A Simulative Comparison of BB84 Protocol with its Improved Version

Size: px
Start display at page:

Download "A Simulative Comparison of BB84 Protocol with its Improved Version"

Transcription

1 JCS&T Vol. 7 No. 3 October 007 A Simulative Comparison of BB84 Protocol with its Improve Version Mohsen Sharifi an Hooshang Azizi Computer Engineering Department Iran University of Science an Technology, Tehran, Iran s: {msharifi, hazizi}@iust.ac.ir ABSTRACT Public key cryptosystems can well become voi with the avent of increibly high performance quantum computers. The unerlying principles of these computers themselves, namely quantum mechanics, provie the solution to the key istribution problem. This paper explains how cryptography will be benefite from quantum mechanics, through a short introuction to classical cryptography, an the general principles of quantum cryptography an the BB84 protocol for key istribution. Then we review a moification to the BB84 protocol that is logically claime to increase its efficiency. We then valiate this claim by presenting our simulation results for BB84 an its improve protocols an show that the efficiency of the improve protocol coul be ouble without unermining the security level of BB84 protocol. Keywors: Cryptography, BB84 Protocol, Quantum Cryptography, Quantum Key Distribution.. INTRODUCTION Although public-key cryptosystems, especially with large an ranomly generate keys, are safe within the context of current technology, they can well become voi when increibly high performance quantum computers come into real existence an use. A quantum algorithm with polynomial time for factorization has alreay been iscovere [], so if quantum computers become a reality, RSA an other public-key cryptosystems woul become obsolete. This is where quantum cryptography comes to the rescue, offering a new solution to the key istribution problem by using the quantum mechanics principles. Quantum cryptography, better name quantum key istribution, allows Alice an Bob to create a ranom secret key base on quantum mechanics an to verify that the key has not been eavesroppe [,3,4]. Quantum cryptography is base on the principles of quantum physics, for example, measurement of photon polarization with incompatible basis moifies the photon polarization. Also one cannot measure simultaneously the polarization of a photon in the rectilinear an the iagonal bases. These facts are the core of quantum key istribution protocols. Various schemes for quantum cryptography have been propose, such as B9, BB84, an EPR [,4]. For brevity, we will consier the well-known scheme BB84. B9 is similar to BB84, an EPR exploit quantum entanglement.. BB84 PROTOCOL BB84 protocol was propose by Bennett an Brassar [5]. Between Alice an Bob two channels are neee: quantum an classical. Alice sens photons to Bob through quantum channel. Then they use classical channel to agree on the same key base on transmitte photons. BB84 Protocol consists of three steps: raw key extraction, key error correction, an privacy amplification. Raw key extraction is as follows:. Alice sens Bob a sequence of photons ranomly polarize. Corresponing Author 04

2 JCS&T Vol. 7 No. 3 October 007. For each photon, Bob ranomly chooses rectilinear or iagonal bases to measure it. 3. Bob announces to Alice his bases but not results). 4. Alice transmits back which measurements are one in compatible bases. 5. Alice an Bob throw away photons measure in incompatible bases, ecoing remaining photons to 0 an that make the raw key. Their raw keys must be the same if no eavesropping has occurre. So, they compare some bits of their raw keys for eavesropping. For security analysis [6], let us assume Eve eavesrops an measures a photon. With probability, Eve s measurement is one in incompatible basis an moifies the photon polarization. Then Bob measures the moifie photon, an photon polarization moifies an with probability become ifferent from Alice s polarization. Thus, Alice an Bob s photon polarization is ifferent with probability * = 4. This means that the probability of successful eavesropping is 3 4. If Eve measures n photons, she oes not moify their polarization with the probability n 3 4) that goes to zero as n grows, therefore her eavesropping is etecte with near certain probability. Error may appear in raw key ue to noisy environment. If raw keys of Alice an Bob iffer ue to environment noise, they must remove all ifferences, proucing an error free common key. This process is calle error correction an various schemes coul be applie [,3], for example D parity check scheme. In the scheme, Alice an Bob organize their raw keys into D square matrix an exchange parities of the rows an columns. Any row or column that has ifferent parities is iscare. To ensure privacy, also iagonals of matrix are iscare. After error correction, Eve may have partial information of the key. Thus Alice an Bob nee to lower own Eve s information to an arbitrary low value using some privacy amplification protocols [,3]. The ata rate an transmission length are two values of interest for quantum key istribution [4,7]. Accoring to quantum bit error rate QBER) an raw key rate, a general formula coul be euce for them [4,7]. The raw key rate is the prouct of the pulse rate v, the average number of photons per pulse µ, the transfer efficiency η t, an the etector efficiency η : R raw = v µηt η Eq. ) The factor is ue to the bases incompatibility. The transfer efficiency can be expresse as: L f l + L B 0 η = 0 Eq. ) t L f is the losses in the fiber in where is the length of fiber, an losses at Bob in B. B km, l L B is internal Two factors may cause errors in raw key, imperfect etector an ark count. Imperfect etector introuce R opt = Rraw popt errors in raw key where p opt is the probability of wrong etection of polarization. R et = 4 v p ark errors arise from ark count photon etection when there are no photons) where p ark is the probability to get a ark count. The QBER is efine as the ratio of wrong bits to total receive bits: Rwrong R Ropt + R error QBER = = Rwrong + Rright Rraw Rraw park popt + = QBERopt + QBERet µ η η t Eq. 3) Tancevski [7] has estimate the fraction of bits lost ue to error correction as: r ec 7 QBER = QBER log ) Eq. 4) et = 05

