Xiongfeng Ma Center for Quantum Information

Size: px
Start display at page:

Download "Xiongfeng Ma Center for Quantum Information"

Transcription

1 Xiongfeng Ma Center for Quantum Information 1

2 Outline Background Quantum entanglement and cryptography From EPR to entanglement Quantum cryptography Quantum coherence and randomness Coherence Intrinsic randomness and coherence 2

3 Cryptography 3

4 Information security National security Individual privacy 4

5 Cryptography Cryptography Science of encoding and decoding secret messages Cryptology Public key cryptosystem (such as RSA, Diffie-Hellman) Cryptanalysis Hacking Alice Bob 5

6 Cryptography in history 2000 BC War 6

7 Basic concepts Plaintext Message in its natural format readable by an attacker Ciphertext Message altered to be unreadable by anyone except the intended recipients Key Sequence that controls the operation and behavior of the cryptographic algorithm Cryptosystem Combination of algorithm, key, and key management functions used to perform cryptographic operations 7

8 Objectives Confidentiality Integrity Authenticity Nonrepudiation Access Control 8

9 Cryptographic Methods Symmetric Same key for encryption and decryption Key distribution problem E.g., DES, AES, IDEA, Blowfish, OTP, Asymmetric Mathematically related key pairs for encryption and decryption Public and private keys E.g., Diffie-Hellman, RSA, Hybrid Combines strengths of both methods Asymmetric distributes symmetric key, also known as a session key Symmetric provides bulk encryption Example: SSL negotiates a hybrid method 9

10 Private key cryptosystem One-time pad (OTP): proven secure by Shannon Alice and Bob share two identical keys secretly. Message Key Encode XOR Decode Counter example: like it or not? XOR Code Key Code Message Alice Key Distribution Bob 10

11 Cryptographic Key Identical Faithful decryption Private Secure communication At least as long as the message An efficient way to distribute key 11

12 Cryptanalysis The study of methods to break cryptosystems Often targeted at obtaining a key Attacks may be passive or active Kerckhoff s Principle The only secrecy involved with a cryptosystem should be the key Cryptosystem Strength How hard is it to determine the secret associated with the system? 12

13 Hacking Brute force attack Trying all key values in the keyspace Dictionary attack Find plaintext based on common words Factoring attack Find keys through prime factorization Quantum computer 13

14 Randomness: foundation of security Snowden s documents on random number generator backdoor On the Possibility of a Back Door in the NIST SP Dual Ec Prng We cannot trust Intel and Via s chip-based crypto, FreeBSD developers say Crypto requires information-theoretic randomness! 14

15 Why Quantum Cryptography 15

16 Conventional Cryptography Application framework Military and diplomatic applications E-Commercial Cryptosystem Computational assumptions (e.g., RSA crypto assumes factoring is hard) 16

17 What is wrong with conventional cryptography? Unanticipated Advances in Hardware and Algorithms. Quantum Code-breaking Cryptographers do not sleep well. Cryptography is for the paranoid. In history, every advance in code-making has been defeated by advances in code-breaking with disastrous consequences to users. 17

18 Unanticipated Advances in Hardware and Algorithms Code-breaking of Enigma led to fore-runners of computers German Enigma Machine 10 million billion possible combinations! Looked unbreakable. Allied code-breaking machine bombe Enigma Broken! 18

19 Quantum Code-breaking Shor s algorithm: Factoring is easy with a quantum computer! Quantum computing can efficiently break: RSA Discrete logarithm problem: Diffie-Hellman key exchange Elliptic-curve cryptographic systems If a quantum computer is ever built, much of conventional Cryptography will fall apart! (Brassard) 19

20 Forward security? Trade secrets and government secrets are kept as secrets for decades (say 70 years). A Big Problem RIGHT NOW: If adversary can factor in 2087, she can then decrypt all traffic sent today. (She can save all communications in 2017.) Was there any computer 70 years ago? What will a computer look like 70 years from now? It is ridiculous to think that we know the future 70 years from now. 20

