APPLICATIONS. Quantum Communications

Similar documents
Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

LECTURE NOTES ON Quantum Cryptography

Security Implications of Quantum Technologies

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Applications of Quantum Key Distribution (QKD)

Quantum Cryptography and Security of Information Systems

Key Reconciliation with Low-Density Parity-Check Codes for Long-Distance Quantum Cryptography

Quantum Cryptography

Calculation of the Key Length for Quantum Key Distribution

National Institute of Standards and Technology Gaithersburg, MD, USA

Research, Development and Simulation of Quantum Cryptographic Protocols

Realization of B92 QKD protocol using id3100 Clavis 2 system

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum key distribution

Turbo Compression. Andrej Rikovsky, Advisor: Pavol Hanus

10 - February, 2010 Jordan Myronuk

Introduction to Quantum Cryptography

Ground-Satellite QKD Through Free Space. Steven Taylor

Cryptography in a quantum world

Belief-Propagation Decoding of LDPC Codes

Simulation of BB84 Quantum Key Distribution in depolarizing channel

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

A probabilistic quantum key transfer protocol

Practical aspects of QKD security

Quantum Key Distribution. The Starting Point

LDPC Codes. Slides originally from I. Land p.1

Quantum Cryptography. Marshall Roth March 9, 2007

Key distillation from quantum channels using two-way communication protocols

Lecture 4 : Introduction to Low-density Parity-check Codes

C. QUANTUM INFORMATION 111

High rate quantum cryptography with untrusted relay: Theory and experiment

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

arxiv: v1 [cs.it] 14 May 2018

Deterministic secure communications using two-mode squeezed states

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

C. QUANTUM INFORMATION 99

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Channel Coding for Secure Transmissions

Quantum key distribution for the lazy and careless

arxiv:quant-ph/ v2 17 Sep 2002

arxiv:quant-ph/ v1 25 Dec 2006

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Security and implementation of differential phase shift quantum key distribution systems

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Physical Layer and Coding

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Introduction to Quantum Key Distribution

Deep Random based Key Exchange protocol resisting unlimited MITM

1 1D Schrödinger equation: Particle in an infinite box

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

An Introduction to Low-Density Parity-Check Codes

Quantum Information Transfer and Processing Miloslav Dušek

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel

Practical quantum-key. key- distribution post-processing

EXIT-Chart Aided Code Design for Symbol-Based Entanglement-Assisted Classical Communication over Quantum Channels

Quantum Cryptography

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

Mobile Free Space Quantum Key Distribution for short distance secure communication

Quantum Cryptography

The PPM Poisson Channel: Finite-Length Bounds and Code Design

Practical Quantum Key Distribution

Network Coding and Schubert Varieties over Finite Fields

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes

Quantum key distribution: theory for application

Entanglement and Quantum Teleportation

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Performance-based Security for Encoding of Information Signals. FA ( ) Paul Cuff (Princeton University)

1 1D Schrödinger equation: Particle in an infinite box

Belief propagation decoding of quantum channels by passing quantum messages

LDPC Codes. Intracom Telecom, Peania

arxiv:quant-ph/ v2 7 Nov 2001

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security

Ping Pong Protocol & Auto-compensation

Information-Theoretic Security: an overview

16.36 Communication Systems Engineering

Quantum Information Processing and Diagrams of States

Low-density parity-check codes

Graph-based Codes for Quantize-Map-and-Forward Relaying

Rate Compatible Protocol for Information Reconciliation: An application to QKD

Decomposition Methods for Large Scale LP Decoding

Quantum Wireless Sensor Networks

One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information

Design of Raptor Codes in the Low SNR Regime with Applications in Quantum Key Distribution

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Digital Communications III (ECE 154C) Introduction to Coding and Information Theory

Transcription:

SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction of size in the components used in modern processors If the components become much smaller, the effects of quantum mechanics will begin to affect their performance. It would therefore seem that these effects present a fundamental limit to our computer technology. DELEN Politecnico di Torino 2 1