3 JCS&T Vol. 7 No. 3 October 007 an the fraction of bits lost ue to privacy amplification as: r pa + 4QBER 4QBER ) = + log Eq. 5) So the final bit rate is: R = r ) r ) R Eq. 6) final ec pa As transmission length l increases, transfer efficiency ηt falls rapily own, which in turn causes more errors in raw key an a ecrease in the final bit rate to zero. So the maximum transmission length coul be compute. The first experimental emonstration of quantum key istribution was performe in 989 over 30 cm in air [5]. Since then, the fiel has progresse remarkably. At Los Alamos National Laboratories, secret key have been transmitte in optical fiber over 67 km [8], an up to 0 km in free space [9]. One of the main rawbacks of quantum cryptography though is that it provies no mechanism for authentication. Some rawbacks such as limite istance an limite ata rate are technological an must be solve before quantum cryptography can be use wiely in the market [0]. 3. IMPROVED BB84 Since Alice an Bob choose the two bases with the same probability, the probability of Alice an Bob s basis compatibility is ) ) ) ) + =, so half of the photons are thrown away. Arehali et al. [] has propose an improvement that ecreases iscare photons, thereby increasing the bit rate of the protocol. The basic iea is that Alice an Bob choose the two bases with ifferent probabilities, rectilinear basis with probability α an iagonal basis with probability α, so they choose the same basis with probability: P = α + α) Eq. 7) α which goes to as α goes to zero. This means that Alice an Bob bases of almost raw all photons are the same, so the bit rate of protocol coul be ouble. With the moification, the probability of choosing iagonal basis for a photon is: α) Eq. 8) α + α) which goes to as α goes to zero, so bases of almost all photons are iagonal an protocol coul be efeate because Eve can use the iagonal basis an measures polarization of many photons without moifying them an causes a few error. To prevent the attack, error estimation is refine. In contrast to the BB84 protocol, which estimates a single error rate, two error rates e, e are estimate in the refine protocol: e when Eve uses iagonal basis while Alice an Bob use rectilinear basis, an e when Eve uses rectilinear basis while Alice an Bob use iagonal basis. The final error rate is the maximum of e, e. Now if Eve measures photons along the iagonal basis, although e is zero, e increase about 50%), so the final error is high an eavesropping is etecte. Let us assume Eve measures each photon along the rectilinear basis with probability p, along the iagonal basis with probability p, an oes not measure with probability p p. If Alice an Bob use the rectilinear basis an Eve uses the iagonal basis, Alice an Bob s polarization is ifferent with probability, so e = p because Eve chooses iagonal basis with the probability p. Similarly, e = p. Note that e, e are inepenent of the value of α an only epen on Eve s eavesropping strategy, so the improve protocol is as secure as BB84 protocol. Although smaller α leas to higher bit rate, it leas to fewer rectilinear polarize photons an if number of rectilinear polarize photons is too few, e coul not be accurate. Thus accoring to the number of total photons, the appropriate value of α must be aapte. 06