21 ENIAC 1946 The world's first electronic digital computer 21

22 Cell phone

23 Computer in

24 Quantum Cryptography Application framework Military and diplomatic applications E-Commercial Cryptosystem Quantum Mechanics 24

25 Quantum Cryptography Cryptology (QKD): security proof, enhance the performance and security Cryptanalysis (hacking): attack a practical system 25

26 When shall we implement Kept secure: x Quantum crypto implementation: y Quantum computing: z [Mosca, ISACA Journal vol. 5 (2015)] 26

27 Quantum crypto is exciting! 27

28 28

29 Commercial Quantum Crypto Products available on the market a decade ago! MagiQ Tech, ID Quantique, QuantumTrek, QASKY, Very practical field 29

30 USA QKD network DARPA Battelle Smartgrid First field test of QKD network (2004) 30

31 Japan: Tokyo network The Tokyo QKD network is constructed in a part of the NICT open test-bed network "Japan Giga Bit Network 2 plus by the project teams consisting of nine research group from Japan and Europe (2015) 31

32 Mitsubishi: Quantum Communication Mobile phone Communication speed : 1 Kb/s Store 2 GB keys It is possible to talk for 10 days (240 hours) 32

33 Europe SECOQC Focused on development of a global network for secure communication based on quantum cryptography (2008) 33

34 Swiss election uses quantum cryptography 34

35 Switzerland Geneva network N. Gisin (2009)

36 South Africa Durban Quantum Network Distance 2.6 km~27 km First Quantum Network in Africa (2009) 36

37 Melbourne Quantum Network Melbourne established commercial Quantum Network Establish the network between space and ground Collaborate with NASA/JPL (2010) 37

38 China s Quantum Secure Backbone project Total Length 2000 km trustable relay nodes 31 fiber links Metropolitan networks Existing: Hefei, Jinan New: Beijing, Shanghai Customer: China Industrial & Commercial Bank; Xinhua News Agency; China Banking Regulatory Commission GDP 35.6% ($3 trillion) Population 25.8% (0.3 billion) Beijing Hefei Jinan Shanghai 38

39 Quantum Satellite First quantum satellite, Mozi 1:40am, August 16,

40 Back to science: Entanglement 40

41 Quantum state and measure State Describe a system: contains a full set of parameters in different degrees of freedoms Wave function (ray), density matrix Measure Observable: tools to obtain information Projection, POVM 41

42 Quantum intrinsic randomness Given a known system and a known measurement device, shall the outcome be predetermined? Einstein, God does not play dice! Bohr, Albert, stop telling God what to do! 42

43 Einstein-Podolsky-Rosen Paradox Is Quantum Mechanics complete? Local hidden variable Entanglement A pair of particles: measure on one particle would instantaneously affect the state of the other Spooky action at a distance 43

44 Bell s inequality Quantum mechanics vs. local hidden variable From wikipedia.org 44

45 Non-local game Two players, Alice and Bob, are space-like separated Alice (B0b) given a random bit, x (y), say, by the referee Alice (B0b) outputs a bit, a (b) They win the game if aa bb = xxxx Classical limit? Sc= Quantum limit? Sq= xx Alice aa yy Bob bb 45

46 EPR pairs in reality Various physical systems Alain Aspect 81: Bell s inequality experiment demo 46

47 Entanglement EPR pair 00>+ 11> = ++>+ --> Non-locality --- Entanglement Local hidden variable: been ruled out by Bell s inequality test Non-local correlation: why quantum mechanics is weird Natural source for secure key Strong correlation Randomness in nature Cannot be eavesdropped --- no local hidden variable EPR pair means perfect key 47

