+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Similar documents
C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 99

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Quantum Cryptography

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Introduction to Quantum Cryptography

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Quantum Cryptography. Marshall Roth March 9, 2007

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Research, Development and Simulation of Quantum Cryptographic Protocols

10 - February, 2010 Jordan Myronuk

LECTURE NOTES ON Quantum Cryptography

Realization of B92 QKD protocol using id3100 Clavis 2 system

Security Implications of Quantum Technologies

Quantum Cryptography and Security of Information Systems

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

A probabilistic quantum key transfer protocol

Cryptography in a quantum world

Ping Pong Protocol & Auto-compensation

1 1D Schrödinger equation: Particle in an infinite box

Quantum Information Transfer and Processing Miloslav Dušek

Entanglement and information

Introduction to Quantum Key Distribution

1 1D Schrödinger equation: Particle in an infinite box

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Quantum Cryptography

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

quantum distribution of a sudoku key Sian K. Jones University of South Wales

Quantum threat...and quantum solutions

Device-Independent Quantum Information Processing

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

A Matlab Realization of Shor s Quantum Factoring Algorithm

Quantum Technologies: Threats & Solutions to Cybersecurity

APPLICATIONS. Quantum Communications

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Uncertainty Principle

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

Deterministic secure communications using two-mode squeezed states

APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD

Entanglement and Quantum Teleportation

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada

arxiv:quant-ph/ v1 6 Dec 2005

Applications of Quantum Key Distribution (QKD)

State Decoding in Multi-Stage Cryptography Protocols

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Calculation of the Key Length for Quantum Key Distribution

Secrecy and the Quantum

The Relativistic Quantum World

EPR paradox, Bell inequality, etc.

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Quantum Cryptography

Quantum cryptography -the final battle?

Ground-Satellite QKD Through Free Space. Steven Taylor

Advanced Cryptography Quantum Algorithms Christophe Petit

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Quantum sampling of mixed states

Perfectly secure cipher system.

Quantum Cryptography

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Device-Independent Quantum Information Processing (DIQIP)

Quantum Communication

Alternative Approaches Quantum Cryptography and Bounded Storage Model

Quantum Entanglement Assisted Key Distribution

Quantum Wireless Sensor Networks

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

An Introduction to Quantum Information and Applications

arxiv:quant-ph/ v2 17 Sep 2002

Quantum key distribution for the lazy and careless

Quantum key distribution

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

Cryptography: the science of secret communications

arxiv:quant-ph/ v1 13 Jan 2003

Error Reconciliation in QKD. Distribution

arxiv:quant-ph/ v2 3 Oct 2000

Problem Set: TT Quantum Information

Technical Report Communicating Secret Information Without Secret Messages

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Quantum cryptography: from theory to practice

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography

Communications Quantiques

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v2 2 Jan 2007

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

CPSC 467b: Cryptography and Computer Security

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Transcription:

Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction Deficiencies of classical cryptography Solution: Quantum Cryptography Fundamentals of Quantum Cryptography Quantum Key Distribution (QKD) BB84 without eavesdropping BB84 with eavesdropping Implementation Summary Introduction Deficiencies of Classical Cryptography Quantum cryptography is the single most successful application of Quantum Computing/Information theory. For the first time in history, we can use the forces of nature to implement perfectly secure cryptosystems. Quantum cryptography has been tried experimentally: it works! Distribution of the key is the main problem with classical cryptography. An eavesdropper can passively snoop secret key as its been exchanged. Security relies on unproven mathematical assumptions such as difficulty of factoring last integers. A quantum computer can easily crake all possible classical cryptographic solutions. Classical cryptographic is vulnerable to quantum attacks.