4 JCS&T Vol. 7 No. 3 October SIMULATION OF IMPROVED BB84 In this section, we present simulation results of BB84 an its improve protocols that inclue comparing efficiency an security. Efficiency means key bit rate an security means raw key error rate vs. eavesropping rate. We simulate quantum channel an photon transfer, implement error estimation, error correction, an privacy amplification. Also we simulate Eve s eavesropping when we evaluate security of protocols. We simulate 300 nm fiber optic that its loss is L B B = km. In the 300 nm wavelength, the efficiency of photon etector is η = 0. 0 an the probability of ark count is p = 0 5 ark. Loss at photon etector L B an error ue to imperfect etector QBER are ignore because their opt values are small. The average number of 7 photons per pulse is µ = 0. an 0 pulses were use in the simulation. 0% of raw key were compare in the error estimation. We have use a 0*0 matrix for error correction an repeate error correction process until no error foun. We repeate the simulation 00 times an euce the results accoring them, so we think that results are reliable. Three ifferent values were chosen for efficiency comparison: 0.50, 0.5, 0.0). As mentione before, the probability of Alice an Bob s basis compatibility is P = α + α) so: α α = 0.50 P α = 0.5 P α = 0.0 P0.0 P0.5 P0.50 =.49 P0.0 P =.936 = 0.50 = 0.5 = = 0.50 = = Simulation results shown in Figure valiate the same conclusion: the ratio of bit rate with α = 0. 5 to the bit rate with α = 0.50 original BB84) is almost.5, an also the bit rate with α = 0. 5 to the bit rate with α = original BB84) is almost.9. For security comparison, the raw key error rate vs. eavesropping rate was compute, as shown in Figure. The curves for ifferent values of α are similar. This means that any etectable eavesropping in BB84 protocol is etectable in the improve protocol. We assume Eve coul etermine pulses that have more than a photon, measure a photon of the pulse an sen remaining photons of the pulse to Bob, so her eavesropping is not etectable. However 5% of non-empty pulses have more than a photon an Eve couln t evise successful attack. Also we assume Eve choose two bases with the same probability. Bit Rate Figure : Efficiency vs. transmission length of BB84 an its improve protocols Estimate Error Distance Eavesropping Percent Figure : Error rate vs. eavesropping rate of BB84 an its improve protocols Eve coul choose the bases with ifferent probabilities; the simulation results of this 07

5 JCS&T Vol. 7 No. 3 October 007 behavior are shown in Figure 3. We chose three values for eavesropping 0%, 50%, an 00%) an for each value, the raw key error rate vs. eavesropping rate were compute. Choosing two bases with the same probability, results in a etectable minimum error rate. Estimate Error Figure 3: Error rate vs. iagonal bases percent of BB84 an its improve protocols 5. CONCLUSION Quantum cryptography offers a new solution to the key istribution problem. Its security is base on principles of quantum mechanics. BB84 is a protocol for key istribution using these principles, but with the eficiency of losing half of the photons when ifferent bases are use. We have reviewe an available refinement to BB84 protocol that coul logically increase its efficiency. The refinement involves using rectilinear an iagonal bases with ifferent probabilities. We have simulate the BB84 an its refine version an have shown facts an figures that in comparison with the BB84, the efficiency of the refine protocol coul be almost ouble without affecting the security of BB REFERENCES [] P. Shor, Polynomial-Time Algorithms for Prime Factorization an Discrete Logarithms on a Quantum Computer, SIAM Journal of Computing, 6, 997. P [] S. J. Lomonaco, A Talk on Quantum Cryptography or How Alice Outwits Eve, Archive, 00 [3] V. Volovich, an Y. I. Volovich, On Classical an Quantum Cryptography, Archive, 00 [4] N. Gisin, G. Ribory, W. Tittel, an H. Zbinen, Quantum Cryptography, Group of Applie Physics, University of Geneva, 00. [5] H. Bennet, F. Bessette, G. Brassar, L. Salvail, an J. Smolin, Experimental Quantum Cryptography, Journal of Cryptography, Vol. 5, 99, pp [6] D. Mayers, Unconitional Security in Quantum Cryptography, Preprint at Los Alamos Physics Preprint Archive, [7] H. Zbinen, H. Bechmann-Pasquinucci, N. Gisin, an G. Ribory, Quantum Cryptography, Applie Physics B 67, 998, pp [8] D. Stucki, N. Gisin, O. Guinnar, G. Riory, an H. Zbinen, Quantum Key Distribution over 67 km with a Plug & Play System, New Journal of Physics 4, 00. [9] R. J. Hughes, J. E. Norholt, D. Derkacs, an C. G. Peterson, Practical Free-Space Quantum Key Distribution over 0 km in Daylight an at Night, Preprint at Los Alamos Physics Preprint Archive, 00 [0] H. K. Lo, Will Quantum Cryptography Ever Become a Successful Technology in the Marketplace?, MagiQ Technologies Inc., 00. [] M. Arehali, H. F. Chau, an H. K. Lo, Efficient Quantum Key Distribution, Archive,