48 Quantum Teleportation Sci-Fi Instant transportation Teleport materials 48

49 Teleportation How to send a quantum state aa 1 + bb 1 faithfully? Classically, the values of aa and b are continuous, so it requires a large amount of information transmission Heisenberg s uncertainty principle What if Alice and Bob have a pre-shared entangled state? Only needs to transfer 2 classical bits 49

50 Quantum key distribution (QKD) 50

51 Quantum key distribution (QKD) BB84 (Bennett & Brassard 1984) Alice Bob X11X0 Eve X10X X11X0 0: 1:

52 A few observations Random keys are distributed via QKD systems Alice does not send messages directly Users can safely discard keys if they feel the channel is insecure without causing any security problem Secure keys are used in later cryptosystems: composable A successful attack by Eve Eve obtains non-trivial amount of information about the final key without Alice and Bob s notice If Alice and Bob do not end up with any secure key, the attack is a failure Channel is totally insecure Classical channel: authentication 52

53 Summary (take home message) QKD systems distribute keys QKD does not replace all the current cryptosystems QKD does not replace current communication systems An ideal private key Identical: Alice and Bob share the same key Private: Eve has no (or up to trivial amount of) information about the final key Post processing Error correction: all classical, e.g., Cascade, LDPC Privacy amplification: shorten the key so that Eve s information is eliminated; the focus of all security proofs 53

54 From entanglement to secure QKD 54

55 A quick review Prepare-and-measure protocols BB84, six-state Entanglement based protocols Ekert91, BBM92 Unconditional security proof Mayers (1996) Lo and Chau (1999) Shor and Preskill (2000) Devetak and Winter (2003), Renner (2005) Security analysis for QKD with imperfect devices E.g. Mayers, Lütkenhaus, ILM Koashi-Preskill Gottesman-Lo-Lütkenhaus-Preskill (GLLP) 55

56 Entanglement-based protocols BBM92 Alice (or Eve) prepares an EPR pair Ψ AAAA = Alice and Bob each measures one half of the pair Z basis measure (bit) 0 or 1 X basis measure (phase) or 0 1 Eve 56

57 Lo-Chau security proof I Lo and Chau, 1999 Entanglement distillation Distill perfect EPR pairs from imperfect ones Bell basis: 00>+ 11>, 01>+ 10>, 00>- 11>, 01>- 10> Objective: 00>+ 11> Bit errors (Z) 01>+ 10> Phase errors (X) 00>- 11> Both bit and phase errors (Y) 01>- 10> 57

58 Lo-Chau security proof II Bit error correction (Z: 0,1) Bit errors: 01>+ 10> and 01>- 10> After bit error correction: 00>+ 11> or 00>- 11> Phase error correction (X: +,-) Phase errors: 00>- 11> or 01>- 10> After phase error correction: 00>+ 11> or 01>+ 10> Share (almost) pure EPR pairs 00>+ 11> Measure in Z basis to get final key Almost perfect privacy (randomness) Security: think of teleportation 58

59 Shor-Preskill security proof I Shor and Preskill, 2000 Problem with Lo-Chau proof Requires quantum computers Reduce to prepare-and-measure schemes Put the final key measurement ahead before error corrections Commute operations in quantum mechanics Error correction: classical methods Privacy amplification: key point of all security proofs 59

60 Shor-Preskill security proof II Bit error correction becomes regular error correction Enables Alice and Bob shares identical keys H(bit error rate): Shannon entropy Phase error correction becomes privacy amplification Enables Alice and Bob shares private keys H(phase error rate): Shannon entropy Final key rate 1-H(bit error rate)-h(phase error rate) Symmetry of BB84 Between X and Z basis Basis-independent source: bit error rate=phase error rate 1-2H(QBER) Not optimal: can be enhanced by two-way LOCC 60

61 Post-processing Ma et al.,computers & Security 30, (2011) Fung, Ma, and Chau, Phys. Rev. A 81, (2010) N. Lütkenhaus, Phys. Rev. A 59, 3301 (1999): using error verification to replace error testing. Towards post-processing standard: SECOQC Workshop, Quantum Works QKD Meeting (Waterloo, Canada) Workshop, Finite-Size Effects in QKD (Singapore) 61

