Cryptography: the science of secret communications
|
|
- Buddy Phillips
- 5 years ago
- Views:
Transcription
1 1 Quantum key distribution a new tool for the secure communications toolbox Richard Hughes Physics Division Los Alamos National Laboratory ; ; cryptographic key transfer by quantum (single-photon) communications overview of cryptography the BB84 QKD protocol QKD in practice internships are available in all aspects of quantum cryptography: experimental and theoretical physics, mathematics, computer science and electrical engineering
2 Cryptography: the science of secret communications 2 I am fairly familiar with all forms of secret writings The object of those who invented the system has apparently been to conceal that these characters convey a message. Sherlock Holmes The Adventure of the Dancing Men confidentiality encryption renders message unintelligible to 3 rd parties & authentication possible if sender and recipient share a secret: a key main assumption: passive eavesdropping
3 3
4 Kerckhoff s Principles: secrecy resides in the key 4 The system must be physically, if not mathematically, undecipherable; The system must not require secrecy and can be stolen by the enemy without causing trouble; It must be easy to communicate and remember the keys without requiring written notes, it must also be easy to change or modify the keys with different participants; The system ought to be compatible with telegraph communication; The system must be portable, and its use must not require more than one person; Finally, regarding the circumstances in which such system is applied, it must be easy to use and must neither require stress of mind nor the knowledge of a long series of rules.
5 The one-time pad 5 key material is a (truly) random bit sequence XOR= = addition (mod 2) = binary addition without carry unconditionally secure provided key is not reused key is as long as the message Alice encrypts plaintext... A = key cryptogram =... Z open channel Bob decrypts cryptogram key plaintext
6 6
7 (Quantum) Cryptography Eve: enemy cryptanalyst 7 Alice Bob message source encryption decryption destination open channel key source secure channel quantum cryptography = on-demand key transfer by quantum communications detectability and defeat of eavesdropping ensured by laws of physics & information theory avoids latent vulnerability of public key broadcasts passive monitoring ineffective today s quantum cryptography transmissions not vulnerable to tomorrow s technology reduces insider threat: key material does not exist until transmission time compatibility with optical communications/existing & planned infrastructures key distribution
8 8 FIRST QKD PROTOCOL Bennett & Brassard (1984) FIRST QKD EXPERIMENT Bennett et al.(1991) QKD FIBER EXPERIMENTS Rarity, Townsend et al. (UK, > 1994) Franson et al. (APL, 1994) Gisin et al. (Geneva, > 1995) Hughes et al. (LANL > 1995) Bethune et al. (IBM > 1999) Karlsson et al. (Stockholm > 2000) Polzik et al. (Denmark > 2001) FREE-SPACE EXPERIMENTS Franson et al. (1996) Hughes et al. (LANL > 1996) Rarity et al. (UK > 2000) ENTANGLED-PHOTON QKD Gisin et al. (Geneva, > 2000) Zeilinger et al. (Austria, 2000) Kwiat et al. (LANL, UIUC > 2000) SINGLE-PHOTON QKD Yamamoto et al. (2002) Grangier et al. (2002) CONTINUOUS VARIABLE QKD Grangier et al. (2002)
9 Quantum mechanics of ideal single photons & detectors 9 a single photon cannot be split beamsplitter single photon R T 0 detector 1 detector EITHER detector 0 fires OR detector 1 fires not both we cannot predict, even in principle, which detector will fire irreducible randomness of quantum physics
10 Quantum mechanics & (linearly) polarized single photons 10 polarizing beamsplitter polarizing beamsplitter vertically polarized single photon 0 detector θ -polarized single photon 0 detector 1 detector detector 0 never fires detector 1 always fires 1 detector detector 0 fires with prob = cos 2 θ OR, 1 fires with prob = sin 2 θ not both we cannot predict which one implications orthogonal polarization can be distinguished non-orthogonal polarizations cannot be faithfully distinguished after measurement a photon has no memory of its prior polarization [non-orthogonal polarizations cannot be faithfully copied ( no cloning )]
11 Conjugate coding 12 a bit of information can be encoded in orthogonal polarization states of single photons, in different bases: e.g. in the rectilinear basis 0 1 in the diagonal (45 ) basis ( conjugate ) 0 1 the bit can be faithfully decoded if the encoding basis is known if the wrong decoding basis is used, the outcome is random
