Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016
|
|
- Lily Watts
- 5 years ago
- Views:
Transcription
1 Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016 Vadim Makarov
2 Security model of QKD Security proof.laws of physics & Model of equipment Hack Integrate imperfection into security model
3 Attack Target component Tested system Intersymbol interference intensity modulator in Alice research system K. Yoshino et al., poster at QCrypt (2016) Laser damage any ID Quantique, V. Makarov et al., Phys. Rev. A 94, (2016) research system Spatial efficiency mismatch receiver optics research system M. Rau et al., IEEE J. Quantum Electron. 21, (2015); S. Sajeed et al., Phys. Rev. A 91, (2015) Pulse energy calibration classical watchdog detector ID Quantique S. Sajeed et al., Phys. Rev. A 91, (2015) Trojan-horse phase modulator in Alice SeQureNet I. Khan et al., presentation at QCrypt (2014) Trojan-horse phase modulator in Bob ID Quantique * N. Jain et al., New J. Phys. 16, (2014) Detector saturation homodyne detector SeQureNet H. Qin, R. Kumar, R. Alleaume, Proc. SPIE 88990N (2013) Shot-noise calibration classical sync detector SeQureNet P. Jouguet, S. Kunz-Jacques, E. Diamanti, Phys. Rev. A 87, (2013) Wavelength-selected PNS intensity modulator (theory) M.-S. Jiang, S.-H. Sun, C.-Y. Li, L.-M. Liang, Phys. Rev. A 86, (2012) Multi-wavelength beamsplitter research system H.-W. Li et al., Phys. Rev. A 84, (2011) Deadtime single-photon detector research system H. Weier et al., New J. Phys. 13, (2011) Channel calibration single-photon detector ID Quantique N. Jain et al., Phys. Rev. Lett. 107, (2011) Faraday-mirror Faraday mirror (theory) S.-H. Sun, M.-S. Jiang, L.-M. Liang, Phys. Rev. A 83, (2011) Detector control single-photon detector ID Quantique, MagiQ, I. Gerhardt et al., Nat. Commun. 2, 349 (2011); L. Lydersen et al., Nat. Photonics 4, 686 (2010) research system * Attack did not break security of the tested system, but may be applicable to a different implementation.
4 Today s digital Crypto module Bus Memory Software Bus Signal proc. DAC Amplifier vs. quantum Crypto module Optical line [vs. future quantum] Crypto module Quantum bus, computer, memory...
5 Preventing Trojan-horse attack in plug-and-play QKD ID Quantique Clavis2 Alice Bob FM ϕ A DL sync VOA PBS ϕ B BS C D0 D1 L Pulse-energymonitoring detector S. Sajeed et al., Phys. Rev. A 91, (2015)
6 Pulse-energy-monitoring detector Reset +3.3 V R 33 Comparator P opt C Alarm Vamp V th Theory: Implementation: P opt 0 V amp t 0 Alarm S. Sajeed et al., Phys. Rev. A 91, (2015)
7 Pulse-energy-monitoring detector Reset +3.3 V R 33 Comparator P opt C Alarm Vamp V th Certification standard (internal by ID Quantique): P opt 0 V amp t 0 Alarm S. Sajeed et al., Phys. Rev. A 91, (2015)
8 Pulse-energy-monitoring detector Reset +3.3 V R 33 Comparator P opt C Alarm Vamp V th Theory: Implementation: P opt 0 V amp t 0 Alarm S. Sajeed et al., Phys. Rev. A 91, (2015)
9 Pulse-energy-monitoring detector Reset +3.3 V R 33 Comparator P opt C Alarm Vamp V th Theory: Attack: P opt 0 V amp t 0 Alarm S. Sajeed et al., Phys. Rev. A 91, (2015)
10 Lesson 1. Industry needs implementation standards, certification and testing standards. ETSI industry specification group for QKD R. Alléaume et al., Proc. IEEE Globecom Workshop 2014, p. 656 First security standard: Trojan-horse in one-way system Alice Isolator(s) Att. BPF M. Lucamarini et al., Phys. Rev. X 5, (2015)
11 Lesson 1. Industry needs implementation standards, certification and testing standards. Once equipment is tested and certified, end of story? Can Eve modify equipment after installation? Crypto module Optical line
12 Efficiency mismatch in QKD receiver Alice Eve Bob Scanning Laser Att. PC ɸ Focal plane BS 45 rotated PBS1 Y X 26.1 m Pinhole BPF PBS2 PBS1 PBS2 D Damaging V H A Laser S. Sajeed et al., Phys. Rev. A 91, (2015) V. Makarov et al., Phys. Rev. A 94, (2016)
13 Thorlabs P20S pinhole 13 μm thick stainless steel 3.6 W, 810 nm laser 0 1 mm *Sound was added later