62 Quantum coherence and randomness Ma, Yuan, Cao, Qi, and Zhang, Quantum random number generation," npj Quantum Information 2, 16021, (2016) Streltsov, Adesso, and Plenio, Quantum Coherence as a Resource, arxiv: Yuan, Zhou, Cao, and Ma, Intrinsic randomness as a measure of quantum coherence," Phys. Rev. A 92, , (2015) 62

63 What is Coherence? Coherent interference Schrodinger s cat 63

64 Schrodinger s cat: a modern description Classical cat: ρρ cc = 1/2( ) ρρ cc = Quantum cat: ρρ qq (0,0) = 1/2( )( ) ρρ qq = The difference between a quantum and classical cat

65 Measure qubit coherence General quantum cat: ρρ qq αα, ββ = (sin αα 0 + ee iiii cos αα 1 )( 0 sin αα + 1 ee iiii cos αα) ρρ qq (αα, ββ) = 1 sin 2 αα ee iiii sin αα cos αα 2 ee iiii sin αα cos αα cos 2 αα There exists coherence as long as sin αα cos αα 0. A measure for coherence: ee iiii sin αα cos αα? How about mixed quantum state? Generally, CC ρρ = ii jj ρρ iiii?

66 Framework of quantum coherence d-dimensional Hilbert space Classical computational basis: I = Incoherent state is defined by dd δδ = pp ii ii ii ii=1 ii }, ii = 1, 2,, dd. And incoherent operation is defined by incoherent completely positive trace preserving (ICPTP) maps, Φ ICPTP ρρ = KK nn ρρkk nn where nn KK nn KK nn = II and nn KK nn δδkk nn = δδδ T. Baumgratz, M. Cramer, and M. B. Plenio PRL 113, (2014) nn

67 A framework of quantum coherence

68 Coherence measures Relative entropy of coherence CC rel.ent. ρρ = SS ρρ diag Off-diagonal elements (l1-norm): SS ρρ CC ll1 l2-norm: (C2b is violated) CC ll2 Coherence of formation ρρ = min δδ ρρ = min δδ ρρ, δδ ll1 = ii jj ρρ, δδ 2 ll2 = ii jj ρρ iiii ρρ iiii 2 CC CCCC ρρ = min pp ee CC II ( ψψ ee ) {pp ee, ψψ ee } ee where the minimum is runs over all possible decomposition of ρρ

69 Questions What is the operational meaning? From a resource perspective, what does coherence mean? 69

70 Quantum intrinsic randomness Einstein, God does not play dice! Bohr, Albert, stop telling God what to do! 70

71 Intrinsic randomness Debate between Einstein and Bohr Born s rule introduces intrinsic randomness in quantum measurement. Important quantum feature that differs from classical procedures Heisenberg s uncertainty principle Witnessed by Bell s tests 71

72 Intrinsic randomness of a measurement For a given quantum state ρρ, what is the genuine randomness in a fixed projective measurement? Key question in quantum random number generation 72

73 Intrinsic randomness: pure state Pure state: ψψ = ii aa ii ii. Measurement basis: II = ii }, ii = 1, 2,, dd. Probability of obtaining the iith outcome: pp ii = aa ii 2 Define the measurement outcome as random variable A, the output randomness can be quantified by RR II ( ψψ ψψ ) = HH AA = pp ii log 2 pp ii = SS(ρρ diag ) where ρρ diag is the density matrix that has only diagonal terms of in the computational basis I. ii

74 Intrinsic randomness: mixed state For a general mixed state, the measurement outcome randomness is mixed with classical randomness. Examples: ρρ 1 = + +, + = 0 + 1, ρρ diag 2 1 = II ρρ 2 =, = 0 1, ρρ diag 2 2 = II ρρ 3 = , ρρ diag = II SS(ρρ diag ) is not a proper measure for intrinsic randomness