12 The core ingredients of the BB84 QKD protocol 13 Alice has two sources of random bits long-term secret data bits independent, short-term secret encoding bits Bob has an independent source of short-term secret decoding bits they have a quantum channel allows the faithful transmission of polarized single photons they have a means to perform conjugate encoding and decoding ideal single photon sources and detectors they have an authenticated, but non-secret, conventional public channel they know they are communicating with each other, and not an impersonator ( Eve ) they know that Eve has not substituted her own messages
13 Core ingredients of the BB84 (QKD) Protocol (I) 14 bit encoding Alice 0 1 quantum channel decoding Bob bit value? secret, random bit and encoding secret, random decoding bit value Alice public but authenticated Bob Distilled Secret key sequence sifting: post-select matching encoding/decoding Distilled Secret key sequence
14 Alice data bit Alice basis A B quantum Bob basis An example of BB Bob 1 0/1 0 0/1 0/1 0/1 0 1 detects B A R D D D R R D R public A B Yes No Yes No No No Yes Yes public sift Alice and Bob now share 4 random ( sifted ) bits
15 Points to note 16 From Alice and Bob s perspective: on average the protocol is 50% efficient Alice and Bob cannot predict which bits they will share sifted key is a random sequence of random bits only photons that arrive can enter the sifted key photon loss merely reduces the key rate in practice other photons may enter the quantum channel source of errors? From Eve s perspective cannot passively monitor the quantum channel: a photon cannot be split no possibility of storing information for future analysis public channel conveys no information about the (secret) data bits cannot perform a man-in-themiddle attack public channel is authenticated use quantum physics methods to distinguish the quantum channel states?
16 Example: intercept-resend eavesdropping (I) 17 Eve inserts a polarizer at angle θ? Alice Eve??? Eve can only obtain partial information introduces a disturbance (errors) Bob e.g. 1: Eve tests randomly in the rectilinear and diagonal bases: on average learns 50% of Alice s bits has 50% bit error rate (BER) on the rest once she learns the basis information e.g.2: Eve tests every bit in the Breidbart basis (@ 22.5 ) learns each bit with prob ~ 85% e.g. Alice sends V, Eve tests θ P(Eve correct) = cos 2 θ sends Bob θ P(Eve wrong) = sin 2 θ sends Bob (90 θ) impacts: Eve can gain different types of partial information deterministic or probabilistic necessarily causes a disturbance Bob has a 25% BER if Eve tests every bit
17 Example: intercept-resend eavesdropping (II) 18 Alice Bob s errors Bob s sifted key contain errors relative to Alice s must be removed by further public communications from the number of errors in Bob s sifted key, he and Alice can establish a rigorous upper bound on Eve s partial information this information can be removed by privacy amplification Bob Eve s information Eve Eve's BER Bob's BER bit error rate (BER) bit error rate (BER) Eve e.g. Eve tests 40% of the bits Bob Eve's angle (degrees) Eve s polarizer angle
18 Bisective search interactive error correction: BINARY 1 19 [1] Bennett et al. (1991).
19 Reconciliation: post-facto error correction 20 Alice and Bob have sifted keys; Bob s has errors they communicate parity bits to find and correct errors e.g. bisective search: Eve gains side-information : at BER ε f(ε) = -log 2 ε (1 ε)log 2 (1 ε) bits/sifted bit (Shannon limit) reduces secret bit yield Alice: Bob : parity bits revealed to correct one error Alice Bob yield after error correction Shannon 1.19 Shannon bisective (data) Eve Eve s side information quantum BER
20 Estimating Eve s information 21 Bob finds that his sifted key has a BER = ε Alice and Bob conservatively assume an (optimal) strategy for Eve e.g. Eve intercepts/resends a portion p in the Breidbart basis (@ 22.5 ) Alice Eve Bob??? Eve would cause a BER, ε = 25% on a portion p of Bob s sifted key Alice and Bob estimate p from Bob s observed sifted BER, ε p = 4 ε Alice and Bob have an upper bound on Eve s knowledge of their reconciled keys a portion p, on which she knows each bit with prob ~ 0.85; guesses (1 p)
21 How to extract a secret 22 Alice and Bob have 6 bits: a, b, c, d, e, f e.g. 2. Eve has probabilistic information: she KNOWS x = {a, b, c, d, e, f} with p = ½, guesses otherwise e.g. 1. they KNOW Eve knows 3 deterministic bits, but not which three they can extract 2 SECRET bits: a b c d and c d e f Alice and Bob cannot extract ANY secret bit by hashing e.g. with probability ¾ Eve KNOWS a b c d e f combines known bits with unknown ones result = unknown Bennett et al. (1984): privacy amplification by public discussion hashing erases Eve s information in general: how much secret information can Alice and Bob extract (by hashing to a shorter final key)?
