also shift the orientation of the polarization if the light and Polaroid are incorrectly aligned. In quantum cryptography the above principle is adapted for use with single particles of light - photons. The sender, Alice, transmits polarized photons to Bob, the receiver. Alice is able to choose the polarization in one of four options: horizontal, vertical, diagonal, or antidiagonal. The former (horizontal and vertical) and latter (diagonal and antidiagonal) pairs form two bases of transmission as shown in Figure 1. Due to the quantum superposition principle [], Eve, the eavesdropper, cannot distinguish the state of the sent particles with absolute certainty. When Bob receives a photon he randomly measures it on one of the bases. Due to Bob s measurement strategy, he will measure the photons in the correct basis 50% of the time. If Bob chooses the same basis as Alice, he will of course achieve the correct result. In any other case his results will be wrong or right with equal probability due to the superposition principle. This is illustrated in Table 1. Once the transmission of the photons is complete, Alice and Bob compare only the bases used in preparing and measuring the photons. This process, together with error correction and privacy amplification techniques, ensures that all the remaining bits in the key are identical, therefore providing a symmetric key for use in encryption. An unnoticed interception of photons by Eve is not possible since any measurement will destroy, or at the least alter, the polarization of the photon. By verifying the correctness of the final key, the users are able to predict if Eve was indeed eavesdropping. Table 1: If Alice and Bob transmit and measure on a common basis, a deterministic result should be obtained. However, the photon has a 50% probability to be measured in either state if Alice and Bob use different bases. In such a case the photons are discarded, thereby both parties have identical key streams after the completion of post-distribution processes. Alice s States Bob s Measurement Basis 100% 100% 50% 50% 50% 50% 100% 100% Quantum networks In the last decade the industry has witnessed great advances in photonic QKD technology with the research, development and commercialization of automated QKD devices by both academia and the corporate sector. However, these early generation solutions have appealed only to a niche
4 market due to QKD technology's bottleneck effect on the current ICT infrastructure. This is due to the stringent requirements of the qubit. The intrinsic absorption within the communication channel, together with the current lack to regeneration abilities for an optical qubit, has limited the key distribution distance of a photon to a distance of 120 km (Zhen-Qiang 2008) before it is absorbed. Thus one of the major bottlenecks in the commercialization of QKD is the limited spatial coverage that QKD offers. The recent investigations into quantum networking techniques have served to address this issue. Recent efforts have been made in developing QKD networks such as the Durban-QuantumCity project (Mirza 2010), SECOQC (Peev 2009), SwissQuantum (idq 2011) and Tokyo QKD network (Sasaki 2011). The QuantumCity initiative was launched in 2009 and is still currently operational. It is a star-topology network comprising of four nodes and running along the ethekwini municipality s optical infrastructure. The European FP6 project Secure Communication using Quantum Cryptography (SECOQC) project aimed to standardize QKD technology through a cross-platform interface allowing the integration of various QKD systems into one network known as the Quantum Back Bone network. The Durban-QuantumCity project seeks to test the long-term performance of QKD devices in a commercial environment. The City of Durban possesses optical fibre infrastructure that is primarily used to link the vital services of the Municipality [9]. The network is also available to educational institutes, hospitals and other corporates with the vision of providing broadband access to all residents in the City of Durban. The QuantumCity project uses this fibre infrastructure to provide QKD-secured communication between nodes on the network. This is the first time QKD systems have been deployed as a network in a commercial environment for extended periods of time. The QuantumStadium project was an extension of the QuantumCity project. It encrypted the link between Durban's Moses Mabhida Stadium in Durban and the ethekwini s offsite Joint Operations Centre. The system uses a layer 2 encryption process with an AES encryption scheme, but features a quantum-based key distribution system. The quantum communication link secures telephone, internet, video, data and traffic travelling across the fibre optic link at up to 1 Gigabit per second. Global QKD network Such link lengths are typical of a Municipal Area Network (MAN) and the examples have been mentioned above. A QKD solution spanning a global network will however require further investigation. The use of satellite technology in achieving a global quantum secured communication network has been of interest in the past few years. Many feasibility tests have been conducted (Bonato 2009 and Toyoshima 2011) however various challenges still prevent the realization of a ground to satellite QKD link. In this technique the satellites are considered to be trusted nodes. The nodes travel between various MANs creating a global backbone encryption key resource. The