Research, Development and Simulation of Quantum Cryptographic Protocols

Similar documents
+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Security Implications of Quantum Technologies

Quantum Cryptography

Realization of B92 QKD protocol using id3100 Clavis 2 system

Perfectly secure cipher system.

APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD

LECTURE NOTES ON Quantum Cryptography

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

quantum distribution of a sudoku key Sian K. Jones University of South Wales

Quantum Cryptography and Security of Information Systems

10 - February, 2010 Jordan Myronuk

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Applications of Quantum Key Distribution (QKD)

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Cryptography in a quantum world

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Quantum Cryptography. Marshall Roth March 9, 2007

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Ping Pong Protocol & Auto-compensation

Introduction to Quantum Key Distribution

Experimental realization of quantum cryptography communication in free space

APPLICATIONS. Quantum Communications

Quantum Information Transfer and Processing Miloslav Dušek

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

arxiv:quant-ph/ v2 3 Oct 2000

Deterministic secure communications using two-mode squeezed states

A probabilistic quantum key transfer protocol

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

Entanglement and information

A Matlab Realization of Shor s Quantum Factoring Algorithm

Technical Report Communicating Secret Information Without Secret Messages

C. QUANTUM INFORMATION 111

National Institute of Standards and Technology Gaithersburg, MD, USA

Calculation of the Key Length for Quantum Key Distribution

Ground-Satellite QKD Through Free Space. Steven Taylor

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

C. QUANTUM INFORMATION 99

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Quantum key distribution for the lazy and careless

Quantum Cryptography

Quantum Cryptography

Quantum key distribution with 2-bit quantum codes

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

Quantum Key Distribution

Practical Quantum Key Distribution

Deep Random based Key Exchange protocol resisting unlimited MITM

1 1D Schrödinger equation: Particle in an infinite box

BB84 and Noise Immune Quantum Key Distribution Protocols Simulation: An Approach Using Photonic Simulator

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

Device-Independent Quantum Information Processing

Security and implementation of differential phase shift quantum key distribution systems

Security of Quantum Key Distribution with Imperfect Devices

Quantum Entanglement Assisted Key Distribution

arxiv:quant-ph/ v1 13 Mar 2007

Trustworthiness of detectors in quantum key distribution with untrusted detectors

arxiv:quant-ph/ v1 27 Dec 2004

An Introduction to Quantum Information and Applications

Analysis of the Influenceof the Rate of Spies Measure on the Quantum Transmission

3-7 Error Detection and Authentication in Quantum Key Distribution

Quantum cryptography and quantum hacking. Dr. Lars Lydersen

arxiv:quant-ph/ Jan 2000

Secrecy and the Quantum

arxiv:quant-ph/ v2 25 May 2005

1 1D Schrödinger equation: Particle in an infinite box

Quantum Technologies for Cryptography

Problems of the CASCADE Protocol and Renyi Entropy Reduction in Classical and Quantum Key Generation

Lecture Notes. Advanced Discrete Structures COT S

Transmitting and Hiding Quantum Information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.

Cyber Security in the Quantum Era

arxiv: v1 [quant-ph] 3 Jul 2018

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Quantum key distribution

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

The BB84 cryptologic protocol

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

Concurrent Error Detection in S-boxes 1

The Two Time Pad Encryption System

arxiv:quant-ph/ v2 7 Nov 2001

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Expand the Quantum Cipher-text Space by Using a Superposition Key

arxiv:quant-ph/ v2 2 Jan 2007

Quantum Key Distribution

TWO-LAYER QUANTUM KEY DISTRIBUTION

Quantum key distribution: theory for application

DATA ENCRYPTION DEVICE USING RADIOACTIVE DECAY AND A HYBRID QUANTUM ENCRYPTION ALGORITM

Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography

Transcription:

http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone: +4 745 82 834 anghelcata@yahoo.com Abstract Cryptography is the art of hiding information. Quantum cryptography is the next level in cryptography. This paper presents the development and the software simulation of BB84 without eavesdropper, BB84 with eavesdropper, BB84 with QBTT eavesdropper detection method and BSPA quantum cryptographic communication protocol. Index Terms Quantum cryptography, quantum key distribution, access protocols. I. INTRODUCTION A cryptographic algorithm combined with a communication system result in a cryptographic system. Almost any cryptographic system, given enough time and resources could eventually be solved. The only exception to this is a system which uses absolutely random changing keys with every character encrypted and never repeated, named One Time Pad [1], [2]. The other cryptographic algorithms, used in our days, are founded on complexity of the mathematical algorithms, but computers become faster and faster and to break an encrypted message becomes a matter of computational power. Consequently, efforts have been made to establish new foundations for cryptography. One of these efforts has led to the development of quantum cryptography, whose security relies not on assumptions about computer power, but on the laws of quantum physics. Although many quantum cryptographic schemes have been proposed [3], [4], the one well researched and realized experimentally is the quantum key distribution protocol (QKD). Also, some QKD commercial products are available [5], [6]. The QKD schemes, in general, utilized photons to transfer classical bit information. Thus, using quantum physics phenomena, we can build a perfectly secure key distribution system this is known as quantum key distribution (QKD). The keys produced using QKD are guaranteed to be secret as is proved by BB84 protocol [7], [8] and may be used in conjunction with any classical cryptographic system (CCS). II. BB84 ALGORITHM OF QUANTUM KEY DISTRIBUTION BB84 is the first known quantum key distribution scheme, Manuscript received May 17, 212; accepted September 26, 212. named after the original paper by Bennett and Brassard, published in 1984 [7]. BB84 allows the two parties, and, to establish a secret, common key sequence using polarized photons qbits. To implement the BB84 algorithm we chose for photon polarization the rectilinear (R) and diagonal (D) and the convention from Table I to represent the bits from the key. TABLE I. PHOTON POLARIZATION. Base Rectiliniar Diagonal Rectiliniar Diagonal State o 45 o 9 o 135 o Qbit Bit 1 1 A. Steps of the BB84 key distribution system The steps of the BB84 quantum key distribution algorithm are: 1) generates a random binary sequence s; 2) chooses which type of photon to use (rectilinearly polarized, "R", or diagonally polarized, "D") in order to represent each bit in s. Let b denote the sequence of each polarization base; 3) uses specialized equipment, including a light source and a set of polarizers, to create a sequence p of polarized photons - qbits whose polarization directions represent the bits in s; 4) sends the qbits p to over an optical fiber; 5) For each qbit received, makes a guess of which base is polarized: rectilinearly or diagonally, and sets up his measurement device accordingly. Let b' denote his choices of basis; 6) measures each qbit with respect to the basis chosen in step 5, producing a new sequence of bits s'; 7) and communicate over a classical, possibly public channel. Specifically, tells to the choice of basis for each bit, and tells to whether he made the same choice. The bits for which and have used different are discarded from s and s'. B. Detecting eavesdropper s presence For the i th bit chosen by, s[i], will correspond a choice of polarization basis, b[i], which is used to encode the bit to a photon. If 's chosen measurement basis is b'[i] and the outcome of his measurement is s'[i], then if b'[i] = b[i] should imply s'[i] = s[i]. If an Eavesdropper tries to obtain any information about s[i], a disturbance will result and, even if and 65

