Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Similar documents
Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

TWO-LAYER QUANTUM KEY DISTRIBUTION

arxiv:quant-ph/ v2 7 Nov 2001

Practical quantum-key. key- distribution post-processing

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Ping Pong Protocol & Auto-compensation

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Simulation of BB84 Quantum Key Distribution in depolarizing channel

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

Trustworthiness of detectors in quantum key distribution with untrusted detectors

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

A Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol

Realization of B92 QKD protocol using id3100 Clavis 2 system

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

Security of Quantum Key Distribution with Imperfect Devices

Trojan-horse attacks on quantum-key-distribution systems

arxiv: v2 [quant-ph] 8 Feb 2013

Ground-Satellite QKD Through Free Space. Steven Taylor

Quantum key distribution with 2-bit quantum codes

Deterministic secure communications using two-mode squeezed states

arxiv: v1 [quant-ph] 18 May 2018

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Security aspects of quantum key distribution with sub-poisson light

Experimental realization of quantum cryptography communication in free space

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Security and implementation of differential phase shift quantum key distribution systems

arxiv:quant-ph/ v1 13 Mar 2007

10 - February, 2010 Jordan Myronuk

Quantum key distribution for the lazy and careless

Security Implications of Quantum Technologies

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography: A Short Historical overview and Recent Developments

arxiv:quant-ph/ v1 6 Dec 2005

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Quantum Key Distribution. The Starting Point

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

arxiv: v1 [quant-ph] 30 Jan 2017

Practical Quantum Key Distribution

Quantum Cryptography and Security of Information Systems

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

A probabilistic quantum key transfer protocol

Quantum Cryptography

Counterfactual Quantum Deterministic Key Distribution

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

1 1D Schrödinger equation: Particle in an infinite box

arxiv:quant-ph/ v3 13 Mar 2007

arxiv:quant-ph/ v1 25 Dec 2006

Circular Semi-Quantum Secret Sharing Using Single Particles

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Technical Report Communicating Secret Information Without Secret Messages

arxiv:quant-ph/ v1 13 Jan 2003

Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography

1 1D Schrödinger equation: Particle in an infinite box

arxiv:quant-ph/ v2 2 Jan 2007

Security of high speed quantum key distribution with finite detector dead time

arxiv:quant-ph/ v1 27 Dec 2004

Fundamental Security Issues in Continuous Variable Quantum Key Distribution

Quantum cryptography -the final battle?

Security of quantum-key-distribution protocols using two-way classical communication or weak coherent pulses

Quantum secret sharing based on quantum error-correcting codes

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

arxiv:quant-ph/ v1 26 Mar 2001

C. QUANTUM INFORMATION 99

Device-Independent Quantum Information Processing

arxiv:quant-ph/ v2 11 Jan 2006

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

Biased decoy-state reference-frame-independent quantum. key distribution

Introduction to Quantum Cryptography

Problem Set: TT Quantum Information

Title Experimental long-distance quantum secure direct communication

Quantum cryptography: from theory to practice

arxiv:quant-ph/ v1 10 Apr 2006

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

State Decoding in Multi-Stage Cryptography Protocols

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

arxiv: v1 [quant-ph] 3 Jul 2018

Quantum Cryptography. Marshall Roth March 9, 2007

arxiv:quant-ph/ v6 6 Mar 2007

arxiv:quant-ph/ v2 17 Sep 2002

C. QUANTUM INFORMATION 111

Research, Development and Simulation of Quantum Cryptographic Protocols

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

A. Quantum Key Distribution

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States

arxiv: v3 [quant-ph] 25 Feb 2015

Single Photon Generation & Application in Quantum Cryptography

Satellite-Relayed Intercontinental Quantum Network

Analysis of the Influenceof the Rate of Spies Measure on the Quantum Transmission

Efficient controlled quantum secure direct communication based on GHZ-like states

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

arxiv: v1 [quant-ph] 3 Dec 2015

arxiv: v2 [quant-ph] 9 Nov 2011

BB84 and Noise Immune Quantum Key Distribution Protocols Simulation: An Approach Using Photonic Simulator

Quantum Cryptography

Transcription:

Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C

Quantum Key Distribution QKD allows secure key distribution Keys are then used in classical cryptography e.g. One-time pads (XOR with key length)

QKD is all about distributing random keys Using the Laws of QM, an eavesdropper can be detected, and the key distribution aborted Otherwise, the key is guaranteed to be secure, and used as OTP

BB84 First QKD algorithm Most of QKD/Quantum Cryptography is derived from BB84 Proven secure given some assumptions Practically implementable!

BB84 Review Alice encodes random bits {0, 1} in random basis {0/1, +/ }, sends to Bob Bob receives bits and measures in random basis Alice reveals basis chosen, both compare to see which bits are viable Sacrifice portion of successfully sent bits to detect Eve C. H. Bennet and G. Brassard, Quantum Cryptography: Public key distribution and coin tossing, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, p. 175 (1984).