satellite network therefore requires an access point at each participating MAN network. The access point will require, further to a robust QKD link, the communication infrastructure to provide gateway functionality to the Metropolitan area. Unfortunately, most feasible sites for ground-to-satellite QKD links are in relatively remote and isolated in their surroundings. Although this ensures better visibility, it lacks the infrastructure to support a commercial global access point. As parallel step to the development of satellite-based global QKD networks, we are investigating the use of the commercial aircrafts network as secure transport mechanism to support the global QKD network. Commercial airliners create an ideal alternate global network for key distribution in terms of coverage, reliability and contact time. Further the airports at each connected city have the appropriate supporting infrastructure to serve as an access point for the MANs to the global network. The QKD process, implemented in the proposed scheme, will occur whilst the aircraft is docked at the airport. This allows a simple fibre-based QKD system is to be used for the key distribution
5 process. Due to the use of a fibre channel, the solution bypasses the additional synchronization techniques required when using a satellite-based network. The frequency and reliability of the link, further enhances the opportunities of this option. The initial systems that are to be used will require the aircraft to be a trusted zone although certified tamper-proofing techniques will be used. The long-term objective is to upgrade these initial systems to contain a quantum memory and an entangled photon source for QKD. As with the satellite solution, this would provide the idea untrusted network scenario. The commercial airliners are to serve as a global link between the MANs of connected cities, as such the airports serve as gateways. Each aircraft will be fitted with a tamper-proof QKD unit in the communications hub in the hull of the aircraft. This is a highly restricted zone and can therefore be assumed a secure location. This unit will be responsible for the quantum-secured key distribution between itself and the sister unit stationed in the respective airport. The secure key management layer, from within the airport building, will then manage the keys. This, in total will provide the access point to the MAN. Information can be encrypted on site and safely propagated through conventional communication networks or the keys sold onwards to the respective clients. Conclusion: It has only during the last 30 years that many of the theoretical and almost unintuitive predictions of quantum mechanics could be realised in the laboratory. Presently, we are witnessing the second quantum revolution, the quantum technology revolution. The miniaturization of technological devices necessitates the manipulation of objects at the nanoscale level, where coherent quantum mechanical processes start to dominate the physical properties. Among the basic tools of the new quantum technologies are quantum information, quantum computation, quantum metrology, quantum communication, and quantum control. Quantum cryptography has been the leading technology in this race. Today it is available as a commercial product to niche markets. Active research is however presently being conducted to further enhance the quality of service of this product to match the needs of the current information based society we live in today. References: Austria, ERA PROJECT Quantum Information Sciences and Technologies. (2005). Quantum Information Processing and Communication. Strategic Report on Current Status, Visions, and Goals for Research in Europe, Innsbruck. Bennett C.H. and Brassard G. (1984). Quantum Cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing. Bangalore. Bonato C, Tomaello A, Da Deppo V, Naletto G and Villoresi P (2009) Feasibility Analysis for Quantum Key Distribution between a LEO Satellite and Earth. New J. Phys Corker D., Ellsmore P., Abdullah F. and Howlett I. (2005). Commercial Prospects for Quantum Information Processing. Thesis submitted to fulfil the requirements of the MBA degree. The Saïd Business School, University of Oxford. idq (2010) SwissQuantum [online]. Available from: Nielsen M.A. and Chuang I.L. (2000) Quantum Computation and Quantum Information. Cambridge: Cambridge University Press. Peev M et.al. (2009) The SECOQC quantum key distribution network in Vienna. New J. of Phys Pellegrini A., Bertacco V. and Austin T. (2010) Fault-Based Attack of RSA Authentication. Proceedings of the Conference on Design, Automation and Test in Europe. Leuven, Belgium. Renner R., Gisin N. and Kraus B. (2005) Information-theoretic security proof for quantumkey-distribution protocols. Phys Rev A
6 Sasaki M et.al. (2011) Field test of quantum key distribution in the Tokyo QKD Network. Optics Express Spiller T.P. and Munro W. J. (2006) Towards a Quantum Information Technology Industry. J. Phys.: Condens. Matter 18, V1 V10. Toyoshima M, Takenaka H, Shoji Y, Takayama Y, Takeoka M, Fujiwara M and Sasaki M (2011) Polarization-Basis Tracking Scheme in Satellite Quantum Key Distribution. Intl J. of Optics United States of America, Committee on Technology, National Science and Technology Council. (2008). A federal Vision for Quantum information Science, Washington. Zhen-Qiang Y., Zheng-Fu H., Wei C., Fang-Xing X., Qing-Lin W. and Guang-Can G. (2008) Experimental Decoy State Quantum Key Distribution Over 120km Fibre. Chinese Phys. Lett