Quantum Key Distribution (QKD) In the last decades QKD it has emerged as one of the most important practical applications of quantum mechanics While the security of traditional cryptographic techniques relies on assumptions about the complexity of mathematical algorithms, the security of quantum cryptography is firmly based on the laws of quantums physics The security of Quantum Key Distribution (QKD) comes from the fact that measuring the state of a quantum system cannot be made without perturbing it DELEN Politecnico di Torino 3 Q bits Introduction to QKD QKD Scheme 4 2

Introduction to QKD Bits are associated ideally to a single PHOTON (therefore called Q bit) Photons can be encoded using different bases ((H V), diagonal, circular) Each «base» is composed of two orthogonal polarizations The transmission of each photon is composed of Selection of a random base (out of two possible options) Selection of the desired polarization within the considered base We consider a valid KEY any set of random bits known by bot Alice and Bob (and not Eve) The received secure key will be used for (one time pad) public key encription 5 transmission The correct base should be used, otherwise a random output will be obtained reception wrong base Introduction to QKD 1 correct base V 1 Information bit V H 0 H V base is selected in this example H Detected bit Q.bit 6 3

Quantum Superposition Principle When making a measurement thesystemisforcedtomakea random selection among the possible states and choose one. After the measurement, the system is in the state that will always give that answer; the possibility of other answer is gone No cloning theorem The no cloning theorem forbids the creation of identical copies of an arbitrary unknown quantum state. 7 transmission The correct base is transmitted after the Q bit detection reception Introduction to QKD Information bit V H V base is selected in this example H Detected bit Q.bit Eavesdropper The presence of eavesdropping may generate errors 8 4

Introduction to QKD Up to now, the most famous protocol suggested for QKD is the BB84 protocol The BB84 protocol consists of four stages: Transmission of the randomly encoded single photon stream Sifting of the previously exchange key Reconciliation to correct errors Privacy amplification in order to distill a final secure key BB84 uses the cascade reconciliation protocol, which operates in a number of rounds, and requires interaction between the two parties 9 BB84 Protocol Interaction 10 5

B92 Protocol 11 Soft QKD Protocols Even in absence of eavesdopping, errors may occur, and error correction (information reconciliation) may be needed We have been focusing on pragmatic information reconciliation schemes applied to QKD schemes using soft information processing techniques They can be applied to QKD schemes based both on Single Photons or WLP (weak laser pulse) sources with or without the use of decoy states The proposed information reconciliation protocols will use typically feed forward techniques, minimizing the interaction between transmitter and receiver 12 6

SOFT METRIC BASED QKD PROTOCOL 13 The considered QKD Scheme Transmission rate on QKD secret channel is generally low compared to the rate on the public channel ALICE Channel Encoding Redundant Bits Transmission Secret Key Transmission EVE Eavesdropper CLASSIC PUBLIC CHANNEL BER 0 SECURE (QUANTUM) CHANNEL QBER 0.1 Many attack strategies can be used by Eve, but they will alter the independent nature of the quantum channel BOB Joint Decoding and Reconciliation Secret Key Reception The BER on the public channel is low, while the QBER on the secure channel is high. Channel coding is required to make the secure channel more reliable 14 7

Soft Metric Based QKD Protocol Equivalent Systematic Block Code Information Bits are transmitted Quantum Channel Communication System Classic Communication System Redundant Information is transmitted Post Processing Decoding and error correction Information Reconciliation Privacy Amplification 15 LDPC for Information Reconciliation Low Density Parity Check codes (LDPC) are suggested, with the use of long information blocks. LDPC codes are forward error correcting (FEC) codes that have performance close to Shannon's channel capacity In spite of the large block length (which guarantees high coding rate), the use of iterative decoding allows for acceptable decoding complexity To minimize the quantity of information derived by Eve from the public channel the code rate must be maximized 16 8

