Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Similar documents
Notes 10: Public-key cryptography

10 - February, 2010 Jordan Myronuk

Entanglement and information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

Security Implications of Quantum Technologies

Secrecy and the Quantum

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Quantum Information. and Communication

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

8 Elliptic Curve Cryptography

Number theory (Chapter 4)

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Lecture 1: Introduction to Public key cryptography

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

1 1D Schrödinger equation: Particle in an infinite box

quantum distribution of a sudoku key Sian K. Jones University of South Wales

Using Quantum Effects for Computer Security

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

1 1D Schrödinger equation: Particle in an infinite box

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Lecture 38: Secure Multi-party Computation MPC

LECTURE NOTES ON Quantum Cryptography

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Quantum Cryptography

9 Knapsack Cryptography

Quantum Cryptography

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

Public Key Cryptography

Introduction to Quantum Computing for Folks

Lecture Notes, Week 6

Secrets of Quantum Information Science

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

Single and Entangled photons. Edward Pei

Lecture 22: RSA Encryption. RSA Encryption

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

QUANTUM ENTANGLEMENT AND ITS ASPECTS. Dileep Dhakal Masters of Science in Nanomolecular Sciences

Week 7 An Application to Cryptography

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

CPSC 467b: Cryptography and Computer Security

Week 11: April 9, The Enigma of Measurement: Detecting the Quantum World

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY

Entanglement and Quantum Teleportation

Other Topics in Quantum Information

Cryptography. P. Danziger. Transmit...Bob...

Quantum Cryptography. Marshall Roth March 9, 2007

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

March 19: Zero-Knowledge (cont.) and Signatures

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Lecture 28: Public-key Cryptography. Public-key Cryptography

QUANTUM CRYPTOGRAPHY. BCS, Plymouth University, December 1, Professor Kurt Langfeld Centre for Mathematical Sciences, Plymouth University

A probabilistic quantum key transfer protocol

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Encryption: The RSA Public Key Cipher

RSA RSA public key cryptosystem

A FRAMEWORK FOR UNCONDITIONALLY SECURE PUBLIC-KEY ENCRYPTION (WITH POSSIBLE DECRYPTION ERRORS)

The Relativistic Quantum World

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY

Quantum state discrimination with post-measurement information!

CPSC 467b: Cryptography and Computer Security

THE CUBIC PUBLIC-KEY TRANSFORMATION*

CPSC 467: Cryptography and Computer Security

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Problem Set: TT Quantum Information

6.080/6.089 GITCS Apr 15, Lecture 17

Public-key Cryptography and elliptic curves

Quantum sampling of mixed states

Quantum Information & Quantum Computation

Chapter 2. A Look Back. 2.1 Substitution ciphers

An Introduction to Probabilistic Encryption

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Theory of Computation Chapter 12: Cryptography

Introduction to Quantum Cryptography

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

Realization of B92 QKD protocol using id3100 Clavis 2 system

10 Public Key Cryptography : RSA

A Matlab Realization of Shor s Quantum Factoring Algorithm

PERFECTLY secure key agreement has been studied recently

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

CPSC 467b: Cryptography and Computer Security

Cryptography in a quantum world

Ping Pong Protocol & Auto-compensation

Lecture Notes, Week 10

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution

Quantum Wireless Sensor Networks

Introduction to Cryptography. Lecture 8

Lecture 11 September 30, 2015

The Laws of Cryptography Zero-Knowledge Protocols

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm

Cryptography and Number Theory

1 Indistinguishability for multiple encryptions

CPSC 467b: Cryptography and Computer Security

Lecture 11: Key Agreement

Transcription:

+ Quantum Entanglement and Cryptography Deepthi Gopal, Caltech

+ Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts it to obscure the meaning; the recipient decrypts it. What does this require? That the recipient has enough information to always accurately unscramble the message.

+ Cryptography Historically, this relied only on both parties knowing the method used to encrypt the message. At this point, the main method of security was simply keeping your algorithm secret. This is not very useful. Shannon s maxim: the enemy knows the system. Any decent cryptographic system should remain secure even if the enemy knows how the message was created.