22 Side information? 23 Eve may also have side information: error correction bits Bob s sifted key has a BER = ε Alice and Bob conservatively assume the Breidbart strategy for Eve after reconciliation they use public communications to agree on which random subset parities to use as their secret key yielding: r = 1 4 ε log [ ε log 2 ε + ( 1 - ε ) log 2 ( 1 - ε ) ] secret bits / sifted bit (Shannon limit)
23 INGREDIENTS of QKD cryptographic quality random bits sifting error correction estimate bound on information leakage privacy amplification authentication entity identification message authentication key confirmation randomness tests standards Alice generates a secret random bit sequence Quantum transmissions from Alice to Bob sifting Alice & Bob reveal their encoding/decoding reconciliation error correction, bound Eve s information privacy amplification extract secret bits authentication of public channel messages, key confirmation final, secret key Security statement keys agree with overwhelming probability pass randomness tests Eve knows << 1 bit deception probability << 1 cryptography 24
24 Secrecy efficiency: ideal system 25 secrecy efficiency transmission protocol error = x & detection efficiency x correction x privacy amplification secret bits per initial bit physics introduce errors physics information theory reveals side information information theory collision entropy side information secrecy efficiency after error correction and privacy amplification against intercept/resend 0.8 ec + pa secret bit yield ad + ec + pa QKD may not be possible EVEN IF photons can be transmitted and detected sifted bit error rate
25 What does QKD offer? 26 from one-time authentication to self-sustaining key distribution drastically narrows an adversary s scope & window of opportunity: break initial authentication in real-time and attempt an invasive man-in-themiddle attack AUTHENTICATION quantum communications + information theory KEY DISTRIBUTION self-sustaining, copious shared secret key short, shared initial secret key replenish ENCRYPTION &/or AUTHENTICATION key key transfer (or key generation??)
26 Practical light sources, quantum channel & photon detectors single photon = weak Poissonian ( ) P n n e = n! = µ < 1 µ n µ sometimes send > 1 photon: security? detector efficiency = η PD µη ( 1 e ) = sometimes don t detect it ( ) P n = e n! µ n µ loss T ( ) P n loss = random partitioning T µ e = n! n = Tµ no-photon fraction and loss make it harder for Alice and Bob multi-photon fraction & noise introduce new opportunities for Eve revised privacy amplification secret bit rate? 27 ( Tµ ) n
27 Free-space QKD makes many types of secure key transfer possible 28 challenges photon production, transmission and detection atmospheric optics background photons timing and synchronization pointing, acquisition and tracking
28 The atmospheric QKD quantum channel low-loss transmission wavelength; high-efficiency detectors 29 secrecy efficiency as a function of wavelength: Proc SPIE 4635, 116 (2002) ~ 780 nm is optimal for QKD through the atmosphere single-photon detection with Si APDs challenges background photons daylight radiance ~ photons s -1 cm -2 Å -1 str -1 ~ 10 7 photons mode -1 temporal filtering: ~1 ns spectral filtering: 0.1 nm ~40,000 modes spatial filtering: 220-µrad FOV day/night ~ 10 6 Atmospheric transmission vs. wavelength Daylight background synchronization and timing atmospheric optics? not birefringent; intermittency: ~ 0.01-s
29 Free-space quantum key distribution Richard Hughes, Jane Nordholt, Derek Derkacs and Charles Peterson Transmitter Alice Sample of key material at 10-km range (day) one-airmass path: comparable optics to satellite-to-ground 30 A: B: A: B: key transferred by 772-nm single-photon communications 1-MHz sending rate; ~600-Hz key rate day: 45,576 secret bits/hour ; night: 113,273 secret bits/45 mins Receiver Bob From Pajarito Mtn., Los Alamos, NM to TA53, Los Alamos National Laboratory Transmitter Alice