SYSTEM CHARACTERIZATION: QUANTUM CHANNEL MODELS 17 Quantum Channel Some schemes for BB84 Protocol 18 9

BSC Quantum Channel Quantum channel can be modeled as a simply binary channel with error probability equal to the quantum bit error rate Q, when a single photon is transmitted 0 Xq k 1 1 Q 1 Q Q 0 Yq k Single Photon Quantum Channel 1 19 Multiple Output Quantum Channel When using WLP and decoy states, where N max photons are transmitted for every information bit, the quantum channel can be modeled as a multiple output discrete channel 21 Novembre 2011 0T(+N) Xw k 1T( N) +N max +2 +1 0 1 2 N max Quantum Channel using WLP 0R 1R DELEN Politecnico di Torino 10

Bayesian Inference Quantum Channel The information is encoded in qubits representing the polarization degree of freedom of 0 /4 1 3 /4 Bayesian estimation is used to obtain the stimated phase received at the detection stage 21 Bayesian Inference Quantum Channel The number of transmitted photons is a Poisson distributed random variable with mean: 0 /4 1 3 /4 Total numer of detected photons: 22 11

BIMO Quantum Channel The system described up to this point can be modeled as a Discrete Memoryless Channel (DMC) and more precisely as a Binary Input Multiple Output (BIMO) channel,, 23 Classic Communication System The public channel uses classic communication schemes, typically a radiofrequency link Since deep coding is allowed the BER is extremelly small It is modelled using an aditive white Gaussian noise channel (AWGN) Xr k N k Yr k Public Channel 24 12

AVAILABLE BITS AND METRICS 25 Tx Rx BSC Quantum Channel n q INFORMATION BITS 0 Xq k 1 QUANTUM CHANNEL 1 Q 1 Q Q n q Q METRICS 0 Yq k 1 Code Rate R c = n q /(n q +r) r REDUNDANT BITS PUBLIC CHANNEL Xr k N k Yr k r SOFT METRICS 21 Novembre 2011 DELEN Politecnico di Torino 26 13

BIMO Quantum Channel Tx Rx n q INFORMATION BITS, QUANTUM CHANNEL n q Q METRICS, Code Rate R c = n q /(n q +r) r REDUNDANT BITS PUBLIC CHANNEL Xr k N k Yr k r SOFT METRICS 21 Novembre 2011 DELEN Politecnico di Torino 27 0,1 Log Likelihood Ratios Classic Channel = 28 14

Evaluation Of Soft Metrics: Classical Channel As far as the redundant bits are concerned, we are dealing with the real received signal samples, whose conditional probability density function is Hence, the corresponding log likelihood metrics are 29 Log Likelihood Ratios 0,1 Quantum Channel 0,1 = 30 15

Evaluation of Soft Metrics: Quantum Channel (case 1) As far as the information bits are concerned, when single photon transmission is used, a BSC channel model as shown previously must be considered, with transmitted bits and received bits, whose soft metrics are 31 Evaluation of Soft Metrics: Quantum Channel (case 2) An alternative metric has also been considering supposing that the equivalent BSC model used in the private channel is obtained transmitting with a 2 PAM scheme so that: 32 16

Evaluation of Soft Metrics: Bayesian Inference Quantum Channel KPD,, Quantum Channel HWP 0 Xq k 1 0 Yq k 1 33 Evaluation of the Log Likelihood Ratios From the work of Teklu and Olivares, where it is assumed that during propagation, the qubit goes under a phase diffusion process whose amplitude is characterized by the parameter Δ, the following expression can be derived: 0 1 0 1 0 1 cos, 1 1 0 October 2011 ISABEL 2011 34 17