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

arxiv:quant-ph/ v1 20 Jul 2006

arxiv:quant-ph/ v1 20 Jul 2006 Finite key analysis for symmetric attacks in quantum key istribution Tim Meyer, Hermann Kampermann, Matthias Kleinmann, an Dagmar Bruß Institut für Theoretische Physik III, Heinrich-Heine-Universität Düsselorf,

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

Practical Quantum Key Distribution

Practical Quantum Key Distribution Leopold-Franzens-Universität Innsbruck Institut für Experimentalphysik Technikerstrasse 25 http://www.uibk.ac.at Practical Quantum Key Distribution Gregor Weihs Contents QKD Protocols Implementations of

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

ELECTRON DIFFRACTION

ELECTRON DIFFRACTION ELECTRON DIFFRACTION Electrons : wave or quanta? Measurement of wavelength an momentum of electrons. Introuction Electrons isplay both wave an particle properties. What is the relationship between the

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Applications of Quantum Key Distribution (QKD)

Applications of Quantum Key Distribution (QKD) Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security Mehrdad Sepehri Sharbaf Senior IEEE Member California State University Dominguez Hills Computer Science

More information

Homework 3 - Solutions

Homework 3 - Solutions Homework 3 - Solutions The Transpose an Partial Transpose. 1 Let { 1, 2,, } be an orthonormal basis for C. The transpose map efine with respect to this basis is a superoperator Γ that acts on an operator

More information

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Trustworthiness of detectors in quantum key distribution with untrusted detectors Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

arxiv:quant-ph/ v2 23 Sep 2004

arxiv:quant-ph/ v2 23 Sep 2004 arxiv:quant-ph/0409096v 3 Sep 004 MUBs: From Finite Projective Geometry to Quantum Phase Enciphering H. C. ROSU, M. PLANAT, M. SANIGA Applie Math-IPICyT, Institut FEMTO-ST, Slovak Astronomical Institute

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

Quantum Cryptography : On the Security of the BB84 Key-Exchange Protocol

Quantum Cryptography : On the Security of the BB84 Key-Exchange Protocol Quantum Cryptography : On the Security of the BB84 Key-Exchange Protocol Thomas Baignères EPFL - LASEC thomas.baigneres@epfl.ch Abstract. In 984, C.H. Bennet and G. Brassard proposed a new protocol aimed

More information

Alpha Particle scattering

Alpha Particle scattering Introuction Alpha Particle scattering Revise Jan. 11, 014 In this lab you will stuy the interaction of α-particles ( 4 He) with matter, in particular energy loss an elastic scattering from a gol target

More information

arxiv:quant-ph/ May 2002

arxiv:quant-ph/ May 2002 Multiparty -imensional quantum information splitting Anrze Gruka* an Antoni Wócik** Faculty of Physics, Aam Mickiewicz University, arxiv:quant-ph/5 7 May 8PXOWRZVND3R]QD3RODQG Abstract Generalization of

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Experimental realization of quantum cryptography communication in free space

Experimental realization of quantum cryptography communication in free space Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao

More information

TELEBROADCASTING OF ENTANGLED TWO-SPIN-1/2 STATES

TELEBROADCASTING OF ENTANGLED TWO-SPIN-1/2 STATES TELEBRODCSTING OF ENTNGLED TWO-SPIN-/ STTES IULI GHIU Department of Physics, University of Bucharest, P.O. Box MG-, R-775, Bucharest-Mãgurele, Romania Receive December, 4 quantum telebroacasting process

More information

Cryptography: the science of secret communications

Cryptography: the science of secret communications 1 Quantum key distribution a new tool for the secure communications toolbox Richard Hughes Physics Division Los Alamos National Laboratory 505-667-3876; ; http://quantum.lanl.gov cryptographic key transfer