30 BB84 subsystem 31 monolithic randomizer chip 2-MHz clock rate 1-MHz signal rate BB84 photons: attenuated 772-nm lasers 1-s quantum transmissions single-photon detectors: cooled Si APDs passive quench; η~61%; dead time ~ 1 µs quantum random number generation multi-detector system: upper bound on multiphoton pulses Alice 0 V - H basis 1 0 V - H basis laser 4 S1 S2 S3 S4 detector ± 45º basis ± 45º basis 1 beam monitor Bob 1
31 10-km atmospheric QKD range 32 Alice Bob
32 sifted bits / transmitted bit night: 18:45 to 19:29 MST 192,925 sifted bits noise, C ~ 1-2 s -1 detector dark counts channel efficiency, η opt / noise, C 10-km sifted key data: 4 October, 2001 photon number, µ 33 daylight: 17:42 to 18:44 MST 394,004 sifted bits noise, C < 50 s -1 background ~ 2 mw cm -2 µm -1 str -1 # sifted bits ~ µ η opt sifted BER, ε ~ C/ µ η opt photon number, µ transmitter channel efficiency, η opt receiver noise, C
33 Realistic security : BBBSS91 privacy amplification from sifted bits to secret bits cf. Bennett et al. (1991) 34 no photon one photon multi- photon µ = probability assume Eve identifies all multi-photon signals attribute all errors to intercept/resend on single-photon signals Eve gains error correction information privacy amplification Eve s collision entropy per bit is R ( ) ( ) 1 µ 4εlog εlog2ε + 1 ε log2 1 ε Alice and Bob extract ~ R secret bits/sifted bit by universal hashing random Boolean matrix no secrecy in certain parts of parameter space optimal choice of µ
34 e.g. in daylight from 18:40:26-18:40:27 MDT 4 October, In 1 s, from 10 6 transmitted bits with photon number µ = 0.29 Alice and Bob produce 651 (partially secret) sifted bits with 21 errors (BER, ε = 3.2%): Alice s and Bob s 264-bit final secret key: (produced as parities of random subsets) µ = 0.29 no photon one photon multi- photon probability Eve s entropy > 651 bits -155 bits (side information: error correction) - 40 bits (intercept-resend) -171 bits (multi-photon) - 2 bits (side information: bias) - 20 bits (safety factor) = 264 bits (secret) Eve s expected information < 10-6 bits
35 10-km secrecy efficiency: 4 October, 2001 (secret bits per transmitted bit) 36 produce ~ secret bits per 1-s transmission secrecy efficiency secret bits cannot be transferred in some regimes channel efficiency, η opt / noise, C photon number, µ photon number, µ transmitter channel efficiency, η opt receiver noise, C max ground-to-ground range (this system): 30 km (day); 45 km (night)
36 Secret key generated by free-space quantum communications over 10-km range e.g. 4 October, 2001 (daylight): 50,783 bits e.g. 4 October, 2001 (night): 118,064 bits
37 UNCLASSIFIED One-time pad encryption of an image using final key (error correction, privacy amplification & check) 38 Encrypted Image Alice encrypts by adding a word of her key to each pixel Bob decrypts by subtracting a word of his key from each pixel
38 Technologically feasible USD eavesdropping: Eve replaces quantum channel with a classical one? Bennett et al. (1991) 39 Yuen (1995) Chefles and Barnett Dusek et al transmitter receiver accessible loss = 1 - η opt yes yes can only be conventional channel transmitter yes receiver Eve no security: need three-photon emission < single-photon detection upper bound on photon number in terms of accessible loss: µ 3 /32 < η opt µ
39 PNS eavesdropping: strongest individual attack (not technologically feasible) 40 Eve intercept / resend single photon transmitter QND receiver n > 1 photons split store one photon (n - 1) photons lower-loss channel basis information uniquely identified security: need multi-photon emission < single-photon arrival upper bound on photon number in terms of accessible loss: µ 2 /2 < ηµ