14 Thorlabs P20S pinhole 13 μm thick stainless steel 3.6 W, 810 nm laser 0 1 mm *Sound was added later
15 Detector efficiency with laser-damaged pinhole ϕ (mrad) 0 H V D A ϕ 10 θ θ (mrad) A H V D Attack angles V. Makarov et al., Phys. Rev. A 94, (2016)
16 Informal security evaluation Only industrial designs NDA, full access to engineering documentation Team of experts :) Stage I: Initial analysis of documentation Stage II: Lab testing Photo 2016 Vadim Makarov Identify all known potential vulnerabilities in optics and electronics (Q1 4)
17 Security analysis layers in quantum communication Q7. Installation and maintenance procedures Q6. Application interface Q5. Post-processing (e.g., for QKD: sifting, error correction, privacy amplification, authentication) Q4. Operation cycle (state machine) Q3. Driver and calibration algorithms Q2. Analog electronics interface Q1. Optics
18 Example of initial analysis report
19
Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto
Quantum Hacking Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto 1 Outline Introduction Quantum Key Distribution (QKD) Practical QKD Quantum Hacking Fake-state & Time-shifted
More informationContinuous-variable quantum key distribution with a locally generated local oscillator
Continuous-variable quantum key distribution with a locally generated local oscillator Bing Qi, Pavel Lougovski, Raphael Pooser, Warren Grice, Miljko Bobrek, Charles Ci Wen Lim, and Philip G. Evans Quantum
More informationQuantum cryptography and quantum hacking. Dr. Lars Lydersen
Quantum cryptography and quantum hacking Dr. Lars Lydersen GOVCERT.NL, Rotterdam 5. November 2 Quantum Hacking group NTNU, Trondheim & UNIK, Kjeller www.iet.ntnu.no/groups/optics/qcr/ Prof. Johannes Skaar
More informationQCRYPT Saturation Attack on Continuous-Variable Quantum Key Distribution System. Hao Qin*, Rupesh Kumar, and Romain Alléaume
QCRYPT 2013 August 04,2013 IQC, University of Waterloo Canada Saturation Attack on Continuous-Variable Quantum Key Distribution System Hao Qin*, Rupesh Kumar, and Romain Alléaume Quantum Information Team
More informationQuantum Key Distribution. The Starting Point
Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated
More informationApplications of Quantum Key Distribution (QKD)
Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,
More informationRealization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled Light
T. Eberle 1, V. Händchen 1, F. Furrer 2, T. Franz 3, J. Duhme 3, R.F. Werner 3, R. Schnabel 1 Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled
More informationIntrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin
Intrinsic-Stabilization Uni-Directional Quantum Key Distribution Between Beijing and Tianjin Xiao-fan Mo 1, Bing Zhu 1, 2, Zheng-fu Han 1*, You-zhen Gui 1, Guang-can Guo 1 1 Key Lab of Quantum Information
More informationQuantum threat...and quantum solutions
Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique
More informationQuantum Information Transfer and Processing Miloslav Dušek
Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the
More informationarxiv: v3 [quant-ph] 12 Jul 2017
Invisible Trojan-horse attack Shihan Sajeed 1,2,*, Carter Minshull 1,3, Nitin Jain 4,, and Vadim Makarov 3,1,2 1 Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1 Canada 2
More informationSecurity and implementation of differential phase shift quantum key distribution systems
Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006 Classical cryptography cryptography = κρυπτός +
More informationQuantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer
Centre for Quantum Technologies, Singapore QUANTUM OPTICS Entanglement-based Free Space Quantum Cryptography in Full Daylight, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer
More informationarxiv:quant-ph/ v2 7 Nov 2001
Quantum key distribution using non-classical photon number correlations in macroscopic light pulses A.C. Funk and M.G. Raymer Oregon Center for Optics and Department of Physics, University of Oregon, Eugene,