's match, s'[i] s[i]. This allows and to detect the Eavesdropper's presence, and to reschedule their communications accordingly. III. QBER EAVESDROPPER DETECTION METHOD QBER method involves calculating the percentage of s in the final key [9], obtained at the end of quantum transmission, after Bases stage. Quantum bit rate is defined as =, (1) where represent the number of qbits from primary key, and represent the number of qbits from final key. QBER method relies on the fact that the eavesdropper will create an increase in the QBER value. IV. QBTT EAVESDROPPER DETECTION METHOD The Quantum Bit Travel Time QBTT method [1] can be implemented in every type of quantum key distribution system and has the advantage that the Eavesdropper can be detected by, during the quantum transmission, after each transmitted qbit and it is not confused with s caused by noise because noises does not induce time delays. This method uses the fact that the optical components (polarization filters) induce time delays [11]. Every polarization filter applied to a photon induces a specific time delay. So, it is reasonable for a particle to experience a time delay T when it passes through the polarization system on s side and detection system on s side. This delay can be measured and if an eavesdropper tries to a photon he will induce an additional time delay t. can measure these time delays and use them to detect the Eavesdropper s presence because the final time delay will be T' = T + t, (2) V. BASE SELECTION AND POLARIZATION AGREEMENT PROTOCOL Founded on Base Selection and Transmission Synchronization quantum cryptographic protocol [12] and Quantum Bit Travel Time eavesdropper detection method [1], we obtain a quantum transmission cryptographic protocol, named Base Selection and Polarization Agreement BSPA [13]. Based on the bits from the final key, common to and, targeted parameters in Base Selection and Polarization Agreement quantum cryptographic protocol are: 1) Which pair of, between rectilinear ( o, 9 o ), diagonal (45 o, 135 o ) and circular (left - spinl, right - spinr), will be used for photons polarizations; 2) The polarization base for each photon that has to be transmitted, so the and will know for each particular photon the polarization base; 3) Eavesdropper detection by monitoring the travel time, from to, of each photon; 4) Comparison the parity of the blocks received, at the end of quantum transmission and retransmission of the corresponding blocks. For photon polarization we use the convention from Table II. TABLE II. PHOTON POLARIZATION. Base L D C C L D Polarization o 45 o spinl spinr 9 o 135 o Qbit Bit 1 1 1 In Base Selection and Polarization Agreement quantum communication protocol, and will establish in common, accordingly to the final key, which pair of, rectilinear-diagonal, rectilinear-circular or diagonalcircular will be used for photons polarizations. Also, accordingly to the final key, and will establish exactly which polarization base to apply for each photon that has to be transmitted or received. During quantum transmission, after every received qbit, will verify the time delay T of the photon from the moment of transmission and the moment of reception. If the delay time T is not in normal limit, limits established by earlier communications, will stop the transmission. At the end of quantum transmission, and divide their bit sequences into blocks. They communicate thru the classical channel, comparing each other's blocks parity and retransmitting blocks that the parity did not match. VI. SIMULATION OF BB84 WITHOUT EAVESDROPPER S PRESENCE For the BB84 without Eavesdropper implementation, the software has been developed using C++ language. and will communicate through quantum channel and classical channel without the presence of Eavesdropper. This software consists of 4 objects, which are,, quantum channel and classical channel. will transmit qbits through the quantum channel and will acquire those qbits from the quantum channel. At the end of the quantum transmission, and will communicate through the classical channel and will proceed with Bases, Secret key and Privacy Amplification stages. Block diagram of BB84 without Eavesdropper implementation is presented in Fig. 1. PC Switch Fig. 1. Implementation of BB84 without Eavesdropper. PC 1) 2 workstation; Each workstation represents the and the. Static IP are used so that workstation can communicate via 66

the switch. Developed software is installed on each workstation to simulate the protocol. For this simulation, each of object ( and ) play different role. Only the appropriate function is executed on each of workstation, depends on its role, as shown in Fig. 2. channel. Quantum channel Classical channel Fig. 3. QBER vs.. ( s measured ) send (positions of right ) announce (measured ) ( right positions) Eavesdropper will interrupt the quantum channel, intercept those qbits, them and send to other qbits accordingly to his choice of. will acquire those modified qbits from the quantum channel. At the end of the quantum transmission, and will communicate through the classical channel, which can be tapped but not modified, and will proceed with Bases, Secret key and Privacy Amplification stages. Block diagram of BB84 implementation is presented in Fig. 4. PC Switch PC Fig. 2. Software protocol. C. Experimental Results After running the BB84 without eavesdropper simulation program 1 times, for a 32 bits primary key, we obtain the results from Table III. TABLE III. SIMULATION RESULTS OF BB84 WITHOUT EAVESDROPPER. QBER % 32 162 49.4 32 161 49.7 32 152 52.5 32 172 46.3 32 158.6 32 153 52.2 32 165 48.4 32 163 49.1 32 53.1 32 16. Analysing these data we can see that QBER value is approximately %, as shown in Fig. 3. VII. SIMULATION OF BB84 WITH EAVESDROPPER For the BB84 implementation, and will communicate through quantum channel and classical channel with or without the presence of Eavesdropper. This software consists of 5 objects, which are,, Eavesdropper, quantum channel and classical channel. will transmit qbits through the quantum Fig. 4. Implementation of BB84 with eavesdropper. 1) 3 workstation; Each workstation represents the and the. Static IP are used so that workstation can communicate via the switch. Developed software is installed on each workstation to simulate the protocol. For this simulation, each of object ( and ) play different role. Only the appropriate function is executed on each of workstation, depends on its role, as shown in Fig. 5. C. Experimental results PC Eavesdropper After running the BB84 with eavesdropper simulation program 1 times, for a 32 bits primary key, we obtain the results from Table IV. TABLE IV. SIMULATION RESULTS OF BB84 WITH EAVESDROPPER. Raw key QBER % 32 149 11 65.6 32 156 114 64.4 32 172 129 59.7 32 164 131 59.1 32 167 126 6.6 32 144 15 67.2 67