BB84 Security Assumptions Physical security of encoding/decoding devices True source of random bits (e.g. Quantum) Authenticated classical channel to compare bits Reliable single photon emitters and detectors These last two requirements are hard! P. W. Shor and J. Preskill, Physical Review Letters 85, 441 (2000) D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, Quant. Inf. Comp. 4, 325 (2004)

Attacks Practical photonic QKD implementations are vulnerable to imperfect assumptions Here we describe attacks that are result of difficulties in outputting single photons Photon number splitting attack (PNS) Beam-splitting attack (BS)

Poisson Approximation to Single Photon QKD First practical implementations of QKD (BB84) used attenuated laser light source Only option available at the time Still used as they are affordable and accessible But only an approximation to singlephoton source

The photon emission properties of a laser are described by the Poisson distribution We can control the mean of the distribution This is termed the mean photon number Security aspects of quantum key distribution with sub-poisson light. Edo Waks, Charles Santori, and Yoshihisa Yamamoto. Physical Review Letters, 66 (2002) 042315

Photon number splitting attack This small probability of sending multiple photons gives Eve an opportunity to capture the key Eve captures one photon per each bit sent by Alice She sends along n-1 photons through her ideal network to Bob, storing the remaining one for future measurement Hence all transmissions of single photons to Bob get blocked

During the discussion phase of BB84, Eve measures the captured photons in the basis that Alice reveals to Bob Hence, Eve has captured 100% of the key How can we make this secure?

Potential Solutions Decoy Pulse QKD SARG04, a minor variation on BB84 Differential phase shift QKD True single photon sources

Decoy Pulse QKD Two queues of random bits Signal source typical sub-poisson source Decoy source is fixed multi-photon source Alice randomly interleaves signal bits with decoy bits and sends them to Bob Same classical comparison as BB84 Decoy State Quantum Key Distribution. Hoi-Kwong Lo, Xiongfeng Ma, Kai Chen. Physical Review Letters, 94 (2005) 230504 Quantum Key Distribution with High Loss: Toward Global Secure Communication. Won-Young Hwang. Physical Review Letters, 91(2003) 057901

During the revealing phase Alice looks at the decoy pulse and signal pulse loss If loss of decoy pulse << signal pulse then the process aborted This means that Eve was blocking single photon pulses and she has intercepted keys Otherwise, majority of signal pulses were sent as single photon events and key was delivered securely

SARG04: BB84 with nonorthogonal states Just like BB84, Alice is sending one of 0, 1, +, Bob measures in a random basis 0/1 or +/ Then, instead of announcing the basis Alice sent her random bit in, she announces the state she sent and one of the two states from the other basis at random Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations. Valerio Scarani, Antonio Acín, Grégoire Ribordy, and Nicolas Gisin. Physical Review Letters, 92(2004) 057901

0, 1 classical bit 1 +, classical bit 0 0 This is the non-orthogonal nature of SARG04 Bob only gains knowledge of Alice s qubit when he encounters a complete contradiction of his measurement basis and her broadcast pair + 1

Example: Alice sends + ( 0 classical) Bob measures in 0/1 basis and gets 1 Case 1: Alice reveals A+,1 Bob knows that he could have measured 1 either because Alice did or by chance Result must be discarded Case 2: Alice reveals A+,0 Bob sees that his result contradicts Alice s statement, therefore he knows that Alice chose + which is classical 0

SARG04 defeats the storage attack Since Alice no longer announces the basis used to transmit, Eve can t take advantage of the stored photons Now, she has only 50/50 odds of guessing the correct basis, since the classical values 0 and 1 lie in non-orthogonal bases, respectively.

Differential phase shift QKD Alice sends a coherent train of pulses all randomly modulated between {0,π} to Bob using a Poisson distribution Bob divides each pulse into two paths and then recombines them using a beam splitter When the beams are recombined the phase difference between the two pulses will either be 0 or π Influence of multi-photon pulses on practical differential-phase-shift quantum key distribution. Zhao Feng, Fu Ming-Xing, Lu Yi-Qun and Liu Song- Hao. Chinese Physiscs, 16, 3402 (2007)

When Eve applies the PNS attack, the possible number of photons found in each pulse changes to exactly 0 or 1, instead of a Poisson distribution This introduces bit errors into the recombined pulse that Bob receives, when Bob measures his states he can detect Eve Differential-phase-shift quantum key distribution experiment using fast physical random bit generator with chaotic semiconductor lasers. Toshimori Honjo, et al. Opt. Express 17, 9053-9061 (2009)

DPS-QKD still susceptible to Beam Splitting attack Eve takes advantage of the long distance that the photons have to travel between Alice and Bob She inserts a beam splitter into Alice and Bob s path and diverts the photons Eve keeps a portion of the beam and sends the rest on to Bob through a lossless channel (making the loss undetectable) BS attacks do not introduce any errors to the system

Transmission distance is not limited by BS attacks in differential phase shift QKD The probability that Eve intercepts information increase as the mean photon number increases, but remains the same for different transmission distances PNS and BS cannot limit the transmission distance as long as an appropriate mean photon number is selected

True single photon sources Research in this area is limited and recent Performance scales linearly as with DPS-QKD, except imperfect material properties limit throughput over long distances Even if a reliable single photon source were discovered there are still transmission/ throughput limits inherent in practical implementation

Example Single atom in turnstile controls the output of photons Resonance controlled Other designs use quantum dots which have ~100% emission when excited A Photon Turnstile Dynamically Regulated by One Atom Barak Dayan, A. S. Parkins, Takao Aoki, E. P. Ostby, K. J. Vahala, and H. J. Kimble (22 February 2008) Science 319 (5866), 1062. A Quantum Dot Single-Photon Turnstile Device. P. Michler, A. Kiraz, C. Becher, W. V. Schoenfeld, P. M. Petroff, Lidong Zhang, E. Hu, A. Imamog (22 December 2000). Science 290 (2282)