More informationPractical Quantum Key Distribution
Leopold-Franzens-Universität Innsbruck Institut für Experimentalphysik Technikerstrasse 25 http://www.uibk.ac.at Practical Quantum Key Distribution Gregor Weihs Contents QKD Protocols Implementations of
More informationNational Institute of Standards and Technology Gaithersburg, MD, USA
National Institute of Standards and Technology Gaithersburg, MD, USA Physics y Laboratoryy & Information Technology Laboratory J. C. Bienfang, A. Restelli, D. Rogers, J. Galang C. W. Clark, Carl J. Williams
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationQuantum key distribution
Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles
More informationExperimental realization of quantum cryptography communication in free space
Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao
More informationSchemes to generate entangled photon pairs via spontaneous parametric down conversion
Schemes to generate entangled photon pairs via spontaneous parametric down conversion Atsushi Yabushita Department of Electrophysics National Chiao-Tung University? Outline Introduction Optical parametric
More informationGround-Satellite QKD Through Free Space. Steven Taylor
Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More informationPractical aspects of QKD security
Practical aspects of QKD security Alexei Trifonov Audrius Berzanskis MagiQ Technologies, Inc. Secure quantum communication Protected environment Alice apparatus Optical channel (insecure) Protected environment
More informationState Decoding in Multi-Stage Cryptography Protocols
State Decoding in Multi-Stage Cryptography Protocols Sindhu Chitikela Abstract. This paper presents a practical method of quantum tomography for decoding the state of photons in a multistage cryptography
More informationMeasurement-device-independent quantum communication with an untrusted source
Measurement-device-independent quantum communication with an untrusted source Feihu Xu Research Laboratory of Electronics, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, Massachusetts
More informationarxiv: v1 [quant-ph] 10 Mar 2018
Quantum man-in-the-middle attack on the calibration process of quantum key distribution Yang-Yang Fei 1, Xiang-Dong Meng 1, Ming Gao 1,*, Hong Wang 1, and Zhi Ma 1,2 arxiv:1803.04407v1 [quant-ph] 10 Mar
More informationRealization of B92 QKD protocol using id3100 Clavis 2 system
Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and
More informationDevice-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles
Device-independent Quantum Key Distribution and Randomness Generation Stefano Pironio Université Libre de Bruxelles Tropical QKD, Waterloo, June 14-17, 2010 Device-independent security proofs establish
More informationTrustworthiness of detectors in quantum key distribution with untrusted detectors
Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,
More informationFundamental Security Issues in Continuous Variable Quantum Key Distribution
Fundamental Security Issues in Continuous Variable Quantum Key Distribution arxiv:1208.5827v1 [quant-ph] 29 Aug 2012 Horace P. Yuen Department of Electrical Engineering and Computer Science Department
More informationSecurity of Quantum Key Distribution with Imperfect Devices
Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo
More informationDevelopment of Soft X-rayX using Laser Compton Scattering
26 th Advanced ICFA Beam Dynamics Workshop on Nanometre-Size Colliding Beams September 2-6, 2002 at Lausanne Development of Soft X-rayX Source using Laser Compton Scattering R. Kuroda*, S. Kashiwagi*,
More informationTWO-LAYER QUANTUM KEY DISTRIBUTION
TWO-LAYER QUANTUM KEY DISTRIBUTION PAULO VINÍCIUS PEREIRA PINHEIRO and RUBENS VIANA RAMOS paulovpp@gmail.com rubens.viana@pq.cnpq.br Laboratory of Quantum Information Technology, Department of Teleinformatic
More informationQuantum Communication. Serge Massar Université Libre de Bruxelles
Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?
