Quantum Cryptography

Similar documents
Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography

arxiv:quant-ph/ v1 13 Jan 2003

A PRACTICAL TROJAN HORSE FOR BELL-INEQUALITY- BASED QUANTUM CRYPTOGRAPHY

Quantum Cryptography and Security of Information Systems

arxiv:quant-ph/ v2 17 Mar 2003

Quantum Information Transfer and Processing Miloslav Dušek

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

arxiv:quant-ph/ v2 11 Jan 2006

Realization of B92 QKD protocol using id3100 Clavis 2 system

Bell inequality for qunits with binary measurements

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Quantum key distribution for the lazy and careless

arxiv:quant-ph/ v2 2 Jan 2007

Ping Pong Protocol & Auto-compensation

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Cryptography in a quantum world

arxiv:quant-ph/ v2 3 Oct 2000

Device-Independent Quantum Information Processing

Quantum Cryptography. Marshall Roth March 9, 2007

LECTURE NOTES ON Quantum Cryptography

Introduction to Quantum Key Distribution

Error Reconciliation in QKD. Distribution

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

10 - February, 2010 Jordan Myronuk

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

A. Quantum Key Distribution

Staging quantum cryptography with chocolate balls

arxiv:quant-ph/ v1 10 Apr 2006

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

All this was changed by PKC. The idea of PKC is for each user (eg Alice) to randomly choose a pair of mutually inverse transformations a scrambling tr

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

A probabilistic quantum key transfer protocol

Technical Report Communicating Secret Information Without Secret Messages

An arbitrated quantum signature scheme

Quantum Cryptography

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Quantum Cryptography: A Short Historical overview and Recent Developments

Quantum Cryptographic Network based on Quantum Memories. Abstract

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Quantum Optical Implementation of Quantum Communication

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

arxiv:quant-ph/ v1 6 Dec 2005

C. QUANTUM INFORMATION 111

arxiv:physics/ v1 [physics.pop-ph] 6 Oct 2005

arxiv:quant-ph/ v1 12 Nov 1999

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Deterministic secure communications using two-mode squeezed states

Entanglement and information

Security Implications of Quantum Technologies

Calculation of the Key Length for Quantum Key Distribution

Quantum key distribution: theory for application

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada

Perfectly secure cipher system.

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security

Problem Set: TT Quantum Information

Device-Independent Quantum Information Processing (DIQIP)

Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs

C. QUANTUM INFORMATION 99

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States

Efficient Quantum Key Distribution. Abstract

Bell s inequalities and their uses

arxiv:quant-ph/ Jan 2000

EPR paradox, Bell inequality, etc.

Teleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels 1

Quantum Correlations as Necessary Precondition for Secure Communication

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Quantum Entanglement Assisted Key Distribution

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin

Quantum Cryptography

Experimental realization of quantum cryptography communication in free space

arxiv:quant-ph/ v1 21 Apr 2004

Introduction to Quantum Cryptography

Quantum Cloning, Eavesdropping and Bell's inequality N. Gisin and B. Huttner Group of Applied Physics University of Geneva 20 Rue de l'ecole de Medeci

Research, Development and Simulation of Quantum Cryptographic Protocols

Quantum Cryptography

Limitations on Quantum Key Repeaters

Analysis of the Influenceof the Rate of Spies Measure on the Quantum Transmission

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

QUANTUM communication describes a novel branch of communication protocols such as quantum dense

National Institute of Standards and Technology Gaithersburg, MD, USA

Practical Quantum Key Distribution

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

Applications of Quantum Key Distribution (QKD)

arxiv:quant-ph/ v1 26 Mar 2001

arxiv:quant-ph/ v1 22 Mar 2002

'IBM Research, Yorktown Heights, NY (Current address: Boston University Computer Science Department, Boston, MA)

Entanglement and Quantum Teleportation

arxiv:quant-ph/ v1 28 Oct 2003

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Transcription:

http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16. 3. 2005

References History & References References History WIE83 Stephen Wiesner, Conjugate coding, Sigact News, 15, 78-88 (1983) [manuscript written circa 1970] BBSS92 Charles H. Bennett and F. Bessette and G. Brassard and L. Salvail and J. Smolin, Experimental Quantum Cryptography, Journal of Cryptology, 5, 3-28 (1992) Charles H. Bennett and Gilles Brassard and Artur K. Ekert,, Scientific American, 267, 50-57 (1992) GRTZ02 Nicolas Gisin, Grégoire Ribordy, Wolfgang Tittel, and Hugo Zbinden, Quantum cryptography, Rev. Mod. Phys. 74, 145-195 (2002) http://link.aps.org/abstract/rmp/v74/p145 David Mermin, Lecture Notes on Quantum Computation, [Cornell University, Physics 481-681, CS 483; Spring, 2005] http://people.ccmr.cornell.edu/ mermin/qcomp/chap6.pdf