Security Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationRealization of B92 QKD protocol using id3100 Clavis 2 system
Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and
More informationDevice-Independent Quantum Information Processing
Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information
More information10 - February, 2010 Jordan Myronuk
10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States
More informationQuantum Cryptography and Security of Information Systems
Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty
More informationquantum distribution of a sudoku key Sian K. Jones University of South Wales
Games and Puzzles quantum distribution of a sudoku key Sian K. Jones University of South Wales sian-kathryn.jones@southwales.ac.uk Abstract: Sudoku grids are often cited as being useful in cryptography
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More information+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1
Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction
More informationEnigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski
1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every
More informationQuantum threat...and quantum solutions
Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique
More informationQuantum Information Transfer and Processing Miloslav Dušek
Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationNetwork Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices
Global Journal of Computer Science and Technology Volume 11 Issue 12 Version 1.0 July Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:
More informationAn Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009
An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer
More informationWHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION
WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION Based on the discussion during the respective workshop at the ZEISS Symposium Optics in the Quantum World on 18 April 2018 in Oberkochen, Germany
More informationDevice-Independent Quantum Information Processing (DIQIP)
Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,
More informationQuantum Technologies: Threats & Solutions to Cybersecurity
Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017 ID Quantique Company Profile
More informationA New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)
A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationQuantum Cryptography
Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum
More informationQuantum Cryptography. Marshall Roth March 9, 2007
Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and
More informationResearch Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract
Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement
More informationQuantum and quantum safe crypto technologies in Europe. Ales Fiala Future and Emerging Technologies European Commission
Quantum and quantum safe crypto technologies in Europe 51214 Ales Fiala Future and Emerging Technologies European Commission Outline o Future and Emerging Technologies (FET) basics o Quantum Technologies
More informationSecurity of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C
Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used
More informationChapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution
Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation
More informationA probabilistic quantum key transfer protocol
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska
More informationQuantum Technologies for Cryptography
University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =
More informationGround-Satellite QKD Through Free Space. Steven Taylor
Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution
More informationTechnical Report Communicating Secret Information Without Secret Messages
Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,
More informationAsymptotic Analysis of a Three State Quantum Cryptographic Protocol
Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key
More informationCyber Security in the Quantum Era
T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act
More informationResearch, Development and Simulation of Quantum Cryptographic Protocols
http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationC. QUANTUM INFORMATION 99
C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)
More informationSecurity of Quantum Key Distribution with Imperfect Devices
Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo
More informationInformation Security in the Age of Quantum Technologies
www.pwc.ru Information Security in the Age of Quantum Technologies Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes
More informationC. QUANTUM INFORMATION 111
C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i
More informationQuantum Key Distribution. The Starting Point
Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated
More informationThe Quantum Threat to Cybersecurity (for CxOs)
The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.
More informationarxiv:quant-ph/ v1 13 Mar 2007
Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider
More informationQuantum technology popular science description
Quantum technology popular science description 1 Quantum physics, from theory to ongoing revolution In the early 1900s observations were made that were not consistent with traditional, classical physics.