transmitted bits X received bits Y input metrics LLR(Y) decoded bits output metrics LLR(dec) Tx Rx n q INFORMATION BITS QUANTUM CHANNEL 0 1 n q Q METRICS 1 Q 1 Q r REDUNDANT BITS PUBLIC CHANNEL Xr k N k Yr k r SOFT METRICS final distilled key 35 Q LDPC DECODER dec 0 1 threshold DATA SIFTING DATA SIFTING The availability of soft output information, where the decoded bits are paired with the associated reliability, offers an instrument for performing efficient and selective information reconciliation Deleting from the decoded sequence (i.e., form the quantum key), the bits with low reliability, maintaining the most trusted information, allows for a variable rate security key generation protocol 36 18

transmitted bits X received bits Y input metrics LLR(Y) Tx Rx n q INFORMATION BITS QUANTUM CHANNEL 0 1 n q Q METRICS 1 Q 1 Q Q LDPC DECODER 0 1 r REDUNDANT BITS PUBLIC CHANNEL Xr k N k Yr k r SOFT METRICS 21 Novembre 2011 37 CONVERGENCE ANALYSIS 38 19

EXIT CHARTS An Extrinsic information transfer chart, commonly called EXIT chart, is a technique to aid the construction of good iteratively decoded errorcorrecting codes (in particular LDPC and Turbo codes) An EXIT chart includes the response of the elements of decoder. The response can either be seen as extrinsic information or a representation of the messages in belief propagation 39 EXIT CHARTS LDPC DECODER QKD information from information from PUBLIC channel QUANTUM channel SNR, (n k) parity bits QBER,, alphaq, k source bits VAR decoder CHK decoder information from CHK nodes information from V nodes 40 20

EXIT CHARTS EXIT chart of the LDPC decoder considered for Rc=0.61 as a function of α Q and for Q = 0.08 41 EXIT CHARTS The EXIT chart evaluated for the Rc = 0.61 LDPC decoder is depicted for Q = 0.08 and various values of α Q The maximum opening of the decoding tunnel between the variable and check nodes decoding curves is achieved for α Q =1. When the value of α Q is too small (for instance 0.1) or too large (for instance 1.6) variable nodes curve intersects the check nodes curve and, consequently, the belief propagation decoder cannot converge to any codeword in the space of possible solutions 42 21

SIMULATIONS RESULTS 43 Considerations LDPC codes with various rates (0.5 and 0.61) and various block lengths have been simulated α Q has been inserted in order to properly weigh the information derived from the q bits, which is typically less reliable than the information derived from the public channel. Weighed q metric values α Q LLR(Y qk ) have been considered as well as various values of the QBER parameter Q Public channel has been considered almost noiseless (η S =20dB), and perfect estimate of the QBER value has been assumed (Q est =Q) 44 22

Performance Evaluation: BER BER 10 0 R C =0.5, (504,252)-LDPC, 100 iter, 1/prec = 8 10-1 10-2 10-3 Q = 0.11 10-4 Q = 0.12 Q = 0.13 Q = 0.14 10-5 Q = 0.15 Q = 0.2 Q = 0.5 10-6 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 Q 45 FER Performance Evaluation: FER 10 0 R C =0.5, (504,252)-LDPC, 100 iter, 1/prec = 8 10-1 10-2 10-3 Q = 0.11 10-4 Q = 0.12 Q = 0.13 Q = 0.14 10-5 Q = 0.15 Q = 0.2 Q = 0.5 10-6 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 Q 46 23

Performance Evaluation: BER BER 10 0 R = 0.617, (408,252)-LDPC, 50 iter, 50 error frames 1/prec = 256 (8 bits) 10-1 10-2 10-3 10-4 10-5 Q = 0.015 Q = 0.02 10-6 Q = 0.025 Q = 0.03 10-7 Q = 0.04 Q = 0.05 Q = 0.08 10-8 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Q 47 Performance Evaluation: FER FER 10 0 R = 0.617, (408,252)-LDPC, 50 iter, 50 error frames 1/prec = 256 (8 bits) 10-1 10-2 10-3 10-4 10-5 Q = 0.015 Q = 0.02 10-6 Q = 0.025 Q = 0.03 10-7 Q = 0.04 Q = 0.05 Q = 0.08 10-8 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 Q 48 24

