Quantum Cryptography

Similar documents
+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

C. QUANTUM INFORMATION 111

LECTURE NOTES ON Quantum Cryptography

C. QUANTUM INFORMATION 99

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Security Implications of Quantum Technologies

Research, Development and Simulation of Quantum Cryptographic Protocols

Uncertainty Principle

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Cryptography in a quantum world

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

1 1D Schrödinger equation: Particle in an infinite box

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Introduction to Quantum Cryptography

Quantum cryptography -the final battle?

Realization of B92 QKD protocol using id3100 Clavis 2 system

Quantum Information Transfer and Processing Miloslav Dušek

1 1D Schrödinger equation: Particle in an infinite box

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography and Security of Information Systems

10 - February, 2010 Jordan Myronuk

Applications of Quantum Key Distribution (QKD)

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

An Introduction to Quantum Information and Applications

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

A probabilistic quantum key transfer protocol

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Cryptography: the science of secret communications

A Simulative Comparison of BB84 Protocol with its Improved Version

Security of Quantum Key Distribution with Imperfect Devices

A Matlab Realization of Shor s Quantum Factoring Algorithm

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

EPR paradox, Bell inequality, etc.

Error Reconciliation in QKD. Distribution

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Quantum Information Processing

arxiv:quant-ph/ v1 13 Mar 2007

State Decoding in Multi-Stage Cryptography Protocols

APPLICATIONS. Quantum Communications

Ground-Satellite QKD Through Free Space. Steven Taylor

INTRODUCTION TO QUANTUM COMPUTING

quantum distribution of a sudoku key Sian K. Jones University of South Wales

arxiv:quant-ph/ v2 17 Sep 2002

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Device-Independent Quantum Information Processing

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Entanglement and information

Security and implementation of differential phase shift quantum key distribution systems

Practical quantum-key. key- distribution post-processing

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Simulation of BB84 Quantum Key Distribution in depolarizing channel

Device-Independent Quantum Information Processing (DIQIP)

Quantum key distribution with 2-bit quantum codes

Practical Quantum Key Distribution

Introduction to Quantum Key Distribution

Quantum Cryptography

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Cyber Security in the Quantum Era

Quantum Communication. Serge Massar Université Libre de Bruxelles

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State

APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD

Quantum Key Distribution

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Secrecy and the Quantum

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Advanced Cryptography Quantum Algorithms Christophe Petit

The Relativistic Quantum World

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

National Institute of Standards and Technology Gaithersburg, MD, USA

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.

arxiv:quant-ph/ v1 13 Jan 2003

Calculation of the Key Length for Quantum Key Distribution

Ping Pong Protocol & Auto-compensation

Alternative Approaches Quantum Cryptography and Bounded Storage Model

Quantum Information. and Communication

14 Diffie-Hellman Key Agreement

Quantum key distribution

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

Section 6: Measurements, Uncertainty and Spherical Symmetry Solutions

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v1 27 Dec 2004

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

Practical aspects of QKD security

Unconditional Security in Quantum Cryptography

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

arxiv:quant-ph/ v2 7 Nov 2001

Transcription:

Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum factoring algorithm. - you can learn more about this in cs191. Measurement disturbs quantum state - detecting eavesdropper 1

Quantum Mechanics I think I can safely say that nobody understands quantum Mechanics. -Richard Feynman 2

Polarization of Light Photon Polarization Light waves are propagated as discrete quanta called photons. The polarization of the photon is a direction in the plane normal to the direction of propagation. A polarizing filter blocks photons whose polarization is perpendicular to the orientation of the filter and transmits photons whose polarization is aligned with the filter. 3

Photon Polarization unpolarized light vertically polarized light light polarized at angle θ Vertical filter Filter at angle θ The probability that the photon is transmitted by the second filter is 2 cos θ Photon polarization 4

Transmitting a Bit Rectilinear Polarization: Alice Bob 0 1 Vertical filter Transmitting a Bit Diagonal Polarization: Alice Bob 0 1 filter at 45 o 5

Transmitting a Bit Diagonal Polarization: Alice Bob 0 1 Vertical filter Heisenberg Uncertainty Principle Certain pairs of physical properties are related in such a way that measuring one property prevents the observer from knowing the value of the other. Rectilinear and diagonal polarization constitute exactly such a pair of properties. 6

What does Eve learn? Alice Eve Bob 0 1 Vertical filter What does Eve learn? Alice Eve Bob 0 1 filter at 45 o Eve has a 50-50 chance of learning the bit If Eve chooses the wrong orientation for the filter, she learns no information about the bit. Moreover, she disturbs the state of the photon, and cannot retransmit it with original orientation. 7

BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it to Bob randomly selecting rectilinear or diagonal polarization. Bob measures the photon randomly selecting a vertical or diagonal filter. Alice and Bob announce their respective choices rectilinear or diagonal. Discard bit if choices different. Alice ends up with about 2N bits a 1 a 2 a 2N and Bob with b 1 b 2 b 2N. They select N positions at random and check that a i =b i. The remaining N bits are the secret key. Security of BB84 Since Eve does not know the correct orientation (rectilinear or diagonal), she cannot measure the polarization without disturbing it. So if the test for equality on N randomly chosen positions is passed, Alice and Bob can be confident there is no eavesdropper. The proof of unconditional security based on the axioms of quantum mechanics is difficult and dates back to about 2000. 8

Practical Considerations Imperfect measurements, channel noise - a 1 a 2 a 2N and b 1 b 2 b 2N do not agree. - Alice and Bob exchange parity bits to correct their mismatches. Can only guarantee that Eve does not know too many bits out of the remaining N. - If Eve knows only 5% of the bits, then Alice and Bob hash the N bits down to.9n bits. Now Eve has practically no information about these.9n bits. Practical Considerations Imperfect measurements, channel noise - a 1 a 2 a 2N and b 1 b 2 b 2N do not agree. - Alice and Bob exchange parity bits to correct their mismatches. Can only guarantee that Eve does not know too many bits out of the remaining N. Example: Alice and Bob share bits a,b,c,d Eve know one of these bits. Alice and Bob extract key a b, a c, a The 3 bits of the key look random to Eve. d 9

QKD over 64 Km Optical Fibre 10

Atmospheric photon transmission and detection Challenge: Background photons daylight radiance = 10 13 photons/s cm 2 A - temporal filtering: 1 ns - spectral filtering:.1 nm - spatial filtering: 220 µrad Night radiance = 10 5 photons/s cm2 A 10 km free-space QKD 11

Commercial Availability 12

QKD is: Unconditionally secure. Implementable using current technology Early systems are commercially available. But It is not public-key cryptography. Currently very slow bit rates available. About 1KHz key rate. Distance limitations. Eve can jam the quantum channel. 13