Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Similar documents
Security Implications of Quantum Technologies

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Cryptography in a quantum world

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Quantum key distribution for the lazy and careless

A Matlab Realization of Shor s Quantum Factoring Algorithm

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

LECTURE NOTES ON Quantum Cryptography

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

arxiv:quant-ph/ v1 27 Dec 2004

Quantum Wireless Sensor Networks

A probabilistic quantum key transfer protocol

C. QUANTUM INFORMATION 111

Security of Quantum Key Distribution with Imperfect Devices

Quantum Cryptography and Security of Information Systems

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

Lecture 1: Introduction to Public key cryptography

Quantum Cryptography

C. QUANTUM INFORMATION 99

Practical quantum-key. key- distribution post-processing

10 - February, 2010 Jordan Myronuk

Quantum Information Transfer and Processing Miloslav Dušek

Realization of B92 QKD protocol using id3100 Clavis 2 system

Quantum cryptography -the final battle?

Quantum Cryptography

Quantum sampling of mixed states

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Technical Report Communicating Secret Information Without Secret Messages

CS120, Quantum Cryptography, Fall 2016

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

Quantum Cryptography. Marshall Roth March 9, 2007

EPR paradox, Bell inequality, etc.

arxiv:quant-ph/ v2 2 Jan 2007

Entanglement and Quantum Teleportation

APPLICATIONS. Quantum Communications

arxiv:quant-ph/ v1 6 Dec 2005

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Introduction to Quantum Cryptography

Secrecy and the Quantum

arxiv:quant-ph/ v1 13 Mar 2007

Notes for Lecture 17

Unconditionally secure deviceindependent

RIVF 2006 Tutorial. Prof. Patrick Bellot PhD. Dang Minh Dung. ENST (Paris) & IFI (Hanoi) RIVF 2006 Tutorial. "Quantum Communications"

arxiv:quant-ph/ v2 17 Sep 2002

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography

Ping Pong Protocol & Auto-compensation

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement Assisted Key Distribution

Lecture 28: Public-key Cryptography. Public-key Cryptography

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Advanced Cryptography Quantum Algorithms Christophe Petit

Quantum Cryptography: A Short Historical overview and Recent Developments

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Quantum secret sharing based on quantum error-correcting codes

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

Deterministic secure communications using two-mode squeezed states

Introduction to Quantum Key Distribution

Lecture 11: Key Agreement

quantum distribution of a sudoku key Sian K. Jones University of South Wales

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing

Quantum Key Distribution

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

All this was changed by PKC. The idea of PKC is for each user (eg Alice) to randomly choose a pair of mutually inverse transformations a scrambling tr

An Introduction to Quantum Information and Applications

Lecture 38: Secure Multi-party Computation MPC

INTRODUCTION TO QUANTUM COMPUTING

Introduction to Cryptography. Lecture 8

Quantum Key Distribution

Hiding Data in a QImage File

Cyber Security in the Quantum Era

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Device-Independent Quantum Information Processing

Quantum Information Processing and Diagrams of States

Single and Entangled photons. Edward Pei

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

arxiv:quant-ph/ v2 11 Jan 2006

Cryptographical Security in the Quantum Random Oracle Model

Perfectly secure cipher system.

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Quantum Cryptography : On the Security of the BB84 Key-Exchange Protocol

Three Party Quantum Authenticated Key Distribution Protocol Using Superposition States

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Efficient Quantum Key Distribution. Abstract

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

arxiv: v3 [quant-ph] 6 Sep 2009

CPSC 467b: Cryptography and Computer Security

The Relativistic Quantum World

Efficient controlled quantum secure direct communication based on GHZ-like states

Transcription:

Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1

Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2

Identity Based Encryption Idea: Allow an arbitrary string (e.g., an email address) to be used as a public key Benefit: Easy to obtain authentic public key. Catch: Needs a Trusted Third Party (TTP). TTP publishes public parameters, and has master secret. A user can register with the TTP to obtain private key corresponding to an identity string. A sender can encrypt a message with public parameter and receiver s identity string. Exist constructions using parings (elliptic curves). TTP generates everyone s private key, and can decrypt anything. CS555 Topic 25 3

Quantum Cryptography based on a survey by Hoi-Kwong Lo. http://www.hpl.hp.com/techreports/97/hpl-97-151.html And on http://en.wikipedia.org/wiki/quantum_key_distribution CS555 Topic 25 4

Quantum Mechanics & Cryptography Quantum communication Protect communication using principles of physics Quantum computing Can efficiently solve some problems that are computationally infeasible for traditional computers to solve e.g., Shor s efficient algorithm for factoring Exploits quantum superposition and entanglement N bits in classical computers can only be in one of 2 N states N qubits can be in an arbitrary superposition of up to 2 N different states simultaneously When measured, it collapse into one state with some probability Quantum computers can compute with all states simultaneously CS555 Topic 25 5

Properties of Quantum Information Wave function collapse A superposition when measured by an observer, collapse to a specific state Measurement of a signal changes it A quantum state is described as a vector e.g., a photon has a quantum state, quantum cryptography often uses photons in 1 of 4 polarizations (in degrees): 0, 45, 90, 135 Encoding 0 and 1 under two basis Basis 0 1 (rectilinear) (diagonal) CS555 Topic 25 6

Properties of Quantum Information No way to distinguish which of a photon is Quantum no-cloning theorem: an unknown quantum state cannot be cloned. Measurement generally disturbs a quantum state one can set up a rectilinear measurement or a diagonal measurement a rectilinear measurement disturbs the states of those diagonal photons having 45/135 Effect of measuring Basis or or or or CS555 Topic 25 7

Quantum Key Agreement Requires two channels one quantum channel (subject to adversary and/or noises) one public channel (authentic, unjammable, subject to eavesdropping) Protocol does not work without such a channel CS555 Topic 25 8

The Protocol [Bennet & Brassard 84] 1. Alice sends to Bob a sequence of photons, each of which is chosen randomly and independently to be in one of the four polarizations Alice knows their states 2. For each photon, Bob randomly chooses either the rectilinear based or the diagonal base to measure Bob record the bases he used as well as the measurement CS555 Topic 25 9

The Protocol [Bennet & Brassard 84] 3. Bob publicly announces his basis of measurements 4. Alice publicly tells Bob which measurement basis are correct and which ones are not For the photons that Bob uses the correct measurement, Alice and Bob share the same results See the following page for an example: http://en.wikipedia.org/wiki/quantum_key_distribution CS555 Topic 25 10

The Protocol [Bennet & Brassard 84] 5. Alice and Bob reveal certain measurement results to see whether they agree to detect whether an adversary is involved or the channel is too noisy Why attackers fail Any measurement & resending will disturb the results with 50% probability CS555 Topic 25 11

Additional Steps Information reconciliation Figure out which bits are different between Alice and Bob Conducted over a public channel Privacy amplification Reducing/eliminating Eve s partial knowledge of a key CS555 Topic 25 12

Coming Attractions Review of some HW/Quiz questions CS555 Topic 25 13