40 Unconditionally-secure cryptographic authentication C. Wipf & K. Tyagi 41 protection against man-in-the-middle? Alice must know she is talking with Bob, and vice-versa impersonation? authentication of public channel communications substitution? Alice and Bob share a short (short-term) secret authentication key compute a keyed hash; apply as authentication tag cost is small: logarithmic in # bits authenticated ALICE BOB public communication tag A public communication tag hash function hash function tag B? authentication key authentication key
41 Authentication results: 10-km data from 4 October, bits sacrificed per successful QKD session mutual authentication with cumulative P d < 10 7 self-sustaining 10 km data: cumulative secret bits secret bits sacrificed bits authenticated bits Run run number
42 Atmospheric optics of 10-km path km path has extinction (1 AM), background and capture efficiency comparable to a path to space airmass : a measure of atmospheric extinction (and seeing ) zenith path from Los Alamos has ~ 0.8 AM AM = 1 AM = sec z height of atmosphere z sea level
43 Conceptual QKD LEO satellite downlink 44 downlink: turbulence in far field no leadahead/isoplanatism issue detectors on ground less susceptible to DoS 1 micro-radian pointing jitter on satellite 5 micro-radian tracking jitter at receiver LEO satellite 20-cm transmitter ~ m range ~ 5-m footprint ground station 50-cm receiver
44 Los Alamos 48-km optical fiber quantum key distribution experiment km fiber path Alice Bob receiver transmitter
45 The QKD Quantum Channel low-loss transmission medium; high-efficiency detectors 46 optical fiber QKD over telecommunications fiber networks? challenges: single-photon detection at 1.3 µm, (1.55 µm) Attenuation Coefficient vs Wavelength (Ge), InGaAs APDs Rarity et al., Cova et al., Gisin et al., Morgan et al. e.g. InGaAs APDs (Fujitsu) cooled to 140 K detection efficiency, time-resolution and noise increase with over-voltage 20% efficiency, 50 khz noise time-resolution [ps] dark counts [khz] noise = 7.4exp(9.2η) [khz] high noise rate can be offset by sub-ns time-resolution efficiency, η
46 QKD using single-photon interference 47 t ~ 300 ps attenuator long path T ~ 5 ns electro-optic phase-shifter Bob 1.3-µm pulsed laser 50/50 fiber couplers 48 km of underground optical fiber long-short (Alice) + short-long (Bob) interference: φ 1 Alice φ 2 air gap U L Cooled InGaAs APD detectors U detector η ~ 11% n ~ ±1.24% visibility 100kHz sending rate 22.9 db loss Counts/600s Counts/600s φ = 0 φ = π/2 φ=0 φ=π/ Counts/600s Time (ns) Time (ns) 400 φ φ=π= π φ = φ=3π/2 3π/2 Counts/600s Time (ns) Time (ns)
47 BB84 key generation 48 (0,1): φ A = (0,π) OR (π/2,3π/2) φ B = (0,π/2) 1.3-µm pulsed laser Alice φ µm pulsed laser WDM fiber couplers Room temp InGaAs APD φ 2 Bob U L Cooled InGaAs APD detectors Sample of 48-km BB84 key bits A B A B BER ~ 9.3 %; key rate ~ 20 Hz (2x B92)
48 QKD is evolving along dual tracks: theoretical secrecy & practical security 49 theoretical secrecy Bennett-Brassard 1984 authentication + quantum communications + information theory = QKD practical security computational security heritage influx QKD today security proofs capability enhancement? unconditional security future secure communications needs
Security and implementation of differential phase shift quantum key distribution systems
Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006 Classical cryptography cryptography = κρυπτός +
More informationQuantum Cryptography
Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum
More information5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes
5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.