75 Intrinsic randomness: mixed state Measurement outcome of Alice: A System of Eve: ρρ EE Prediction of Eve: E

76 Classical and quantum adversaries (a) Classical adversary, the correlated party perform measurement individually on ρρ EE (b) Quantum adversary: the correlated party perform joint measurement on different runs of her system ρρ EE

77 Intrinsic randomness: classical adversary Yuan, Zhou, Cao, and Ma, PRA 92, (2015)

78 Intrinsic randomness: classical adversary Intrinsic randomness for general quantum states RR II ρρ = min pp ee RR II ( ψψ ee ) {pp ee, ψψ ee } ee where the minimum runs over all possible decompositions of ρρ. (C1) classical states generate no randomness; (C1 ) any non-classical states can always be used to generate intrinsic randomness. (C2a) classical operations should not increase the randomness of a given state; (C2b) requires that the randomness cannot increase on average when probabilistic strategies are considered. (C3) randomness cannot increase on average by statistically mixing several states. Intrinsic randomness RR II ρρ measures the strength of coherence.

79 Intrinsic randomness for qubit states Pure state ψψ = αα 0 + ββ 1 RR zz ( ψψ ) = HH( αα 2 ) = HH( ββ 2 ) nn xx = ψψ σσ xx ψψ = αα ββ + ββ αα, nn yy = ψψ σσ yy ψψ = iiαα ββ + iiββ αα 1+ 1 nn xx 2 nn2 yy RR zz ( ψψ ) = HH 2 Mixed state: similar method of deriving entanglement of formation. RR zz (ρρ) = HH nn xx 2 nn yy 2 2

80 Intrinsic randomness: quantum adversary ψψ AAAA is a purification of ρρ ρρ AAAA = ii pp ii ii ii ρρ EE SS AA EE = CC rel.ent. ρρ = SS ρρ diag SS ρρ Relative entropy measure of coherence CC rel.ent. ρρ = HH nn zz+1 2 HH nn

81 Intrinsic randomness: qubit example Given ρρ vv = vv vv II/2, RR zz (ρρ) = HH 1+ 1 vv2 CC rrrrrr.eeeeee. ρρ = 1 HH vv+1 2 In general, there is a non-zero gap between the two quantum randomness measures, RR zz ρρ CC rrrrrr.eeeeee. ρρ 2 Yuan, Zhao, Girolami, Ma, arxiv.org/abs/

82 Quantum Discord as Quantum Randomness gap The state after Alice s measurement is ρρ AAAA = pp ii ii ii ρρ EE ii For a state ρρ AAAA, the discord is defined as DD BB ρρ AAAA = min SS AA qq qq BB ii BB SS AA, BB ρρ ρρaaaa + SS BB ρρaaaa AAAA ii Then, it is easy to verify that RR zz ρρ CC rrrrrr.eeeeee. ρρ = DD EE ρρ AAEE

83 Thank you! Xiongfeng Ma: *Xiao Yuan, Zhen Zhang, Jiajun Ma Qi Zhao: Hongyi Zhou: You Zhou: Pei Zeng: 83

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

EPR paradox, Bell inequality, etc.

EPR paradox, Bell inequality, etc. EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

Lecture 1: Introduction to Public key cryptography

Lecture 1: Introduction to Public key cryptography Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Quantum Key Distribution. The Starting Point

Quantum Key Distribution. The Starting Point Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Quantum Entanglement Assisted Key Distribution

Quantum Entanglement Assisted Key Distribution Quantum Entanglement Assisted Key Distribution Ke Tang *, Ping Ji *+, Xiaowen Zhang * Graduate Center, City University of New York, ke.tang@qc.cuny.edu + John Jay College of Criminal Justice, City University

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Quantum threat...and quantum solutions