More informationHigh rate quantum cryptography with untrusted relay: Theory and experiment
High rate quantum cryptography with untrusted relay: Theory and experiment CARLO OTTAVIANI Department of Computer Science, The University of York (UK) 1st TWQI Conference Ann Arbor 27-3 July 2015 1 In
More informationBB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits
BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits (*) Yoshihiro NAMBU*, Takaaki HATANAKA, and Kazuo NAKAMURA (*) Corresponding author: E-mail address: y-nambu@ah.jp.nec.com
More informationPractical quantum-key. key- distribution post-processing
Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert
More informationAttacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
entropy Article Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol Michel Boyer, Rotem Liss, * and Tal Mor Département d Informatique et de Recherche Opérationnelle
More informationSimulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber
Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/0601168 v2 12 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum
More informationA Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016
More information+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1
Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction
More informationQuantum Imaging Technologies: Quantum Laser Radar
MURI 2005 Quantum Imaging: New Methods and Applications Year 3 Review / 17 November 2008 / UMBC, Baltimore, MD Quantum Imaging Technologies: Quantum Laser Radar Prem Kumar and Geraldo Barbosa EECS Department,
More informationLabs 3-4: Single-photon Source
Labs 3-4: Single-photon Source Lab. 3. Confocal fluorescence microscopy of single-emitter Lab. 4. Hanbury Brown and Twiss setup. Fluorescence antibunching 1 Labs 3-4: Single-photon Source Efficiently produces
More informationQuantum Cryptography
Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum
More informationTrojan-horse attacks on quantum-key-distribution systems
Trojan-horse attacks on quantum-key-distribution systems N. Gisin, 1 S. Fasel, 1 B. Kraus, 1 H. Zbinden, 1 and G. Ribordy 2 1 Group of Applied Physics, University of Geneva, 1211 Geneva 4, Switzerland
More informationHigh Fidelity to Low Weight. Daniel Gottesman Perimeter Institute
High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,
More informationCryptography in a quantum world
T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?
More informationQUANTUM key distribution (QKD) [1] is a provably secure
IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, VOL. 21, NO. 3, MAY/JUNE 2015 6600905 Spatial Mode Side Channels in Free-Space QKD Implementations Markus Rau, Tobias Vogl, Giacomo Corrielli, Gwenaelle
More informationQuantum Communication
Quantum Communication Nicolas Gisin, Hugo Zbinden, Mikael Afzelius Group of Applied Physics Geneva University, Switzerland Nonlocal Secret Randomness Quantum Key Distribution Quantum Memories and Repeaters
More informationResearch, Development and Simulation of Quantum Cryptographic Protocols
http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:
More informationETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK
ETSI/IQC QUANTUM SAFE WORKSHOP TECHNICAL TRACK SESSION 1 World Tour HIGHLIGHTS Session focused on activity world wide on quantum safe communications research and policy. Matthew Scholl (NIST) described
More informationQuantum Technologies for Cryptography
University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms
More informationarxiv:quant-ph/ v1 25 Dec 2006
Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol Toyohiro Tsurumaru Mitsubishi Electric Corporation, Information Technology R&D Center 5-1-1
More informationSimulation of BB84 Quantum Key Distribution in depolarizing channel
Simulation of BB84 Quantum Key Distribution in depolarizing channel Hui Qiao, Xiao-yu Chen * College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China xychen@mail.zjgsu.edu.cn
More informationOptical Quantum Communication with Quantitative Advantage. Quantum Communication
Optical Quantum Communication with Quantitative Advantage Juan Miguel Arrazola Benjamin Lovitz Ashutosh Marwah Dave Touchette Norbert Lütkenhaus Institute for Quantum Computing & Department of Physics
More informationAn ultrafast quantum random number generator based on quantum phase fluctuations
An ultrafast quantum random number generator based on quantum phase fluctuations Feihu Xu, Bing Qi, Xiongfeng Ma, He Xu, Haoxuan Zheng, and Hoi-Kwong Lo Center for Quantum Information and Quantum Control,
More informationCommunications Quantiques
Communications Quantiques Hugo Zbinden Groupe de Physique Appliquée Quantum Technologies Université de Genève Cryptographie Quantique Génération de nombres aléatoires Stéganographie basée sur du bruit
More informationSummary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.
