LECTURE NOTES ON Quantum Cryptography

Similar documents
Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Quantum Cryptography. Marshall Roth March 9, 2007

Security Implications of Quantum Technologies

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

C. QUANTUM INFORMATION 111

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Cryptography in a quantum world

10 - February, 2010 Jordan Myronuk

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

C. QUANTUM INFORMATION 99

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Ping Pong Protocol & Auto-compensation

Quantum Cryptography and Security of Information Systems

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Research, Development and Simulation of Quantum Cryptographic Protocols

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Advanced Cryptography Quantum Algorithms Christophe Petit

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Quantum Information Transfer and Processing Miloslav Dušek

Realization of B92 QKD protocol using id3100 Clavis 2 system

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Practical aspects of QKD security

Introduction to Quantum Cryptography

A probabilistic quantum key transfer protocol

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

A Matlab Realization of Shor s Quantum Factoring Algorithm

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada

Ground-Satellite QKD Through Free Space. Steven Taylor

Practical quantum-key. key- distribution post-processing

APPLICATIONS. Quantum Communications

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Quantum Cryptography

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

quantum distribution of a sudoku key Sian K. Jones University of South Wales

Quantum cryptography -the final battle?

arxiv:quant-ph/ v1 13 Jan 2003

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum sampling of mixed states

Quantum Communication. Serge Massar Université Libre de Bruxelles

Public-Key Cryptosystems CHAPTER 4

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Quantum Cryptography

The BB84 cryptologic protocol

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Security and implementation of differential phase shift quantum key distribution systems

Lecture 17 - Diffie-Hellman key exchange, pairing, Identity-Based Encryption and Forward Security

ENEE 457: Computer Systems Security 10/3/16. Lecture 9 RSA Encryption and Diffie-Helmann Key Exchange

Applications of Quantum Key Distribution (QKD)

Simulation of BB84 Quantum Key Distribution in depolarizing channel

Cryptography. P. Danziger. Transmit...Bob...

Introduction to Quantum Key Distribution

Lecture 1: Introduction to Public key cryptography

Lecture Notes, Week 6

Quantum Cryptography

1 1D Schrödinger equation: Particle in an infinite box

Deterministic secure communications using two-mode squeezed states

Secrecy and the Quantum

Number theory (Chapter 4)

CPSC 467b: Cryptography and Computer Security

An Introduction to Quantum Information and Applications

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

arxiv: v7 [quant-ph] 20 Mar 2017

Error Reconciliation in QKD. Distribution

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Lecture 11: Key Agreement

Cyber Security in the Quantum Era

Lecture 28: Public-key Cryptography. Public-key Cryptography

TWO-LAYER QUANTUM KEY DISTRIBUTION

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v2 2 Jan 2007

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

Elliptic Curve Cryptography

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

SQL injection principle against BB84 protocol

Quantum Information. and Communication

Using Quantum Effects for Computer Security

Entanglement and Quantum Teleportation

Introduction to Cryptography. Lecture 8

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

Theory of Computation Chapter 12: Cryptography

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

arxiv:quant-ph/ v1 25 Dec 2006

1 1D Schrödinger equation: Particle in an infinite box

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

BB84 and Noise Immune Quantum Key Distribution Protocols Simulation: An Approach Using Photonic Simulator

Security of Quantum Key Distribution with Imperfect Devices

Problem Set: TT Quantum Information

Transcription:

Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

Introduction One: hard problems in mathematics Breaking the system requires an efficient algorithm for solving a hard problem e.g. Factoring large numbers, discrete logarithms Examples: RSA, El Gamal Used in public key systems Slow Two: information theory Texts scrambled by repeated application of bit shifts and permutations Examples: DES, AES Used in private key systems Fast Dr. Samaher Hussein Ali Notes of Lecture 15

Technology Determines What is Breakable RSA Cryptosystem C = M e mod n d = e -1 mod ((p-1) (q-1)) RSA vs. supercomputer: 40 Tflop/s (4 x 10 12 flop/sec) RSA wins! RSA vs. Quantum Computer computer wins!

Modern Ciphers vs. Quantum Computer Hard problem variety Exponential speedup easily breaks algorithms such as RSA If information requires long term protection (e.g. 20+ years), these algorithms are already dead Information theory variety Quadratic speedup (so far) Longer keys can keep them useful

Quantum Crypto Why? Quantum Cryptography is one of the new field in the cryptography to design the system promises of new level of security in the communication system Protect against attack by quantum computer or any future machine Eavesdropping detection Hard to do now High volume key distribution If it can be made fast enough

Quantum Mechanics for Cryptography Measurement Basis Basis frame of reference for quantum measurement Example polarization vertical/horizontal vs. diagonal Horizontal filter, light gets through = 0 Vertical filter, light gets through = 1 45 deg. filter, light = 0 135 deg. filter, light = 1

No cloning theorem It is not possible to create perfect copies of a quantum state in transit for the purpose of measurement, while sending on the original. Consequently, current practical quantum cryptography setups are point to point based or at best within a Local Area Network since optical fiber amplifiers cannot be used.

Entanglement Two or more quantum systems can be entangled Causality and Superposition Causality, together with the superposition principle can be used for secure key distribution. If the two terms that constitute a superposition state are sent with a time delay relative to each other, and if they are not essentially connected, then Eve cannot spy on them.

A Quantum Key Distribution with Single Photons The transmitter is traditionally called Alice and the receiver Bob, while the intruder is called Eve. Single photons Quantum key distribution with single polarized photons was originally proposed by Bennett and Brassard in 1984 (BB84 protocol). There are two data transmission channels involved: the classical (high density) and quantum (low density) channels.

BB84 protocol Alice sends randomly one of the four quantum states Bit value 0 Bit value 1 0, 1, with equal probability, When Bob receives a state from Alice, he chooses randomly either 0, 1, And also Bob result correlates with the bit Alice sent only when he picked the right basis i.e. the one used by Alice. After Bob has measured the necessary number of states, Alice communicates with Bob via the classical channel and tells him when she used which basis. They discard the cases in which they used different bases, and therefore establish a secret key, called the sifted key. 1 2 1 2 0 1 0 1

Comparing measurements Alice s Bit 0 1 0 1 1 Alice s Basis + + Photon Bob s Basis + + + Bob s Bit 0 0 0 1 1 The test bits allow Alice and Bob to test whether the channel is secure. Test bits

Getting the Final Key Alice s Bit 0 1 0 1 1 Alice s Basis + + Photon Bob s Basis + + + Bob s Bit 0 0 0 1 1 Test bits discarded Final Key = 01

Quantum Eavesdropping It is impossible for Eve to gain perfect knowledge of the quantum state sent by Alice to Bob. However, Eve can gain partial knowledge via a probing auxiliary quantum system in contact with the signal so that they interact, and then perform a projection measurement on the auxiliary system to retrieve some information. Ideally we can always identify Eve by the occurrence of errors during transmission. But this is not that easy in the real world. There will always be detector noise, misalignments of detectors and transmission losses. It is not even possible in principle to distinguish errors due to noise from errors due to intrusion. We therefore have to assume that all errors are due to eavesdropping. Since it is necessary that Alice and Bob share an identical string of bits, they must rectify any discrepancy in their sifted key. This concerns error correction and uses the public channel.

QKD vs. Public/Private Key protocols