Quantum threat...and quantum solutions Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

Quantum cryptography: from theory to practice

Quantum cryptography: from theory to practice Quantum cryptography: from theory to practice by Xiongfeng Ma A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Thesis Graduate Department of Department of Physics

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

Quantum Technologies for Cryptography

Quantum Technologies for Cryptography University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time

More information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can

More information

arxiv: v1 [quant-ph] 18 May 2018

arxiv: v1 [quant-ph] 18 May 2018 Measurement-Device-Independent Quantum Secure Direct Communication, arxiv:1805.078v1 [quant-ph] 18 May 018 Zeng-Rong Zhou, 1,, 3, 4, 5, 6, Yu-Bo Sheng, 7, 8, 9, Peng-Hao Niu, 1,, 3, 4, 5, 6 Liu-Guo Yin,

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

Notes for Lecture 17

Notes for Lecture 17 U.C. Berkeley CS276: Cryptography Handout N17 Luca Trevisan March 17, 2009 Notes for Lecture 17 Scribed by Matt Finifter, posted April 8, 2009 Summary Today we begin to talk about public-key cryptography,

More information

Device-Independent Quantum Information Processing (DIQIP)

Device-Independent Quantum Information Processing (DIQIP) Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145

More information

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,

More information

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy Symmetric Cryptography Review Alice Bob Public Key x e K (x) y d K (y) x K K Instructor: Dr. Wei (Lisa) Li Department of Computer Science, GSU Two properties of symmetric (secret-key) crypto-systems: The

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key

More information

Classical RSA algorithm

Classical RSA algorithm Classical RSA algorithm We need to discuss some mathematics (number theory) first Modulo-NN arithmetic (modular arithmetic, clock arithmetic) 9 (mod 7) 4 3 5 (mod 7) congruent (I will also use = instead

More information

The Relativistic Quantum World

The Relativistic Quantum World The Relativistic Quantum World A lecture series on Relativity Theory and Quantum Mechanics Marcel Merk University of Maastricht, Sept 24 Oct 15, 2014 Relativity Quantum Mechanics The Relativistic Quantum

More information

Perfectly secure cipher system.

Perfectly secure cipher system. Perfectly secure cipher system Arindam Mitra Lakurdhi, Tikarhat Road, Burdwan 713102 India Abstract We present a perfectly secure cipher system based on the concept of fake bits which has never been used

More information

Cyber Security in the Quantum Era

Cyber Security in the Quantum Era T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act

More information

Key distillation from quantum channels using two-way communication protocols

Key distillation from quantum channels using two-way communication protocols Key distillation from quantum channels using two-way communication protocols Joonwoo Bae and Antonio Acín ICFO-Institut de Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels, Barcelona,

More information

Secrecy and the Quantum

Secrecy and the Quantum Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

arxiv:quant-ph/ v1 6 Dec 2005

arxiv:quant-ph/ v1 6 Dec 2005 Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School

More information

Universally composable and customizable post-processing for practical quantum key distribution

Universally composable and customizable post-processing for practical quantum key distribution Title Universally composable and customizable post-processing for practical quantum key distribution Author(s) Ma, X; Fung, CHF; Boileau, JC; Chau, HF Citation Computers And Security, 2011, v. 30 n. 4,

More information

A. Quantum Key Distribution

A. Quantum Key Distribution A. Quantum Key Distribution The purpose of QKD is to establish a string of random bits (the key ) shared by Alice and Bob, where Alice and Bob can be highly confident that eavesdropper Eve knows almost

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

arxiv:quant-ph/ v2 17 Sep 2002

arxiv:quant-ph/ v2 17 Sep 2002 Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

Introduction to Cryptography. Lecture 8

Introduction to Cryptography. Lecture 8 Introduction to Cryptography Lecture 8 Benny Pinkas page 1 1 Groups we will use Multiplication modulo a prime number p (G, ) = ({1,2,,p-1}, ) E.g., Z 7* = ( {1,2,3,4,5,6}, ) Z p * Z N * Multiplication