The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer
More informationCounterfactual Quantum Deterministic Key Distribution
Commun. Theor. Phys. 59 (013 7 31 Vol. 59, No. 1, January 15, 013 Counterfactual Quantum Deterministic Key Distribution ZHANG Sheng (Ǒ, WANG Jian (, and TANG Chao-Jing (» School of Electronic Science and
More informationarxiv: v3 [quant-ph] 25 Feb 2015
Trustworthiness of detectors in quantum key distribution with untrusted detectors arxiv:1410.3685v3 [quant-ph] 25 Feb 2015 1, 2, Bing Qi 1 Quantum Information Science Group, Computational Sciences and
More informationModeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++
Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++ Ryan D. L. Engle, Douglas D. Hodson, Michael R. Grimaila, Logan O. Mailloux, Colin V. McLaughlin and Gerald Baumgartner Air
More informationEXPERIMENTAL DEMONSTRATION OF QUANTUM KEY
EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY DISTRIBUTION WITH ENTANGLED PHOTONS FOLLOWING THE PING- PONG CODING PROTOCOL Martin Ostermeyer, Nino Walenta University of Potsdam, Institute of Physics, Nonlinear
More informationQuantum Imaging Technologies: Quantum Laser Radar
MURI 2005 Quantum Imaging: New Methods and Applications Year 4 Review / 13 November 2009 / Northwestern University, Evanston, IL Quantum Imaging Technologies: Quantum Laser Radar Prem Kumar and Geraldo
More informationON THE POSSIBILITY OF USING OPTICAL Y-SPLITTER IN QUANTUM RANDOM NUMBER GENERATION SYSTEMS BASED ON FLUCTUATIONS OF VACUUM
NANOSYSTEMS: PHYSICS, CHEMISTRY, MATHEMATICS, 05, 6 (), P. 95 99 ON THE POSSIBILITY OF USING OPTICAL Y-SPLITTER IN QUANTUM RANDOM NUMBER GENERATION SYSTEMS BASED ON FLUCTUATIONS OF VACUUM A. E. Ivanova,
More informationDetection loophole-free photon key distribution using coherent light
Detection loophole-free photon key distribution using coherent light Byoung S. Ham Center for Photon Information Processing, School of Electrical Engineering and Computer Science, Gwangju Institute of
More informationCyber Security in the Quantum Era
T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act
More informationSecurity of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C
Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used
More informationExperimental plug and play quantum coin flipping
Experimental plug and play quantum coin flipping Anna Pappa, Paul Jouguet, Thomas Lawson, André Chailloux, Matthieu Legré, Patrick Trinkler, Iordanis Kerenidis, Eleni Diamanti To cite this version: Anna
More informationPART 2 : BALANCED HOMODYNE DETECTION
PART 2 : BALANCED HOMODYNE DETECTION Michael G. Raymer Oregon Center for Optics, University of Oregon raymer@uoregon.edu 1 of 31 OUTLINE PART 1 1. Noise Properties of Photodetectors 2. Quantization of
More informationNovel Side Channel Attacks in Continuous Variable Quantum Key Distribution arxiv: v2 [quant-ph] 18 Jun 2015
Novel Side Channel Attacks in Continuous Variable Quantum Key Distribution arxiv:1502.01169v2 [quant-ph] 18 Jun 2015 Elizabeth Newton Matthew C.J. Everitt Freya L. Wilson Benjamin T.H. Varcoe 18/06/2015
More informationHONG JIN KONG Department of Physics, KAIST, Gusong-dong, Yusong-gu, Daejon Korea
Beam combined high energy/high power laser system operating at a repetition rate over 10Hz for laser fusion driver using stimulated Brillouin scattering phase conjugate mirrors HONG JIN KONG Department
More informationSimulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber
Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber arxiv:quant-ph/06068v2 2 Oct 2006 Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian Center for Quantum
More informationSQL injection principle against BB84 protocol