Raw key QBER % 32 159 15 67.2 32 133 18 66.3 32 162 117 63.4 32 171 123 61.6 For this simulation, only the appropriate function is executed on each of workstation, depends on its role, as shown in Fig. 7. Eavesdropper Eavesdropper Quantum channel Classical channel Quantum channel Classical channel (modify qbits) ( s measured ) send (positions of right ) announce (measured ) ( right positions) (modify qbits) ( s measured ) send (positions of right ) announce (measured ) ( right positions) QBTT ΔT = T - T Fig. 7. Software protocol. Fig. 5. Software protocol. Analysing these data we can see that QBER for BB84 with eavesdropper is approximately 64%, Fig. 6, with 14% greater than QBER for BB84 without eavesdropper, because the eavesdropper tapped the quantum channel. 1 2 3 4 5 6 7 8 9 1 Fig. 6. QBER vs. Raw key vs.. VIII. SIMULATION OF BB84 WITH QBTT For the simulation of BB84 with QBTT eavesdropper detection method, the software has been developed using C++ language. and will communicate through quantum channel and classical channel with or without the presence of the Eavesdropper. Raw key Block diagram of BB84 implementation is presented in Fig. 4. 1) 3 workstation; C. Experimental results After running the BB84 with QBTT simulation program 1 times, for a 32 bits primary key, we obtain the results from Table V. TABLE V. SIMULATION RESULTS OF BB84 WITH QBTT. Raw key QBER % 32 148 148 52.2 32 51.6 32 167 167 46.3 32 157 157 49.4 32 159 159 48.8 32 152 152.9 32 168 168 45.9 32 157 157 49.4 32 158 158 49.1 32 162 162 47.8 Analysing these data we can see that QBER value is approximately %, Fig. 8, although the eavesdropper was present. Raw key Fig. 8. QBER vs. Raw key vs.. 68