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

EE 595 (PMP) Introduction to Security and Privacy Homework 4

EE 595 (PMP) Introduction to Security and Privacy Homework 4 EE 595 (PMP) Introuction to Security an Privacy Homework 4 Assigne: Monay, February 12, 2017, Due: Sunay, March 5, 2017 Instructor: Tamara Bonaci Department of Electrical Engineering University of Washington,

More information

C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 111 C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i

More information

OPTIMIZATION OF QUANTUM UNIVERSAL DETECTORS

OPTIMIZATION OF QUANTUM UNIVERSAL DETECTORS OPTIMIZATION OF QUANTUM UNIVERSAL DETECTORS G. M. D ARIANO, P. PERINOTTI, M. F. SACCHI QUIT Group, Unità INFM an Dipartimento i Fisica A. Volta, Università i Pavia, via A. Bassi 6, I-27100 Pavia, Italy

More information

Quantum Cryptography with Imperfect Apparatus

Quantum Cryptography with Imperfect Apparatus Quantum Cryptography with Imperfect Apparatus Dominic Mayers Computer Science Department Princeton University Princeton, NJ 08544 mayers@cs.princeton.edu Andrew Yao Computer Science Department Princeton

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The

More information

arxiv:quant-ph/ v2 17 Sep 2002

arxiv:quant-ph/ v2 17 Sep 2002 Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,

More information

Quantum cryptography and quantum hacking. Dr. Lars Lydersen

Quantum cryptography and quantum hacking. Dr. Lars Lydersen Quantum cryptography and quantum hacking Dr. Lars Lydersen GOVCERT.NL, Rotterdam 5. November 2 Quantum Hacking group NTNU, Trondheim & UNIK, Kjeller www.iet.ntnu.no/groups/optics/qcr/ Prof. Johannes Skaar

More information

Security and implementation of differential phase shift quantum key distribution systems

Security and implementation of differential phase shift quantum key distribution systems Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006 Classical cryptography cryptography = κρυπτός +

More information

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/06068v2 2 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum

More information

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Journal of Computer Science 3 (6): 44-49, 7 ISSN 549-3636 7 Science Publications Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Iyed Ben Slimen, Olfa Trabelsi, Houria

More information

ASYMMETRIC TWO-OUTPUT QUANTUM PROCESSOR IN ANY DIMENSION

ASYMMETRIC TWO-OUTPUT QUANTUM PROCESSOR IN ANY DIMENSION ASYMMETRIC TWO-OUTPUT QUANTUM PROCESSOR IN ANY IMENSION IULIA GHIU,, GUNNAR BJÖRK Centre for Avance Quantum Physics, University of Bucharest, P.O. Box MG-, R-0775, Bucharest Mgurele, Romania School of

More information

Quantum Key Distribution. The Starting Point

Quantum Key Distribution. The Starting Point Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated

More information

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits (*) Yoshihiro NAMBU*, Takaaki HATANAKA, and Kazuo NAKAMURA (*) Corresponding author: E-mail address: y-nambu@ah.jp.nec.com

More information

Problems of the CASCADE Protocol and Renyi Entropy Reduction in Classical and Quantum Key Generation

Problems of the CASCADE Protocol and Renyi Entropy Reduction in Classical and Quantum Key Generation arxiv:quant-ph/0703012v1 1 Mar 2007 Problems of the CASCADE Protocol and Renyi Entropy Reduction in Classical and Quantum Key Generation Koichi Yamazaki 1,2, Ranjith Nair 2, and Horace P. Yuen 2 1 Department

More information

Quantum key distribution with 2-bit quantum codes

Quantum key distribution with 2-bit quantum codes Quantum key distribution with -bit quantum codes Xiang-Bin Wang Imai Quantum Computation and Information project, ERATO, Japan Sci. and Tech. Corp. Daini Hongo White Bldg. 0, 5-8-3, Hongo, Bunkyo, Tokyo

More information

arxiv:quant-ph/ Jan 2000

arxiv:quant-ph/ Jan 2000 Quantum cryptography with 3-state systems Helle Bechmann-Pasquinucci 1 and Asher Peres 2 1 Group of Applied Physics, University of Geneva, CH-1211, Geneva 4, Switzerland 2 Department of Physics, Technion

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi

More information

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

Cascaded redundancy reduction

Cascaded redundancy reduction Network: Comput. Neural Syst. 9 (1998) 73 84. Printe in the UK PII: S0954-898X(98)88342-5 Cascae reunancy reuction Virginia R e Sa an Geoffrey E Hinton Department of Computer Science, University of Toronto,