INTERNATIONAL JOURNAL OF COMPUTERS AND COMMUNICATIONS Volume 11, 017 SQL injection principle against BB84 protocol H.Amellal, A.Meslouhi and Y. Hassouni Faculté des Sciences, Département de Physique, LPT-URAC-13,
More informationPractical Issues in Quantum Cryptography
Practical Issues in Quantum Cryptography by Feihu Xu A thesis submitted in conformity with the requirements for the degree of Master of Applied Science Graduate Department of Electrical & Computer Engineering
More informationFundamental rate-loss tradeoff for optical quantum key distribution
Fundamental rate-loss tradeoff for optical quantum key distribution Masahiro Takeoka (NICT) Saikat Guha (BBN) Mark M. Wilde (LSU) Quantum Krispy Kreme Seminar @LSU January 30, 2015 Outline Motivation Main
More informationA central problem in cryptography: the key distribution problem.
Scientific American 314, 48-55 (2016) A central problem in cryptography: the key distribution problem. Mathematics solution: public key cryptography. Public-key cryptography relies on the computational
More informationStandardization of Quantum Cryptography in China
Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018 CONTENTS 1 Background on Quantum Cryptography
More informationQuantum Cryptography. Marshall Roth March 9, 2007
Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and
More informationAPPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD
2016/2500M-0054 ISSN 1797-3457 (verkkojulkaisu) ISBN (PDF) 978-951-25-2850-9 SUMMARY REPORT APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD Ilkka Tittonen, professor, Department of Micro- and
More informationarxiv:quant-ph/ v1 22 Mar 2002
Quantum Key Distribution over 67 km with a plug&play system arxiv:quant-ph/0203118v1 22 Mar 2002 I D. Stucki, N. Gisin, O. Guinnard*, G. Ribordy*, H. Zbinden GAP-Optique, University of Geneva, rue de l
More informationMassachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.
More informationEntropy Accumulation in Device-independent Protocols
Entropy Accumulation in Device-independent Protocols QIP17 Seattle January 19, 2017 arxiv: 1607.01796 & 1607.01797 Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, & Thomas Vidick Outline
More informationSingle Photon Generation & Application in Quantum Cryptography
Single Photon Generation & Application in Quantum Cryptography Single Photon Sources Photon Cascades Quantum Cryptography Single Photon Sources Methods to Generate Single Photons on Demand Spontaneous
More informationSupplementary Figures
Supplementary Figures Supplementary Figure. X-ray diffraction pattern of CH 3 NH 3 PbI 3 film. Strong reflections of the () family of planes is characteristics of the preferred orientation of the perovskite
More informationQuantum applications and spin off discoveries in rare earth crystals
Quantum applications and spin off discoveries in rare earth crystals Stefan Kröll Dept. of Physics, Lund University Knut och Alice Wallenbergs Stiftelse Funded by the European Union Rare earth doped crystals
More informationLaboratory 3: Confocal Microscopy Imaging of Single Emitter Fluorescence and Hanbury Brown, and Twiss Setup for Photon Antibunching
Laboratory 3: Confocal Microscopy Imaging of Single Emitter Fluorescence and Hanbury Brown, and Twiss Setup for Photon Antibunching Jonathan Papa 1, * 1 Institute of Optics University of Rochester, Rochester,
More informationarxiv:quant-ph/ v1 26 Mar 2001
Performance of Photon-Pair Quantum Key Distribution Systems Z. Walton, 1 A. V. Sergienko, 1,2 M. Atatüre, 2 B. E. A. Saleh, 1 and M. C. Teich 1,2 1 Quantum Imaging Laboratory, Department of Electrical
More informationQuantum Cryptography
http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.