More information

Public-key Cryptography and elliptic curves

Public-key Cryptography and elliptic curves Public-key Cryptography and elliptic curves Dan Nichols nichols@math.umass.edu University of Massachusetts Oct. 14, 2015 Cryptography basics Cryptography is the study of secure communications. Here are

More information

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi

More information

Public-Key Cryptosystems CHAPTER 4

Public-Key Cryptosystems CHAPTER 4 Public-Key Cryptosystems CHAPTER 4 Introduction How to distribute the cryptographic keys? Naïve Solution Naïve Solution Give every user P i a separate random key K ij to communicate with every P j. Disadvantage:

More information

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying

More information

Cryptography. P. Danziger. Transmit...Bob...

Cryptography. P. Danziger. Transmit...Bob... 10.4 Cryptography P. Danziger 1 Cipher Schemes A cryptographic scheme is an example of a code. The special requirement is that the encoded message be difficult to retrieve without some special piece of

More information

Quantum Technologies: Threats & Solutions to Cybersecurity

Quantum Technologies: Threats & Solutions to Cybersecurity Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017 ID Quantique Company Profile

More information

arxiv:quant-ph/ v2 3 Oct 2000

arxiv:quant-ph/ v2 3 Oct 2000 Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping

More information

Cryptography CS 555. Topic 22: Number Theory/Public Key-Cryptography

Cryptography CS 555. Topic 22: Number Theory/Public Key-Cryptography Cryptography CS 555 Topic 22: Number Theory/Public Key-Cryptography 1 Exam Recap 2 Exam Recap Highest Average Score on Question Question 4: (Feistel Network with round function f(x) = 0 n ) Tougher Questions

More information

A semi-device-independent framework based on natural physical assumptions

A semi-device-independent framework based on natural physical assumptions AQIS 2017 4-8 September 2017 A semi-device-independent framework based on natural physical assumptions and its application to random number generation T. Van Himbeeck, E. Woodhead, N. Cerf, R. García-Patrón,

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography John Preskill, Caltech Biedenharn Lecture 2 8 September 2005 The security of quantum cryptography The Quantum Century Though quantum theory is more than 100 years old, there are profound aspects of the

More information

A probabilistic quantum key transfer protocol

A probabilistic quantum key transfer protocol SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers

More information

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles Device-independent Quantum Key Distribution and Randomness Generation Stefano Pironio Université Libre de Bruxelles Tropical QKD, Waterloo, June 14-17, 2010 Device-independent security proofs establish

More information

Practice Assignment 2 Discussion 24/02/ /02/2018

Practice Assignment 2 Discussion 24/02/ /02/2018 German University in Cairo Faculty of MET (CSEN 1001 Computer and Network Security Course) Dr. Amr El Mougy 1 RSA 1.1 RSA Encryption Practice Assignment 2 Discussion 24/02/2018-29/02/2018 Perform encryption

More information

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Trustworthiness of detectors in quantum key distribution with untrusted detectors Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,

More information

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography Lecture 19: (Diffie-Hellman Key Exchange & ElGamal Encryption) Recall In private-key cryptography the secret-key sk is always established ahead of time The secrecy of the private-key cryptography relies

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Quantum Communication

Quantum Communication Quantum Communication Nicolas Gisin, Hugo Zbinden, Mikael Afzelius Group of Applied Physics Geneva University, Switzerland Nonlocal Secret Randomness Quantum Key Distribution Quantum Memories and Repeaters

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 11 October 7, 2015 CPSC 467, Lecture 11 1/37 Digital Signature Algorithms Signatures from commutative cryptosystems Signatures from

More information

Quantum key distribution

Quantum key distribution Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles

More information

arxiv:quant-ph/ v1 27 Dec 2004

arxiv:quant-ph/ v1 27 Dec 2004 Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,

More information

Bit-Commitment and Coin Flipping in a Device-Independent Setting

Bit-Commitment and Coin Flipping in a Device-Independent Setting Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).

