Quantum cryptography -the final battle?

Similar documents
Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Quantum Cryptography

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

LECTURE NOTES ON Quantum Cryptography

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

C. QUANTUM INFORMATION 99

10 - February, 2010 Jordan Myronuk

Security Implications of Quantum Technologies

C. QUANTUM INFORMATION 111

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Introduction to Quantum Cryptography

INTRODUCTION TO QUANTUM COMPUTING

Ping Pong Protocol & Auto-compensation

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

1 1D Schrödinger equation: Particle in an infinite box

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Quantum Cryptography. Marshall Roth March 9, 2007

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

quantum distribution of a sudoku key Sian K. Jones University of South Wales

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

QUANTUM CRYPTOGRAPHY. BCS, Plymouth University, December 1, Professor Kurt Langfeld Centre for Mathematical Sciences, Plymouth University

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

1 1D Schrödinger equation: Particle in an infinite box

Secrecy and the Quantum

Error Reconciliation in QKD. Distribution

Quantum Cryptography and Security of Information Systems

EPR paradox, Bell inequality, etc.

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum key distribution for the lazy and careless

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol

Uncertainty Principle

CS120, Quantum Cryptography, Fall 2016

Advanced Cryptography Quantum Algorithms Christophe Petit

arxiv:quant-ph/ v2 7 Nov 2001

Practical quantum-key. key- distribution post-processing

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

arxiv:quant-ph/ v1 13 Jan 2003

Quantum Cryptography

APPLICATIONS. Quantum Communications

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Efficient Quantum Key Distribution. Abstract

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.

Simulation of BB84 Quantum Key Distribution in depolarizing channel

Problem Set: TT Quantum Information

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

Entanglement and Quantum Teleportation

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

The Relativistic Quantum World

Quantum Cryptography : On the Security of the BB84 Key-Exchange Protocol

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Noisy Diffie-Hellman protocols

Research, Development and Simulation of Quantum Cryptographic Protocols

Security of Quantum Key Distribution with Imperfect Devices

Security and implementation of differential phase shift quantum key distribution systems

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

arxiv:quant-ph/ v2 19 Jan 2000

arxiv:quant-ph/ v2 2 Jan 2007

Number theory (Chapter 4)

Experimental realization of quantum cryptography communication in free space

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Single and Entangled photons. Edward Pei

Quantum secret sharing based on quantum error-correcting codes

arxiv:quant-ph/ v2 17 Sep 2002

Cryptography and Security Final Exam

Quantum key distribution with 2-bit quantum codes

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A probabilistic quantum key transfer protocol

An Introduction to Quantum Computing for Non-Physicists

Quantum Entanglement Assisted Key Distribution

Quantum Interference. Andrew M. Sessler Lawrence Berkeley Laboratory

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

CPSC 467b: Cryptography and Computer Security

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Week 11: April 9, The Enigma of Measurement: Detecting the Quantum World

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Quantum Information. and Communication

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada

Quantum Information & Quantum Computation

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

Analysis of the Influenceof the Rate of Spies Measure on the Quantum Transmission

Deterministic secure communications using two-mode squeezed states

Entanglement and information

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

Introduction to Quantum Computing for Folks

Calculation of the Key Length for Quantum Key Distribution

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

ASYMMETRIC ENCRYPTION

CS/Ph120 Homework 8 Solutions

Cryptography in a quantum world

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Applications of Quantum Key Distribution (QKD)

Quantum Teleportation Pt. 1

Ground-Satellite QKD Through Free Space. Steven Taylor

Transcription:

Quantum cryptography -the final battle? CS4236 Principles of Computer Security National University of Singapore Jonas Rundberg, NT030157A

This presentation Quantum mechanics Introduction Notation Polarized photons Experiment Quantum cryptology Key distribution Eavesdropping Detecting eavesdropping Noise Error correction Privacy Amplification Encryption

Quantum mechanics

Introduction Spawned during the last century Describes properties and interaction between matter at small distance scales Quantum state determined by(among others) Positions Velocities Polarizations Spins

Notation Bra/Ket notation (pronounced bracket ) From Dirac 1958 Each state represented by a vector denoted by a arrow pointing in the direction of the polarization

Notation Simplified Bra/Ket-notation in this presentation Representation of polarized photons: horizontally: vertically: diagonally: and

Polarized photons Polarization can be modeled as a linear combination of basis vectors and Only interested in direction a + b will result in a unit vector ψ such that a 2 + b 2 = 1 b a ψ

Polarized photons Measurement of a state not only measures but actually transforms that state to one of the basis vectors and If we chose the basis vectors and when measuring the state of the photon, the result will tell us that the photon's polarization is either or, nothing in between. b a ψ

Experiment Classical experiment Equipment: laser pointer three polarization filters The beam of light i pointed toward a screen. The three filters are polarized at, and respectively

Experiment The filter is put in front of the screen Light on outgoing side of filter is now 50% of original intensity

Experiment Next we insert a filter whereas no light continue on the output side

Experiment Here is the puzzling part We insert a filter in between This increases the number of photons passing through

Experiment explained Filter is hit by photons in random states. It will measure half of the photons polarized as

Experiment explained Filter is perpendicular to that and will measure the photons with respect to, which none of the incoming photons match

Experiment explained Filter measures the state with respect to the basis {,{ }

Experiment explained Photons reaching filter will be measured as with 50% chance. These photons will be measured by filter as with 50% probability and thereby 12,5% of the original light pass through all three filters.