IX. SIMULATION OF BSPA PROTOCOL For the simulation of the Base Selection and Polarization Agreement protocol, the software has been developed using C++ language. and will communicate through quantum channel and classical channel with or without the presence of the Eavesdropper. Block diagram of BB84 implementation is presented in Fig. 4. 1) 3 workstation; All devices are setup in the same room. Switch or router is used to connect all workstation. Each workstation represents the, and the Eavesdropper. Static IP are used so that workstation can communicate via the switch. Developed software is installed on each workstation to simulate the protocol. This software consists of 5 objects, which are,, Eavesdropper, quantum channel and classical channel. and will establish in common, accordingly to the final key, which pair of, rectilineardiagonal, rectilinear-circular or diagonal-circular will be used for photons polarizations. Also, accordingly to the final key, and will establish exactly which polarization base to apply for each photon that has to be transmitted or received. will transmit qbits through the quantum channel and timestamp of each qbit through the classical channel. Eavesdropper will interrupt the quantum channel, intercept those qbits, them accordingly to his choice of and send to other qbits accordingly to his choice of. will acquire those qbits from the quantum channel and for each received qbit will verify the time delay T of the photon from the moment of transmission and the moment of reception. The software setup is presented in Fig. 9. TABLE VI. SIMULATION RESULTS OF BSPA. QBER % 32 32. 32 317.9 32 32. 32 319.3 32 32. 32 317.9 32 32. 32 319.3 32 32. 32 319.3 Analyzing these data we can see that QBER value is approximately.27%, as shown in Fig. 1. 1 2 3 4 5 6 7 8 9 1 Fig. 1. QBER vs.. X. CONCLUSIONS The software simulation programs are meant to give an alternative to physical implementation of the quantum devices used in the quantum transmission. This paper presents a comparison of the Quantum Bit Error Rate QBTT, between BB84, BB84 with attacks, BB84 with QBTT and BSPA protocols (Fig. 11, Appendix A) We can observe the advantages of the Quantum Bit Travel Time QBTT eavesdropper detection method by reducing the percentage of the QBER from the final key and also the advantages of the Base Selection and Polarization Agreement BSPA quantum communication protocol by reducing near,3 % the percentage of QBER. Eavesdropper APPENDIX A Quantum channel (modify qbits) Classical channel QBTT ΔT = T - T QBER % - BSPA QBER % - BB84 QBTT QBER % - BB84 attack QBER % - BB84 ideal Fig. 9. Software protocol. Fig. 11. QBER comparison. 2 4 6 8 C. Experimental results After running the BSPA simulation program 1 times, for a 32 bits primary key, we obtain the results from Table VI. REFERENCES [1] G. S. Vernam, Cipher printing telegraph systems for secret wire and radio telegraph communications, Journal of the IEEE, vol. 45, pp. 19 115, 1926. 69

[2] W. Yong, Unconditional Security of Cryptosystem: A Review and Outlook, Trends in Applied Sciences Research, vol. 6, no. 6, pp. 554 562, 211. [Online]. Available: http://dx.doi.org/1.3923/ tasr.211.554.562 [3] L. Bin, G. Fei, W. Qiao-Yan, Single-Photon Multiparty Quantum Cryptographic Protocols with Collective Detection, IEEE Journal of Quantum Electronics, vol. 47, no. 11, pp. 1383 139, 211. [Online]. Available: http://dx.doi.org/1.119/jqe.211.2167743 [4] B. Harry, C. Nishanth, et al, Position-Based Quantum Cryptography: Impossibility and Constructions, Advances in Cryptology Lecture Notes in Computer Science, vol. 6841, pp. 429 446, 211. [5] Quantum Key Distribution System (Q-Box) hardware equipment, MagiQ Technologies Inc. [Online]. Available: http://www. magiqtech.com/magiq/products.html [6] IDQ s Cerberis solution hardware equipment, Id Quantique SA. [Online]. Available: http://www.idquantique.com/networkencryption/cerberis-layer2-encryption-and-qkd.html [7] C. H. Bennett, G. Brassard, Quantum cryptography: Public key distribution and coin tossing, in Proc. of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, 1984, pp. 175 179. [8] M. K. Muhammad, X. Jie, Generalization of Quantum Key Distribution Protocol, International Journal of Computer Science and Network Security, vol. 12, no. 8, pp. 98 11, 212. [9] A. Treiber, A fully automated quantum cryptography system based on entanglement for optical fiber networks, New Journal of Physics, vol. 11, no. 4, pp. 1 19, 9. [Online]. Available: http://dx.doi.org/ 1.188/1367-263/11/4/413 [1] C. Anghel, New eavesdropper detection method in quantum cryptography, The annals of Dunarea de Jos University of Galati, vol. 34, no. 1, pp. 1 8, 211. [11] S. Zhao, H. De Raedt, Event-by-event Simulation of Quantum Cryptography Protocols, Journal of Computational and Theoretical Nanoscience, vol. 5, no. 4, pp. 49 4, 8. [12] C. Anghel, G. Coman, Base selection and transmission synchronization algorithm in quantum cryptography, in Proc. of the 17 th International Conference on Control Systems and Computer Science (CSCS17), Bucharest, Romania, 9, vol. 1, pp. 281 284. [13] C. Anghel, New quantum cryptographic protocol, The annals of Dunarea de Jos University of Galati, vol. 34, no. 2, pp. 7 13, 211. 7