More informationQuantum Cryptography
Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145
More informationSecrets of Quantum Information Science
Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose
More informationDeterministic secure communications using two-mode squeezed states
Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May
More informationCryptography in a quantum world
T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?
More informationDEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.
DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. Ajit Singh 1 and Nidhi Sharma 2 Department of Computer Science & Engineering and Information Technology BPS Mahila Vishwavidyalaya,
More informationSingle and Entangled photons. Edward Pei
Single and Entangled photons Edward Pei War is most commonly thought of as men fighting with their fist, and power is determined by physical strength. Behind the lines, however, knowledge is power. For
More informationarxiv:quant-ph/ v1 13 Jan 2003
Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The
More informationA Matlab Realization of Shor s Quantum Factoring Algorithm
1 A Matlab Realization of Shor s Quantum Factoring Algorithm S. Jha, P. Chatterjee, A.Falor and M. Chakraborty, Member IEEE Department of Information Technology Institute of Engineering & Management Kolkata,
More informationCalculation of the Key Length for Quantum Key Distribution
http://dx.doi.org/10.5755/j01.eee.21.6.13768 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. 21, NO. 6, 2015 Calculation of the Key Length for Quantum Key Distribution Miralem Mehic 1, Marcin Niemiec
More informationStandardization of Quantum Cryptography in China
Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018 CONTENTS 1 Background on Quantum Cryptography
More informationSatellite-Relayed Intercontinental Quantum Network
Satellite-Relayed Intercontinental Quantum Network Rachel Birchmier, Andrew Conrad, Darshan Chalise, Brian Doolittle [Sheng-Kai Liao, et al. Phys. Rev. Lett. 120, 030501 (19 January 2018)] [https://www.sciencemag.org/news/2017/06/china-s-quantum-satellite-achieves-spooky-action-record-distance]
More informationSummary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.
The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer
More information5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes
5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.
More informationarxiv:quant-ph/ v1 6 Dec 2005
Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School
More informationDetection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations
Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum
More informationTrustworthiness of detectors in quantum key distribution with untrusted detectors
Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,
More informationQUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA
QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING: I CAN SUM IT UP IN ONE SLIDE Pure Magic! 2 SERIOUSLY: HOW DOES IT WORK? That s simple: Even
More informationA Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016
More informationAPPLICATIONS. Quantum Communications
SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction
More informationStop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)
Journal of Computer Science 3 (6): 44-49, 7 ISSN 549-3636 7 Science Publications Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Iyed Ben Slimen, Olfa Trabelsi, Houria
More informationEU investment in Quantum Technologies
EU investment in Quantum Technologies ENISA Summer School, 26. September2018 Dr. Gustav Kalbe High Performance Computing and Quantum Technologies DG CNECT, European Commission 2 nd Quantumrevolution: manipulating/exploiting
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More informationA Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol
Appl Math Inf Sci 8, No 6, 769-773 (4) 769 Applied Mathematics & Information Sciences An International Journal http://dxdoiorg/785/amis/86 A Necessary Condition for the Security of Coherent- One-Way Quantum
More informationChapter 5. Quantum Cryptography
Chapter 5. Quantum Cryptography arxiv:1108.1718v1 [quant-ph] 8 Aug 2011 Dag Roar Hjelme Department of Electronics and Telecommunications, Norwegian University of Science and Technology, NO-7491 Trondheim,
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information by Michael
More informationQuantum Cryptography
http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.
More informationAn entangled LED driven quantum relay over 1km
An entangled LED driven quantum relay over 1km Christiana Varnava 1,2 R. Mark Stevenson 1, J. Nilsson 1, J. Skiba Szymanska 1, B. Dzurnak 1, M. Lucamarini 1, A. J. Bennett 1,M. B. Ward 1, R. V. Penty 2,I.
More informationEavesdropping or Disrupting a Communication On the Weakness of Quantum Communications
Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Zhengjun Cao Abstract What is the behavior of an adversary to launch attacks against a communication? The good choice
More informationMassachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.