Performance Comparison: Q Channel Models BER; FER 10 0 10-1 10-2 10-3 10-4 10-5 10-6 10-7 BER Quantum BSC FER Quantum BSC BER Quantum AWGN FER Quantum AWGN BER Quantum Bayesian est. FER Quantum Bayesian est. 10-8 0 0.05 0.1 0.15 0.2 0.25 QBER BER and FER simulations Results for a LDPC code with rate. 21 Novembre 2011 DELEN Politecnico di Torino 49 Performance Comparison: Q Channel Models Average Decoding Iteration and Normalized Variance 10 2 10 1 10 0 10-1 Iter(Q-BSC) Var(Q-BSC) Iter(AWGN Q-ch) Var(AWGN Q-ch) Iter(Q-bayesian) Var(Q-bayesian) 10-2 0 0.05 0.1 0.15 0.2 0.25 0.3 QBER Average decoding Iteration and Normalized Variance of the LDPC Decoder (Rc=0.61) 50 25

Overall Performance of the LDPC Decoders LDPC with R c = 0.5 Guarantees better correcting capabilities but less security 51 Residual BER Overall Performance after Data Sifting 10-1 10-2 10-3 10-4 10-5 Q = 0.03 Q = 0.04 Q = 0.05 Q = 0.08 10-6 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Threshold Residual BER after data sifting for different values of Q for the LDPC code 21 Novembre with 2011 n = 408, r = 252 and Rc = 0.61, DELEN as Politecnico a function di Torino of the considered sifting threshold 52 26

% Discarded Bits Overall Performance after Data Sifting 50 20 10 5 Q = 0.03 Q = 0.04 Q = 0.05 Q = 0.08 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Threshold %Discarded Bits after data sifting for different values of Q for the LDPC code 21 Novembre with 2011 n = 408, r = 252 and Rc = 0.61, DELEN as Politecnico a function di Torino of the considered sifting threshold 53 CAPACITY EVALUATION BIMO QUANTUM DMC 54 27

Capacity Evaluation,,, Skellam Distribution, 1 0 0 1 55 Classical Capacity of BIMO Quantum DMC Classical Capacity of BIMO Quantum DMC and equivalent BSC 21 Novembre 2011 as a function of the mean photon count Nc DELEN Politecnico di Torino 56 28

Some Considerations A «composite channel» has been identified. The model consists of a quantum channel and a classic channel in parallel, through which a secret key is securely exchanged between two parties The use of mixed metrics is suggested. These metrics are derived from the composite channel and combined in the LDPC decoder to perform a more efficient reconciliation of the exchange key, using belief propagation techniques The design and implementation of an algorithm for the stages of information reconciliation and error correction in QKD schemes, using channel coding along with soft processing techniques and iterative decoding has been proposed An analysis on the convergence of the LDPC decoders as a function of the channel parameters, has been performed with the intention of suggesting a technique to detect the presence of a possible eavesdropper interfering the communication 57 Some Considerations A multi level quantum channel «BIMO Quantum DMC» has been identified and the evaluation of its theoretical capacity bound has been calculated BIMO Quantum DMC offers a capacity improvement over the equivalent BSC quantum channel (leading to a BER improvement when comparing the two channel in presence of an error correction code). From the results obtained via simulation it is evident that there is a significant reduction in the values of the B ER and FER for several QBER values; meaning that a significant larger portion of the data after the stages of sifting and reconciliation can be kept The proposed protocol, having a negligible cost, can reduce the residual FER in QKD systems, largely reducing the interaction required between the two parties involved, increasing the key rate and protecting the secrecy of the information exchanged 58 29