Quantum cryptology

Key distribution Alice and Bob first agree on two representations for ones and zeroes One for each basis used, {,{ } and {,{ }. This agreement can be done in public Define 1 = 0 = 1 = 0 =

Key distribution - BB84 1. Alice sends a sequence of photons to Bob. Each photon in a state with polarization corresponding to 1 or 0, but with randomly chosen basis. 2. Bob measures the state of the photons he receives, with each state measured with respect to randomly chosen basis. 3. Alice and Bob communicates via an open channel. For each photon, they reveal which basis was used for encoding and decoding respectively. All photons which has been encoded and decoded with the same basis are kept, while all those where the basis don't agree are discarded.

Eavesdropping Eve has to randomly select basis for her measurement Her basis will be wrong in 50% of the time. Whatever basis Eve chose she will measure 1 or 0 When Eve picks the wrong basis, there is 50% chance that she'll measure the right value of the bit E.g. Alice sends a photon with state corresponding to 1 in the {,{ } basis. Eve picks the {,{ } } basis for her measurement which this time happens to give a 1 as result, which is correct.

Eavesdropping Eavesdropping Yes 0 yes {, } Yes 0 No 1 No {, } 0 Yes 1 Yes {, } No 0 Yes 1 No {, } 1 {, } Yes 0 No 1 No {, } Yes 0 Yes {, } 0 No 0 Yes 1 No {, } Yes 1 Yes {, } 1 {, } Correct Eve s bit Eve s photon Correct Eve s basis Alice s photon Alice s bit Alice s basis

Eves problem Eve has to re-send all the photons to Bob Will introduce an error, since Eve don't know the correct basis used by Alice Bob will detect an increased error rate Still possible for Eve to eavesdrop just a few photons, and hope that this will not increase the error to an

Detecting eavesdropping When Alice and Bob need to test for eavesdropping By randomly selecting a number of bits from the key and compute its error rate Error rate < E max assume no eavesdropping Error rate > E max assume eavesdropping (or the channel is unexpectedly noisy) Alice and Bob should then discard the whole key and start over

Noise Noise might introduce errors A detector might detect a photon even though there are no photons Solution: send the photons according to a time schedule. then Bob knows when to expect a photon, and can discard those that doesn't fit into the scheme's time window. There also has to be some kind of error correction in the over all process.

Error correction Suggested by Hoi-Kwong Lo. (Shortened version) 2. Alice and Bob agree on a random permutation of the bits in the key 3. They split the key into blocks of length k 4. Compare the parity of each block. If they compute the same parity, the block is considered correct. If their parity is different, they look for the erroneous bit, using a binary search in the block. Alice and Bob discard the last bit of each block whose parity has been announced 5. This is repeated with different permutations and block size, until Alice and Bob fail to find any disagreement in many subsequent comparisons

Privacy amplification Eve might have partial knowledge of the key. Transform the key into a shorter but secure key Suppose there are n bits in the key and Eve has knowledge of m bits. Randomly chose a hash function where h(x): {0,1\} n {0,1\} n-m-s Reduces Eve's knowledge of the key to 2 s / ln2 bits / ln2 bits

Encryption Key of same size as the plaintext Used as a one-time-pad Ensures the crypto text to be absolutely unbreakable

What to come Theory for quantum cryptography already well developed Problems: quantum cryptography machine vulnerable to noise photons cannot travel long distances without being absorbed

Summary The ability to detect eavesdropping ensures secure exchange of the key The use of one-time-pads ensures security Equipment can only be used over short distances Equipment is complex and expensive

Q / A

References [RP00] Eleanor Rie_el, Wolfgang Polak, ACM Computing surveys,vol. 32, No.3.September 2000 [WWW1] Math Pages, Spin & Polarization http://www.mathpages.com/rr/s9-04/9-04.htm [WWW2] Luisiana Tech University, Quantum Computation http://www2.latech.edu/~dgao/cnsm/quantumcomput.html [WWW3] Edmonton Community Network, Quantum Cryptography http://home.ecn.ab.ca/~jsavard/crypto/mi060802.htm [WIK1] Wikipedia -The free encyclopedia http://www.wikipedia.org/wiki/bra-ket_notation

References [WIK2] Wikipedia -The free encyclopedia http://www.wikipedia.org/wiki/interpretation_of_quantum_m echanics [WIK3] Wikipedia -The free encyclopedia http://www.wikipedia.org/wiki/copenhagen_interpretation [GIT] Georgia Institute of Technology, The fundamental postulates of quantum mechanics http://www.physics.gatech.edu/academics/classes/spring20 02/6107/Resources/The fundamental postulates of quantum mechanics.pdf [HP] Hoi-Kwong Lo, Networked Systems Department, Hewlett Packard, Bristol, December 1997, Quantum Cryptology [SS99] Simon Singh, Code Book, p349-382, Anchor Books, 1999 [FoF] Forskning och Framsteg, No. 3, April 2003