More informationLecture 1: Introduction to Public key cryptography
Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means
More informationExperimental realization of quantum cryptography communication in free space
Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao
More informationThis is a repository copy of Unite to build a quantum internet. White Rose Research Online URL for this paper:
This is a repository copy of Unite to build a quantum internet. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/98773/ Version: Accepted Version Article: Pirandola, Stefano
More informationEverything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL
Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? Surveillance Problem / Weak Crypto
More informationApplications of Quantum Key Distribution (QKD)
Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,
More informationHigh rate quantum cryptography with untrusted relay: Theory and experiment
High rate quantum cryptography with untrusted relay: Theory and experiment CARLO OTTAVIANI Department of Computer Science, The University of York (UK) 1st TWQI Conference Ann Arbor 27-3 July 2015 1 In
More informationarxiv:quant-ph/ v2 2 Jan 2007
Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1
More informationSeminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of
Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER
More informationarxiv:quant-ph/ v1 27 Dec 2004
Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,
More informationQuantum Key Distribution
Quantum Key Distribution QUT Mathematics Society September 2, 2015 Dr Douglas Stebila Outline 1. Qubits 2. Basic QKD BB84 3. Entanglement-based QKD 4. Classical processing 5. Authentication Security of
More informationAPPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD
2016/2500M-0054 ISSN 1797-3457 (verkkojulkaisu) ISBN (PDF) 978-951-25-2850-9 SUMMARY REPORT APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD Ilkka Tittonen, professor, Department of Micro- and
More informationNotes for Lecture 17
U.C. Berkeley CS276: Cryptography Handout N17 Luca Trevisan March 17, 2009 Notes for Lecture 17 Scribed by Matt Finifter, posted April 8, 2009 Summary Today we begin to talk about public-key cryptography,
More informationUniversal Single Server Blind Quantum Computation Revisited
Universal Single Server Blind Quantum Computation Revisited Durgesh Pandey durgesh.pandey@research.iiit.ac.in Aditya Jain aditya.jain@research.iiit.ac.in ABSTRACT In this paper, we present an improvised
More informationAttacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
entropy Article Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol Michel Boyer, Rotem Liss, * and Tal Mor Département d Informatique et de Recherche Opérationnelle
More informationTwo-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State
Commun. Theor. Phys. 55 (2011) 984 988 Vol. 55, No. 6, June 15, 2011 Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State YUAN Hao ( ), 1, ZHOU Jun ( ), 1,2 ZHANG Gang
More informationUnconditionally secure deviceindependent
Unconditionally secure deviceindependent quantum key distribution with only two devices Roger Colbeck (ETH Zurich) Based on joint work with Jon Barrett and Adrian Kent Physical Review A 86, 062326 (2012)
More informationIntroduction to Quantum Cryptography
Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics
More informationQuantum Information Processing and Diagrams of States
Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University
More informationFeasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography
International Journal of Quantum Information c World Scientific Publishing Company Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography Karl Svozil Institut für
More informationIntrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin
Intrinsic-Stabilization Uni-Directional Quantum Key Distribution Between Beijing and Tianjin Xiao-fan Mo 1, Bing Zhu 1, 2, Zheng-fu Han 1*, You-zhen Gui 1, Guang-can Guo 1 1 Key Lab of Quantum Information
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationPractical quantum-key. key- distribution post-processing
Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert
More informationThe quantum threat to cryptography
The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How
More informationError Reconciliation in QKD. Distribution
Error Reconciliation in Quantum Key Distribution Richard P. Brent MSI, ANU 1 October 2009 Abstract The problem of "error reconciliation" arises in Quantum Cryptography, which is more accurately described
More informationQuantum key distribution
Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles
More informationQuantum Computers. Todd A. Brun Communication Sciences Institute USC
Quantum Computers Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose components are individual
More informationIntroduction to Quantum Key Distribution
Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is
More informationQuantum Wireless Sensor Networks
Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.
More information