History History & References References History 1970 Stephen Wiesner, Conjugate coding: noisy transmission of two or more complementary messages by using single photons in two or more complementary polarization directions/bases. 1984 BB84 Protocol: key growing via quantum channel & additional classical bidirectional communication channel 1991 EPR-Ekert protocol: maximally entangled state, three complementary polarization directions; additional security confirmation by violation of Bell-type inequality through data which cannot be directly used for coding

Wiesner s conjugate coding scheme Wiesner s conjugate coding scheme BB84 Protocol EPR-Ekert protocol Interferometric protocols

BB84 Protocol History & References Wiesner s conjugate coding scheme BB84 Protocol EPR-Ekert protocol Interferometric protocols

EPR-Ekert protocol History & References Wiesner s conjugate coding scheme BB84 Protocol EPR-Ekert protocol Interferometric protocols Parametrization of ψ = x + + y by two angles 0 θ π (azimutal) and 0 ϕ 2π. Let the expectation value measured by a pair of particles along the directions a i and b j be E(a i, b j ) = P ++ (a i, b j ) + P (a i, b j ) P + (a i, b j ) P + (a i, b j ). Consider the Clauser-Horne-Shimony-Halt (CHSH) term S = E(a 1, b 1 ) E(a 1, b 3 ) + E(a 3, b 1 ) + E(a 3, b 3 ). With the six measurement directions corresponding to ϕ = 0 (for all six), and θ1 a = 0, θa 2 = π/4, θa 3 = π/2, θb 1 = π/4, θb 2 = π/2, and θ3 b = 3π/4 (three per side), S = 2 2 is maximally violated by the Tsirelson bound. Constant monitoring of S certifies the absence of an eavesdropper.

Interferometric protocols Wiesner s conjugate coding scheme BB84 Protocol EPR-Ekert protocol Interferometric protocols

Single particle events Complementarity No-cloning (no-copy) theorem Man-in-the-middle attack Single particle production, manipulation & detection It is essential to use single particle states, otherwise Eve could eavesdrop on the extra particles.

Complementarity History & References Single particle events Complementarity No-cloning (no-copy) theorem Man-in-the-middle attack Eavesdropping randomizes the state transmitted from Alice to Bob.

No-cloning (no-copy) theorem Single particle events Complementarity No-cloning (no-copy) theorem Man-in-the-middle attack Ideally, a perfect Qcopy device A, acting upon an arbitrary state ψ and some arbitrary blank state b, would do this: ψ b A i ψ ψ A f. Suppose it would copy the two quasi-classical state + and accordingly: +, b, A i +, +, A f,, b, A i,, A f. By the linearity of quantum mechanics, the state 1 2 ( + + ) is copied according to 1 ( + + ) b, A i 1 ( +, +, A f +,, A f ) 2 2 1 2 ( + + ) 1 2 ( + + ) A i.

Single particle events Complementarity No-cloning (no-copy) theorem Man-in-the-middle attack Man-in-the-middle attack using both the classical & quantum channels Eve Alice c box-in-the-middle fake Bob fake Alice c Bob q copy or misinform q from http://arxiv.org/abs/quant-ph/0501062

Single particle events Complementarity No-cloning (no-copy) theorem Man-in-the-middle attack Man-in-the-middle attack using both the classical & quantum channels Compare: Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. (from http://arxiv.org/abs/quant-ph/0405101). To: The need for the public (non-quantum) channel in this scheme to be immune to active eavesdropping can be relaxed if the Alice and Bob have agreed beforehand on a small secret [[classical cryptographic]] key,.. (from BB84: C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE Computer Society Press, 1984), pp. 175-179.) In accordance with our general philosophy that QKD forms a part of an overall cryptographic architecture, and not an entirely novel architecture of its own, the DARPA Quantum Network currently employs the standardized authentication mechanisms built into the Internet security architecture (IPsec), and in particular those provided by the Internet Key Exchange (IKE) protocol. (from http://arxiv.org/abs/quant-ph/0503058)

Techniques & gadgets Techniques & gadgets 1989 IBM Yorktown Heights 1993 Lake Geneva & 2004 Vienna 2003-present DARPA Network Boston Photon sources: faint laser pulses, photon pairs generated by parametric downconversion, photon guns,... Quantum channels: single-mode fibers, free-space links,... Single-photon detection: photon counters,... (Quantum) Random number generators: calcite prism,...

1989 IBM Yorktown Heights Techniques & gadgets 1989 IBM Yorktown Heights 1993 Lake Geneva & 2004 Vienna 2003-present DARPA Network Boston

1993 Lake Geneva History & References Techniques & gadgets 1989 IBM Yorktown Heights 1993 Lake Geneva & 2004 Vienna 2003-present DARPA Network Boston

2004 Vienna History & References Techniques & gadgets 1989 IBM Yorktown Heights 1993 Lake Geneva & 2004 Vienna 2003-present DARPA Network Boston

2003-present DARPA Network Boston Techniques & gadgets 1989 IBM Yorktown Heights 1993 Lake Geneva & 2004 Vienna 2003-present DARPA Network Boston

Techniques & gadgets 1989 IBM Yorktown Heights 1993 Lake Geneva & 2004 Vienna 2003-present DARPA Network Boston Thank you for your attention!