+ Keys Most modern cryptography relies in some way on the concept of a key : this is an extra piece of information (generally a large number) that controls the behaviour of the encoding algorithm, and that the recipient needs to know to decrypt the message. If the key is private, the algorithm can be public without trouble! Symmetric key encryption: there is one key for encryption and decryption, and both parties share it.

+ Keys This of course assumes that the key is unwieldy enough to be unguessable. A 128-digit random number is quite easy to generate. This requires a would-be spy to pick through 10 38 or so possibilities. How long would that take? A billion modern computers performing a billion operations a second would do it in about a trillion years. This seems fine.

+ Keys What we ve been describing assumes that the sender and the recipient have a shared secret key. This means they need to communicate to establish the key! How can they be certain that when the key is established, there are no eavesdroppers?

+ Keys In classical physics? They can t. Mathematically, it turns out that it is always theoretically possible for a third party to obtain classical information without drawing attention to himself. There are some clever ways to get around this, like publickey cryptography: Instead of having one shared key, any given recipient has a public encryption key and a private decryption key, mathematically interrelated. Then any sender can encrypt a message that can be decrypted by the recipient using his totally private decryption key alone.

+ Keys Public-key encryption is probably the best thing out there. Generally, the strength of public key algorithms are based on the computational difficulty of various mathematical problems for example, large integer factorisation. As computation gets better, this is going to be harder to maintain.

+ Quantum effects? We ve been stressing classical. How would quantum mechanics help with cryptographic problems? For one thing, it s been shown that if we can build a quantum computer, the problem of large number factorisation becomes computationally very reasonable. This is going to cause trouble! So if quantum computation is implemented, we re going to need quantum algorithms. We need to understand a little more about quantum mechanics first.

+ Quantum mechanics On a small enough scale, the physical ideas that we take for granted often break down completely. Classically: given the position and velocity of an object, what is its trajectory? The quantum mechanical equivalent: given this object is here right now, what is the probability that it will be there later?

+ Superposition principle Normally, if we have two boxes, and know that there is a ball hidden in one of them, we expect one to definitely contain a ball, and one to be empty. Under the principles of quantum mechanics, though: until we have opened a box, in some sense the ball exists in both boxes at once a superposition of the two mutually exclusive alternatives.

+ Superposition principle What do we mean when we say that something is in two places at once? Think about double-slit interference, with a beam of electrons.

+ Superposition principle Notice that there are blank spaces in the interference pattern! Experimentally, when we cover one of the slits, electrons will fill these spaces. The electrons are able to decide whether both slits are open or not, despite only passing through one. It is as though they are at both slits simultaneously (to check whether both are open)!

+ Quantum entanglement When we re dealing with more than one particle, superposition leads to the phenomenon of entanglement. Here is the basic idea: objects can be linked in a way that causes them to have a very deep dependence on each other, even if they are separated by millions of kilometres. What? Disturbing one instantaneously disturbs the other, irrespective of separation.

+ Quantum entanglement Imagine that we have two electrons, with opposite spin, in separate sealed boxes: one given to Alice, one to Bob, they are far apart. Remember superposition! Two cases exist simultaneously: Alice has spin up; Bob has spin down. Alice has spin down; Bob has spin up. Before Alice looks, her electron is neither spin up nor spin down; it is in an indefinite state that can only be described by referring to both electrons.

+ Quantum entanglement Alice opens her box! If she finds a spin up electron, then Bob has a spin down electron. Regardless of the distance between Alice and Bob, Alice s act of looking into her box instantaneously affects Bob s electron. Remember Schrödinger s cat? Until we look into the box, it s both dead and alive.

+ Quantum measurement Alice s opening the box is equivalent to making a measurement in quantum mechanics. A measurement is simply an observation of some particular piece of information about a system! (It does not tell you the state of the system directly.) Alice observed that her electron was spin up; from this she deduces that the current state of the system of boxes is spin up in her box, spin down in Bob s. Her observation changed the state of the system measurement disturbs the system!