More information

A New Vulnerable Class of Exponents in RSA

A New Vulnerable Class of Exponents in RSA A ew Vulnerable Class of Exponents in RSA Aberrahmane itaj Laboratoire e Mathématiues icolas Oresme Campus II, Boulevar u Maréchal Juin BP 586, 4032 Caen Ceex, France. nitaj@math.unicaen.fr http://www.math.unicaen.fr/~nitaj

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

Efficient Quantum Key Distribution. Abstract

Efficient Quantum Key Distribution. Abstract Efficient Quantum Key Distribution M. Ardehali, 1 H. F. Chau, 2 and Hoi-Kwong Lo 3 1 Research Labs, NEC Corporation, Sagamihara, Kanagawa 229, Japan and 4-31-12-302, Atago Center, Tama-shi, Tokyo, Japan

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto Quantum Hacking Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto 1 Outline Introduction Quantum Key Distribution (QKD) Practical QKD Quantum Hacking Fake-state & Time-shifted

More information

Diagonalization of Matrices Dr. E. Jacobs

Diagonalization of Matrices Dr. E. Jacobs Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

Error Reconciliation in QKD. Distribution

Error Reconciliation in QKD. Distribution Error Reconciliation in Quantum Key Distribution Richard P. Brent MSI, ANU 1 October 2009 Abstract The problem of "error reconciliation" arises in Quantum Cryptography, which is more accurately described

More information

arxiv:quant-ph/ v1 26 Mar 2001

arxiv:quant-ph/ v1 26 Mar 2001 Performance of Photon-Pair Quantum Key Distribution Systems Z. Walton, 1 A. V. Sergienko, 1,2 M. Atatüre, 2 B. E. A. Saleh, 1 and M. C. Teich 1,2 1 Quantum Imaging Laboratory, Department of Electrical

More information

arxiv:quant-ph/ v2 11 Jan 2006

arxiv:quant-ph/ v2 11 Jan 2006 Quantum Authentication and Quantum Key Distribution Protocol Hwayean Lee 1,,3, Jongin Lim 1,, and HyungJin Yang,4 arxiv:quant-ph/0510144v 11 Jan 006 Center for Information Security Technologies(CIST) 1,

More information

arxiv:quant-ph/ v1 12 Nov 1999

arxiv:quant-ph/ v1 12 Nov 1999 Security Aspects of Practical Quantum Cryptography Gilles Brassard 1, Norbert Lütkenhaus 2, Tal Mor 1,3 and Barry C. Sanders 4 1 Département IRO, Université de Montréal, C.P. 6128, succ. centre ville,

More information

Similarity Measures for Categorical Data A Comparative Study. Technical Report

Similarity Measures for Categorical Data A Comparative Study. Technical Report Similarity Measures for Categorical Data A Comparative Stuy Technical Report Department of Computer Science an Engineering University of Minnesota 4-92 EECS Builing 200 Union Street SE Minneapolis, MN

More information

National Institute of Standards and Technology Gaithersburg, MD, USA

National Institute of Standards and Technology Gaithersburg, MD, USA National Institute of Standards and Technology Gaithersburg, MD, USA Physics y Laboratoryy & Information Technology Laboratory J. C. Bienfang, A. Restelli, D. Rogers, J. Galang C. W. Clark, Carl J. Williams

More information

Lecture 10 Notes, Electromagnetic Theory II Dr. Christopher S. Baird, faculty.uml.edu/cbaird University of Massachusetts Lowell

Lecture 10 Notes, Electromagnetic Theory II Dr. Christopher S. Baird, faculty.uml.edu/cbaird University of Massachusetts Lowell Lecture 10 Notes, Electromagnetic Theory II Dr. Christopher S. Bair, faculty.uml.eu/cbair University of Massachusetts Lowell 1. Pre-Einstein Relativity - Einstein i not invent the concept of relativity,

More information

High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres

High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres New Journal of Physics High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres To cite this article: D Stucki et al 2009 New J. Phys. 11 075003 View the article online for

More information

Simulation of BB84 Quantum Key Distribution in depolarizing channel

Simulation of BB84 Quantum Key Distribution in depolarizing channel Simulation of BB84 Quantum Key Distribution in depolarizing channel Hui Qiao, Xiao-yu Chen * College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China xychen@mail.zjgsu.edu.cn