More informationPractical aspects of QKD security
Practical aspects of QKD security Alexei Trifonov Audrius Berzanskis MagiQ Technologies, Inc. Secure quantum communication Protected environment Alice apparatus Optical channel (insecure) Protected environment
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationQuantum Cryptography and Security of Information Systems
Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty
More informationEnigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski
1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every
More informationGround-Satellite QKD Through Free Space. Steven Taylor
Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution
More informationPractical Quantum Key Distribution
Leopold-Franzens-Universität Innsbruck Institut für Experimentalphysik Technikerstrasse 25 http://www.uibk.ac.at Practical Quantum Key Distribution Gregor Weihs Contents QKD Protocols Implementations of
More information+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1
Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction
More informationNational Institute of Standards and Technology Gaithersburg, MD, USA
National Institute of Standards and Technology Gaithersburg, MD, USA Physics y Laboratoryy & Information Technology Laboratory J. C. Bienfang, A. Restelli, D. Rogers, J. Galang C. W. Clark, Carl J. Williams
More informationAn Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009
An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More informationDetection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations
Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum
More informationQuantum Cryptography
Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145
More informationCryptography in a quantum world
T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationQuantum Cryptography. Marshall Roth March 9, 2007
Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationBB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits
BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits (*) Yoshihiro NAMBU*, Takaaki HATANAKA, and Kazuo NAKAMURA (*) Corresponding author: E-mail address: y-nambu@ah.jp.nec.com
More informationRealization of B92 QKD protocol using id3100 Clavis 2 system
Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and
More informationExperimental realization of quantum cryptography communication in free space
Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao
More informationAPPLICATIONS. Quantum Communications
SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction
More informationQuantum Information Transfer and Processing Miloslav Dušek
Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the
More informationQuantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer
Centre for Quantum Technologies, Singapore QUANTUM OPTICS Entanglement-based Free Space Quantum Cryptography in Full Daylight, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer
More informationQuantum key distribution
Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles
More informationSecurity of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C
Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationQuantum key distribution: theory for application
Appl. Phys. B 69, 395 400 (1999) / Digital Object Identifier (DOI) 10.1007/s003409900167 Applied Physics B Lasers and Optics Springer-Verlag 1999 Quantum key distribution: theory for application N. Lütkenhaus
More informationSecrecy and the Quantum
Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and
More informationIntrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin
Intrinsic-Stabilization Uni-Directional Quantum Key Distribution Between Beijing and Tianjin Xiao-fan Mo 1, Bing Zhu 1, 2, Zheng-fu Han 1*, You-zhen Gui 1, Guang-can Guo 1 1 Key Lab of Quantum Information
More informationC. QUANTUM INFORMATION 111
C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i
More informationDeterministic secure communications using two-mode squeezed states
Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May
More informationSecurity of Quantum Key Distribution with Imperfect Devices
Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo
More informationA probabilistic quantum key transfer protocol
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska
More informationQuantum Entanglement and Cryptography. Deepthi Gopal, Caltech
+ Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts
More informationStop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)
Journal of Computer Science 3 (6): 44-49, 7 ISSN 549-3636 7 Science Publications Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Iyed Ben Slimen, Olfa Trabelsi, Houria
More informationC. QUANTUM INFORMATION 99
C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)
More informationChapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution
Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation
More informationFull polarization control for fiber optical quantum communication systems using polarization encoding
Full polarization control for fiber optical quantum communication systems using polarization encoding G. B. Xavier, G. Vilela de Faria, G. P. Temporão and J. P. von der Weid* Pontifical Catholic University
More informationResearch, Development and Simulation of Quantum Cryptographic Protocols
http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:
More informationError Reconciliation in QKD. Distribution
Error Reconciliation in Quantum Key Distribution Richard P. Brent MSI, ANU 1 October 2009 Abstract The problem of "error reconciliation" arises in Quantum Cryptography, which is more accurately described
More informationA New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)
A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport
More informationDEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.
DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. Ajit Singh 1 and Nidhi Sharma 2 Department of Computer Science & Engineering and Information Technology BPS Mahila Vishwavidyalaya,
More informationInvestigation of System Performance of Quantum Cryptography Key Distribution in Network Security
Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security Mehrdad Sepehri Sharbaf Senior IEEE Member California State University Dominguez Hills Computer Science
More informationNetwork Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices
Global Journal of Computer Science and Technology Volume 11 Issue 12 Version 1.0 July Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:
More informationarxiv:quant-ph/ v2 7 Nov 2001
Quantum key distribution using non-classical photon number correlations in macroscopic light pulses A.C. Funk and M.G. Raymer Oregon Center for Optics and Department of Physics, University of Oregon, Eugene,
More informationQuantum key distribution for the lazy and careless
Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center
More informationQuantum Key Distribution. The Starting Point
Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated
More informationQuantum threat...and quantum solutions
Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique
More informationCommunications Quantiques
Communications Quantiques Hugo Zbinden Groupe de Physique Appliquée Quantum Technologies Université de Genève Cryptographie Quantique Génération de nombres aléatoires Stéganographie basée sur du bruit
More informationarxiv:quant-ph/ v1 12 Nov 1999
Security Aspects of Practical Quantum Cryptography Gilles Brassard 1, Norbert Lütkenhaus 2, Tal Mor 1,3 and Barry C. Sanders 4 1 Département IRO, Université de Montréal, C.P. 6128, succ. centre ville,
More informationarxiv:quant-ph/ v1 26 Mar 2001
Performance of Photon-Pair Quantum Key Distribution Systems Z. Walton, 1 A. V. Sergienko, 1,2 M. Atatüre, 2 B. E. A. Saleh, 1 and M. C. Teich 1,2 1 Quantum Imaging Laboratory, Department of Electrical
More informationJohn Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography
John Preskill, Caltech Biedenharn Lecture 2 8 September 2005 The security of quantum cryptography The Quantum Century Though quantum theory is more than 100 years old, there are profound aspects of the
More information10 - February, 2010 Jordan Myronuk
10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States
More informationThe battle between cryptographers, who encrypt messages, and cryptanalysts, who break those codes, has raged for centuries. As quantum computing
The battle between cryptographers, who encrypt messages, and cryptanalysts, who break those codes, has raged for centuries. As quantum computing promises to help cryptanalysts break many of the encryption
More informationarxiv:quant-ph/ v1 25 Dec 2006
Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol Toyohiro Tsurumaru Mitsubishi Electric Corporation, Information Technology R&D Center 5-1-1
More informationEXPERIMENTAL DEMONSTRATION OF QUANTUM KEY
EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTONS FOLLOWING THE PING- PONG CODING PROTOCOL Martin Ostermeyer, Nino Walenta University of Potsdam, Institute of Physics, Nonlinear
More informationResearch Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract
Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement
More informationProblem Set: TT Quantum Information
Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationQuantum Communication. Serge Massar Université Libre de Bruxelles
Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?
More informationEfficient Quantum Key Distribution. Abstract
Efficient Quantum Key Distribution M. Ardehali, 1 H. F. Chau, 2 and Hoi-Kwong Lo 3 1 Research Labs, NEC Corporation, Sagamihara, Kanagawa 229, Japan and 4-31-12-302, Atago Center, Tama-shi, Tokyo, Japan
More informationA Simulative Comparison of BB84 Protocol with its Improved Version
JCS&T Vol. 7 No. 3 October 007 A Simulative Comparison of BB84 Protocol with its Improve Version Mohsen Sharifi an Hooshang Azizi Computer Engineering Department Iran University of Science an Technology,
More informationQuantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII
Quantum cryptography Part XIII Quantum cryptography Quantum cryptography has a potential to be cryptography of st century. An important new feature of quantum cryptography is that security of quantum cryptographic
More informationSeminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of
Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER
More informationQuantum cryptography -the final battle?
Quantum cryptography -the final battle? CS4236 Principles of Computer Security National University of Singapore Jonas Rundberg, NT030157A This presentation Quantum mechanics Introduction Notation Polarized
More informationMassachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.
More informationUnconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi
More informationarxiv:quant-ph/ v1 13 Mar 2007
Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,
More informationHigh Fidelity to Low Weight. Daniel Gottesman Perimeter Institute
High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,
More informationSimulation of BB84 Quantum Key Distribution in depolarizing channel
Simulation of BB84 Quantum Key Distribution in depolarizing channel Hui Qiao, Xiao-yu Chen * College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China xychen@mail.zjgsu.edu.cn
More informationquantum distribution of a sudoku key Sian K. Jones University of South Wales
Games and Puzzles quantum distribution of a sudoku key Sian K. Jones University of South Wales sian-kathryn.jones@southwales.ac.uk Abstract: Sudoku grids are often cited as being useful in cryptography
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationarxiv:quant-ph/ v2 18 Jan 1999
Estimates for practical quantum cryptography Norbert Lütkenhaus Helsinki Institute of Physics, PL 9, FIN-0004 Helsingin yliopisto, Finland (October 8, 208) In this article I present a protocol for quantum
More informationLecture 1: Introduction to Public key cryptography
Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means
More informationSingle Wavelength Entangled Pair in Quantum Channel Authentication for QKD
International Journal of Scientific and Research Publications, Volume 5, Issue 1, January 2015 1 Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD Mohamed Youssef Khalaf Elwadeya
More informationLecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography
CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time
More informationFeasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography
International Journal of Quantum Information c World Scientific Publishing Company Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography Karl Svozil Institut für
More informationQuantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada
Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada Crypto against modern computers No known attack against RSA, AES,... yet They are not proven (and they cannot be) Crypto against modern computers
More informationA Matlab Realization of Shor s Quantum Factoring Algorithm
1 A Matlab Realization of Shor s Quantum Factoring Algorithm S. Jha, P. Chatterjee, A.Falor and M. Chakraborty, Member IEEE Department of Information Technology Institute of Engineering & Management Kolkata,
More informationarxiv:quant-ph/ Jan 2000
Quantum cryptography with 3-state systems Helle Bechmann-Pasquinucci 1 and Asher Peres 2 1 Group of Applied Physics, University of Geneva, CH-1211, Geneva 4, Switzerland 2 Department of Physics, Technion
More informationSecret-Key Agreement over Unauthenticated Public Channels Part I: Definitions and a Completeness Result
Secret-Key Agreement over Unauthenticated Public Channels Part I: Definitions and a Completeness Result Ueli Maurer, Fellow, IEEE Stefan Wolf Abstract This is the first part of a three-part paper on secret-key
More informationChapter 5. Quantum Cryptography
Chapter 5. Quantum Cryptography arxiv:1108.1718v1 [quant-ph] 8 Aug 2011 Dag Roar Hjelme Department of Electronics and Telecommunications, Norwegian University of Science and Technology, NO-7491 Trondheim,
More informationCalculation of the Key Length for Quantum Key Distribution
http://dx.doi.org/10.5755/j01.eee.21.6.13768 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. 21, NO. 6, 2015 Calculation of the Key Length for Quantum Key Distribution Miralem Mehic 1, Marcin Niemiec
More informationPhysics is becoming too difficult for physicists. David Hilbert (mathematician)
Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving
More informationarxiv:quant-ph/ v1 27 Dec 2004
Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,
More informationQuantum Cryptography
http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.
More informationarxiv:quant-ph/ v2 3 Oct 2000
Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping
More informationTransmitting and Hiding Quantum Information
2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents
More informationIntroduction to Quantum Cryptography
Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics
More informationarxiv:quant-ph/ v2 17 Sep 2002
Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,
More informationDevice-Independent Quantum Information Processing
Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information
More informationTWO-LAYER QUANTUM KEY DISTRIBUTION
TWO-LAYER QUANTUM KEY DISTRIBUTION PAULO VINÍCIUS PEREIRA PINHEIRO and RUBENS VIANA RAMOS paulovpp@gmail.com rubens.viana@pq.cnpq.br Laboratory of Quantum Information Technology, Department of Teleinformatic
More informationApplications of Quantum Key Distribution (QKD)
Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,
More informationSECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES
Quantum Information and Computation, Vol. 7, No. 5&6 (2007) 431 458 c Rinton Press SECURITY OF QUANTUM KEY DISTRIBUTION USING WEAK COHERENT STATES WITH NONRANDOM PHASES HOI-KWONG LO Center for Quantum
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationPractical Quantum Cryptography: A Comprehensive Analysis (Part One)
MTR00W0000052 MITRE TECHNICAL REPORT arxiv:quant-ph/0009027v5 4 Dec 2003 G. Gilbert M. Hamrick September 2000 Practical Quantum Cryptography: A Comprehensive Analysis (Part One) Sponsor: The MITRE Corporation
More informationSupplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol
Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances Hoi-Kwong Lo 1 and H. F. Chau, 2y 1 Hewlett-Packard Labs, Filton Road, Stoke Giord, Bristol BS34 8QZ, U. K. 2 Department
More information