Solution: Quantum Cryptography + = OTP + QKD = QC OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography Concepts of the Quantum Mechanics Light waves are propagated as discrete quanta called photons. They are mass less and have energy, momentum and angular momentum called spin. Spin carries the polarization. If on its way we put a polarization filter, a photon may pass through it or may not. We can use a detector to check of a photon has passed through a filter. Concepts of the Quantum Mechanics Polarization Measurement Measuring a quantum system will alter its state. Example: the Qubit. When observed, the state of a qubit will collapse to either a= or b=. s A photon is an electromagnetic wave. Polarization A photon has a property called polarization, which is the plane in which the electric field oscillates. We can use photons of different polarizations to represent quantum states. ψ = a + b o θ = state o θ = 9 state The polarization basis is the mapping to decide to use for a particular state. Rectilinear : (,) ( o, 9 o ) θ = o state θ = 9 o state Diagonal : (,) (45 o, 35 o ) θ = 45 o state θ = 35 o state

Measurement in the Same Measurement in Different Measurement in the same basis does not change the state. Quantum Key Distribution & Protocols Quantum Key Distribution exploits the effects discussed in order to thwart eavesdropping. If an eavesdropper uses the wrong polarization basis to measure the channel, the result of the measurement will be random. QKD Protocols A protocol is a set of rules governing the exchange of message over a channel. There are three main quantum protocols.. BB84 By C. H. Bennett and G. Brassard (984) 2. Entanglement Based QKD proposed by A. K. Ekert (99) 3. B92 Proposed by C. H. Bennett (992) Meet Alice and Bob We have to prevent Eve from eavesdropping on communications between Alice and Bob. Alice Eve Bob

BB84 Protocol BB84 was the first security protocol implementing QKD (Quantum Key Distribution). It uses the idea of photon polarization. The Key consists of bits that will be transmitted as photons. Each bit is encoded with a random polarization basis. BB84 Without Eavesdropping (Step-) Alice Select random sequence of bits(,). Alice encoded selected bits with random basis(+, x). Bit BB84 Without Eavesdropping (Step-2) Bob receives the photons and must decode them using a random basis. Bit Some of Bob s basis and resulting bits are correct. BB84 Without Eavesdropping (Step-3) Alice and Bob talk on the telephone: Alice chooses a subset of the bits (the test bits) ) and reveals which basis she used to encode them to Bob. Bob tells Alice which basis he used to decode the same bits. Where the same basis was used, Alice tells Bob what bits he ought to have got. Alice s Bit Alice s Bob s Bob s Bit Test bits The test bits allow Alice and Bob to test whether the channel is secure.

BB84 Without Eavesdropping (Step-4) Test bits are removed. Alice tells Bob the basis used for other bits. They agree on common set of bits. Alice s Bit Alice s BB84 With Eavesdropping = / Alice s Bit Alice s Eve s Eve s Bit Bob s Bob s Bob s Bit Test bits Final Key = Bob s Bit Eve s presence can be detected with 2nd bit, where Alice and Bob use the same basis but get different results. After discussion, they discard 3rd and 4th bit. Now Alice and Bob have common set of bits and this final set of bits is the final key. How it works!... How it works! Source: http://www.nature.com

Implementations As of March 27 the longest distance over which quantum key distribution has been demonstrated using optic fibre is 48.7 km, achieved by Los Alamos/NIST using the BB84 protocol. The DARPA Quantum Network, a -node quantum cryptography network, has been running since 24 in Massachusetts, USA. It is being developed by BBN Technologies, Harvard University, Boston University, and QinetiQ. Three companies offering commercial quantum cryptography systems; id Quantique (Geneva), MagiQ Technologies (New York), SmartQuantum (France). Quantum encryption technology provided by the Swiss company id Quantique was used in the Swiss canton (state) of Geneva to transmit ballot results to the capitol in the national election occurring on Oct. 2, 27. The world's first computer network protected by quantum cryptography was implemented in October 28, at a scientific conference in Vienna. Summary Quantum cryptography is a major achievement in security engineering. Quantum cryptography, also known as quantum key distribution, allows us to send encrypted messages the secrecy of which can be guaranteed by allowing an eavesdropper to be detected. Secure messages have been sent over distances in excess of km using quantum cryptography with photons carried by optical fibres. As it gets implemented, it will allow perfectly secure bank transactions, secret discussions for government officials, and well-guarded trade secrets for industry! The next step will be to establish a "quantum network" that could allow quantum cryptography to cover cities and eventually the globe.