More information

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances Hoi-Kwong Lo 1 and H. F. Chau, 2y 1 Hewlett-Packard Labs, Filton Road, Stoke Giord, Bristol BS34 8QZ, U. K. 2 Department

More information

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices Global Journal of Computer Science and Technology Volume 11 Issue 12 Version 1.0 July Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:

More information

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms CRYPTOGRAPHY 19 Cryptography 5 ElGamal cryptosystems and Discrete logarithms Definition Let G be a cyclic group of order n and let α be a generator of G For each A G there exists an uniue 0 a n 1 such

More information

arxiv:quant-ph/ v1 25 Dec 2006

arxiv:quant-ph/ v1 25 Dec 2006 Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol Toyohiro Tsurumaru Mitsubishi Electric Corporation, Information Technology R&D Center 5-1-1

More information

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. Ajit Singh 1 and Nidhi Sharma 2 Department of Computer Science & Engineering and Information Technology BPS Mahila Vishwavidyalaya,

More information

Quantum Cryptography: A Short Historical overview and Recent Developments

Quantum Cryptography: A Short Historical overview and Recent Developments Quantum Cryptography: A Short Historical overview and Recent Developments Ioannis P. Antoniades Informatics Department, Aristotle University of Thessaloniki, Thessaloniki 541 24, Greece Vasilios G. Chouvardas

More information

Bell inequality for qunits with binary measurements

Bell inequality for qunits with binary measurements Bell inequality for qunits with binary measurements arxiv:quant-ph/0204122v1 21 Apr 2002 H. Bechmann-Pasquinucci and N. Gisin Group of Applied Physics, University of Geneva, CH-1211, Geneva 4, Switzerland

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145

More information

General relativity, 7

General relativity, 7 General relativity, 7 The expaning universe The fact that the vast majority of galaxies have a spectral reshift can be interprete as implying that the universe is expaning. This interpretation stems from

More information

Goal of this chapter is to learn what is Capacitance, its role in electronic circuit, and the role of dielectrics.

Goal of this chapter is to learn what is Capacitance, its role in electronic circuit, and the role of dielectrics. PHYS 220, Engineering Physics, Chapter 24 Capacitance an Dielectrics Instructor: TeYu Chien Department of Physics an stronomy University of Wyoming Goal of this chapter is to learn what is Capacitance,

More information

Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution Horace P. Yuen arxiv:1411.2310v1 [quant-ph] 10 Nov 2014 Department of Electrical Engineering and Computer

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Improving Estimation Accuracy in Nonrandomized Response Questioning Methods by Multiple Answers

Improving Estimation Accuracy in Nonrandomized Response Questioning Methods by Multiple Answers International Journal of Statistics an Probability; Vol 6, No 5; September 207 ISSN 927-7032 E-ISSN 927-7040 Publishe by Canaian Center of Science an Eucation Improving Estimation Accuracy in Nonranomize

More information

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography John Preskill, Caltech Biedenharn Lecture 2 8 September 2005 The security of quantum cryptography The Quantum Century Though quantum theory is more than 100 years old, there are profound aspects of the

More information

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Unconditionally secure deviceindependent

Unconditionally secure deviceindependent Unconditionally secure deviceindependent quantum key distribution with only two devices Roger Colbeck (ETH Zurich) Based on joint work with Jon Barrett and Adrian Kent Physical Review A 86, 062326 (2012)

More information

A probabilistic quantum key transfer protocol

A probabilistic quantum key transfer protocol SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska

More information

Entanglement is not very useful for estimating multiple phases

Entanglement is not very useful for estimating multiple phases PHYSICAL REVIEW A 70, 032310 (2004) Entanglement is not very useful for estimating multiple phases Manuel A. Ballester* Department of Mathematics, University of Utrecht, Box 80010, 3508 TA Utrecht, The

More information

Lecture 16: The chain rule

Lecture 16: The chain rule Lecture 6: The chain rule Nathan Pflueger 6 October 03 Introuction Toay we will a one more rule to our toolbo. This rule concerns functions that are epresse as compositions of functions. The iea of a composition

More information

CMSC 313 Preview Slides

CMSC 313 Preview Slides CMSC 33 Preview Slies These are raft slies. The actual slies presente in lecture may be ifferent ue to last minute changes, scheule slippage,... UMBC, CMSC33, Richar Chang CMSC 33 Lecture

More information