More informationA semi-device-independent framework based on natural physical assumptions
AQIS 2017 4-8 September 2017 A semi-device-independent framework based on natural physical assumptions and its application to random number generation T. Van Himbeeck, E. Woodhead, N. Cerf, R. García-Patrón,
More informationBeam Dynamics and SASE Simulations for XFEL. Igor Zagorodnov DESY
Beam Dynamics and SASE Simulations for XFEL Igor Zagorodnov 4.. DESY Beam dynamics simulations for the European XFEL Full 3D simulation method ( CPU, ~ hours) Gun LH M, M,3 E = 3 MeV E = 7 MeV E 3 = 4
More informationContinuous Variable Quantum Key Distribution with a Noisy Laser
Entropy 2015, 17, 4654-4663; doi:10.3390/e17074654 OPEN ACCESS entropy ISSN 1099-4300 www.mdpi.com/journal/entropy Article Continuous Variable Quantum Key Distribution with a Noisy Laser Christian S. Jacobsen,
More informationEnigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski
1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every
More informationQuantum Key Distribution
Quantum Key Distribution QUT Mathematics Society September 2, 2015 Dr Douglas Stebila Outline 1. Qubits 2. Basic QKD BB84 3. Entanglement-based QKD 4. Classical processing 5. Authentication Security of
More informationInvestigation of System Performance of Quantum Cryptography Key Distribution in Network Security
Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security Mehrdad Sepehri Sharbaf Senior IEEE Member California State University Dominguez Hills Computer Science
More informationSuperconducting Single-photon Detectors
: Quantum Cryptography Superconducting Single-photon Detectors Hiroyuki Shibata Abstract This article describes the fabrication and properties of a single-photon detector made of a superconducting NbN
More informationA Guide to Experiments in Quantum Optics
Hans-A. Bachor and Timothy C. Ralph A Guide to Experiments in Quantum Optics Second, Revised and Enlarged Edition WILEY- VCH WILEY-VCH Verlag CmbH Co. KGaA Contents Preface 1 Introduction 1.1 Historical
More informationChapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution
Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation
More informationAn entangled LED driven quantum relay over 1km
An entangled LED driven quantum relay over 1km Christiana Varnava 1,2 R. Mark Stevenson 1, J. Nilsson 1, J. Skiba Szymanska 1, B. Dzurnak 1, M. Lucamarini 1, A. J. Bennett 1,M. B. Ward 1, R. V. Penty 2,I.
More informationBiased decoy-state reference-frame-independent quantum. key distribution
iased decoy-state reference-frame-independent quantum key distribution JIN-RONG ZHU 12# CHUN-MEI ZHNG 12# GUNG-CN GUO 123 QIN WNG 123* 1 Institute of Signal Processing Transmission Nanjing University of
More informationarxiv: v2 [quant-ph] 5 Oct 2009
Proof-of-Concept of Real-World Quantum Key Distribution with Quantum Frames arxiv:91.612v2 [quant-ph] 5 Oct 29 I. Lucio-Martinez 1, P. Chan 2, X. Mo 1, S. Hosier 3, W. Tittel 1 1 University of Calgary,
More information