More information

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University Number Theory, Public Key Cryptography, RSA Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr The Euler Phi Function For a positive integer n, if 0

More information

Quantum Teleportation Pt. 3

Quantum Teleportation Pt. 3 Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation

More information

RIVF 2006 Tutorial. Prof. Patrick Bellot PhD. Dang Minh Dung. ENST (Paris) & IFI (Hanoi) RIVF 2006 Tutorial. "Quantum Communications"

RIVF 2006 Tutorial. Prof. Patrick Bellot PhD. Dang Minh Dung. ENST (Paris) & IFI (Hanoi) RIVF 2006 Tutorial. Quantum Communications 4th IEEE International Conference RIVF 2006 - p. 1 ENST (Paris) & IFI (Hanoi) 4th IEEE International Conference RIVF 2006 - p. 2 Outline 1 2 3 4 5 4th IEEE International Conference RIVF 2006 - p. 3 The

More information

C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 111 C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i

More information

Lecture 28: Public-key Cryptography. Public-key Cryptography

Lecture 28: Public-key Cryptography. Public-key Cryptography Lecture 28: Recall In private-key cryptography the secret-key sk is always established ahead of time The secrecy of the private-key cryptography relies on the fact that the adversary does not have access

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016

More information

arxiv:quant-ph/ v3 13 Mar 2007

arxiv:quant-ph/ v3 13 Mar 2007 Quantum Cryptography: from Theory to Practice Hoi-Kwong Lo and Norbert Lütkenhaus Center for Quantum Information and Quantum Control, Department of Physics and Department of Electrical & Computer Engineering,

More information

8 Elliptic Curve Cryptography

8 Elliptic Curve Cryptography 8 Elliptic Curve Cryptography 8.1 Elliptic Curves over a Finite Field For the purposes of cryptography, we want to consider an elliptic curve defined over a finite field F p = Z/pZ for p a prime. Given

More information

arxiv:quant-ph/ v2 7 Nov 2001

arxiv:quant-ph/ v2 7 Nov 2001 Quantum key distribution using non-classical photon number correlations in macroscopic light pulses A.C. Funk and M.G. Raymer Oregon Center for Optics and Department of Physics, University of Oregon, Eugene,

More information

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

Unitary evolution: this axiom governs how the state of the quantum system evolves in time. CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the

More information

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems

CPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems CPE 776:DATA SECURITY & CRYPTOGRAPHY Some Number Theory and Classical Crypto Systems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Some Number Theory

More information

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015 L7. Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang, 5 March 2015 1 Outline The basic foundation: multiplicative group modulo prime The basic Diffie-Hellman (DH) protocol The discrete logarithm

More information

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER

More information

CRYPTOGRAPHY AND NUMBER THEORY

CRYPTOGRAPHY AND NUMBER THEORY CRYPTOGRAPHY AND NUMBER THEORY XINYU SHI Abstract. In this paper, we will discuss a few examples of cryptographic systems, categorized into two different types: symmetric and asymmetric cryptography. We

More information

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups Great Theoretical Ideas in CS V. Adamchik CS 15-251 Upcoming Interview? Lecture 24 Carnegie Mellon University Cryptography and RSA How the World's Smartest Company Selects the Most Creative Thinkers Groups

More information

Odd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initi

Odd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initi Odd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initial state is completely known, the future can be predicted.

More information

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Cryptography in the Quantum Era Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International Postulate #1: Qubit state belongs to Hilbert space of dimension 2 ψ

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Chapter 5 Introduction to Quantum Cryptography Xiaoqing Tan Additional information is available at the end of the chapter http://dx.doi.org/10.5772/56092 1. Introduction Broadly speaking, cryptography

More information

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement

More information