+ Entanglement and measurement There s a neat little example called the mean king problem. A physicist is asked by a king to prepare an atom in any state she chooses. The king then measures the spin of the atom along one of three axes. He does not tell her which axis. The physicist is then told to perform any measurement she likes, and is then told along which axis the king measured. She must now tell him the value he obtained.

+ The mean king problem The answer? Use entanglement! The king has allowed us to prepare the atom however we want, and make whatever measurement we want. So, we prepare the atom in an entangled state with another particle. Remember the electrons? The external particle will reflect the king s measurement. So we have more information.

+ Measurement and quantum cryptography What we ve discussed summarises as follows: measuring a quantum system disturbs the system. If Alice sends Bob a piece of quantum information, Eve the eavesdropper risks disturbing the information by observing it! Which lets Bob know that it s been intercepted. So eavesdroppers are more detectable. What about better encryption?

+ Quantum key distribution In fact, there s a nice demonstration of how quantum effects allow Alice and Bob to set up a secure shared key. Remember that this was a problem with symmetric key encryption! Let s imagine that Alice is transmitting photons to Bob. We re going to need to describe a little more physics first.

+ Photon polarisation Polarisation describes the direction of the oscillating fields that make up a wave of light (electric and magnetic).

+ Polarisation A polarised photon either can or cannot pass through a polarisation filter; if it does, then it will be aligned with the filter regardless of initial state. The chance of a photon passing through a filter polarised the same way is 1, while for a perpendicular it s 0; at 45 degrees it is exactly ½.

+ Quantum key distribution Let s return to Alice and Bob. Alice polarises photons in one of 4 directions: 0, 45, 90, and 135 degrees. Bob receives them and measures the polarisation in one of two bases. Note that he cannot measure more than once! He has already disturbed the system. If Alice sends Bob a photon polarised at 90, he can find this out by measuring in the 0-90 basis, but measuring in the 45-135 basis won t help.

+ Quantum key distribution 1. Alice sends Bob a collection of photons. 2. For each photon, Bob chooses a measurement. Note that these measurements tell him the polarisation along the lines illustrated above, for each photon. The measurement was therefore correct if Alice s photon is parallel to one of the lines. 3. These are the results of Bob s measurement, which gives him guesses for the polarisation of each photon. He keeps them to himself! But he tells Alice which measurement he used for each photon, in order.

+ Quantum key distribution 4. Alice then tells Bob which measurements were appropriate for the photon in question. They both keep the cases in which Bob should have measured correctly, and translate into 1s and 0s: the horizontal or vertical cases correspond to 1, and the diagonal cases correspond to 0. This lets Alice and Bob generate a binary sequence that is only known to them, and they can keep going as long as they would like! It is not even necessary for their communication to be secret as long as only they are in possession of the photons.

+ State discrimination This generalises the photon exchange! Supposing Alice has a system that can be in a finite number of states. (Like our photon(s).) Bob would like to guess the state. Quantum mechanics means he can t directly observe it; so he measures and then guesses. x! Alice! Bob! guess x! pick x! measurement!

+ State discrimination Variations on this problem go a long way towards explaining real-life information transmission issues. Here s an example involving extra, cheating information (it s a little like the mean king!): xy! Alice! Bob! guess x! pick x, y! measurement! y!

+ State discrimination What are we doing here? We re trying to choose the best possible measurement for Bob to make, in all possible cases. For the case involving the extra information, it turns out there s a neat little result; the extra information is useless exactly half the time.

+ Why is all this useful? Again, as computation becomes faster and better, we need cryptographic systems that are more secure. Well-implemented quantum cryptography ought to be impossible to break into undetected. State discrimination? Imagine receiving a transmission containing more than one signal mixed together. It would be nice to distinguish these well. Think of being played two pieces of music at the same time!

+ State discrimination is still useful! Consider a noisy communication channel, like a noisy phone line. It would be nice if we could extrapolate extra information from an echo. Remember the photons? The better Bob s ability to discriminate between photons is, the faster a usable key can be generated. So, better measurement schemes lower computation time!