Applications of Quantum Key Distribution (QKD)

Similar documents
APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD

Realization of B92 QKD protocol using id3100 Clavis 2 system

Quantum Cryptography

Quantum Information Transfer and Processing Miloslav Dušek

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

Quantum threat...and quantum solutions

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Quantum cryptography and quantum hacking. Dr. Lars Lydersen

Research, Development and Simulation of Quantum Cryptographic Protocols

APPLICATIONS. Quantum Communications

LECTURE NOTES ON Quantum Cryptography

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Practical Quantum Key Distribution

Practical quantum-key. key- distribution post-processing

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Practical aspects of QKD security

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

C. QUANTUM INFORMATION 111

Quantum key distribution for the lazy and careless

10 - February, 2010 Jordan Myronuk

Quantum Key Distribution. The Starting Point

C. QUANTUM INFORMATION 99

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Communications Quantiques

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Hacking. Feihu Xu Dept. of Electrical and Computer Engineering, University of Toronto

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

National Institute of Standards and Technology Gaithersburg, MD, USA

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Security of Quantum Key Distribution with Imperfect Devices

arxiv:quant-ph/ v1 25 Dec 2006

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Ground-Satellite QKD Through Free Space. Steven Taylor

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Calculation of the Key Length for Quantum Key Distribution

Quantum Information. and Communication

Quantum Cryptography

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Quantum Cryptography and Security of Information Systems

Security and implementation of differential phase shift quantum key distribution systems

Quantum Cryptography. Marshall Roth March 9, 2007

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Device-Independent Quantum Information Processing

Cryptography in a quantum world

Experimental realization of quantum cryptography communication in free space

Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

Quantum key distribution

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

An entangled LED driven quantum relay over 1km

Introduction to Quantum Cryptography

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Device-Independent Quantum Information Processing (DIQIP)

Other Topics in Quantum Information

Security of quantum-key-distribution protocols using two-way classical communication or weak coherent pulses

Ping Pong Protocol & Auto-compensation

Simulation of BB84 Quantum Key Distribution in depolarizing channel

A Simulative Comparison of BB84 Protocol with its Improved Version

Standardization of Quantum Cryptography in China

Practical quantum key distribution with polarization entangled photons

High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Entanglement-based QKD from Micius

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

BB84 and Noise Immune Quantum Key Distribution Protocols Simulation: An Approach Using Photonic Simulator

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Chapter 5. Quantum Cryptography

Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled Light

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada

Quantum Key Distribution

Introduction to Quantum Computing

Device-independent Quantum Key Distribution and Randomness Generation. Stefano Pironio Université Libre de Bruxelles

arxiv:quant-ph/ v1 26 Mar 2001

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

arxiv:quant-ph/ v2 7 Nov 2001

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Quantum cryptography: from theory to practice

Security Issues Associated With Error Correction And Privacy Amplification In Quantum Key Distribution

Quantum Communication Networks and Technologies

Key distillation from quantum channels using two-way communication protocols

Unconditionally secure deviceindependent

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

arxiv:quant-ph/ v6 6 Mar 2007

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Beating Quantum Hackers

The QEYSSat Mission: Demonstrating Global Quantum Key Distribution Using a Microsatellite

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Quantum Key Distribution

Fundamental rate-loss tradeoff for optical quantum key distribution

arxiv:quant-ph/ v2 17 Sep 2002

arxiv:quant-ph/ v1 22 Mar 2002

Universally composable and customizable post-processing for practical quantum key distribution

Quantum Entanglement Assisted Key Distribution

Quantum key distribution: theory for application

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Correlations as Necessary Precondition for Secure Communication

Transcription:

Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano, Aalto University

Quantum q Quantum communication Communicate bits in absolute security q Quantum key distribution Generate keys of a priori unknown bits in absolute security q Security guaranteed by laws of nature Not hypotheses on problem hardness Principles of quantum mechanics have been under doubt for the better part of 100 years Proven to be more fault tolerant than most laws of nature q Quantum: communication with definitely non-macroscopic number of particles, and non-macroscopic energy Ł this is fragile 2

Point-to-point Eve Alice Bob 3

Trusted Node Network q Caveat: Assume that green blobs completely isolated, except for the communication links puncturing them 4

What s Up in the World? q China: QKD-satellite (August 2017) 2000 km QKD-network (August 2017) q ID Quantique (Switzerland) > 100 QKD systems soled (by 2017) New Clavis3: 3 kbps over 50 km, max distance 100 km q Toshiba 2 Mbps over 50 km, 10 Mbps over 10 km Trusted node networks under construction Ultimate goal: quantum internet 5

Quantum Security q Based on 1. transmissions in quantum basis unknown to Eve and Bob 2. and collapse of wave function during measurement To get hold of the information, one has to measure Ł An eavesdropper on line leaves signature of presence 3. and no-cloning theorem: Eavesdropper cannot clone an unknown state and then collapse it q Quantum hacking happens in the engineering domain 6

Prototype Protocol: BB84 7

Stages of QKD q Generate raw keys q Sifting Agree what you agree about q Correct errors q Privacy Amplification Compress away information that Eve may have q Authenticate q Use key in cryptography 8

Hardware and Software q Hardware Low-loss fiber Truly random number generators Light sources (attenuated lasers) Single photon detectors ŁTo increase range: invest in expensive fiber, or cooling of detectors q Non-zero key rate at 404 km [Yin 2016] q ultra-low loss fiber, superconducting detectors q Quantum protocols Generating, transmitting and receiving quantum states q Classical protocols Error correction, privacy amplifiation, authentication Increase range: invest in digital innovation 9

Error Correction & Privacy Amplification q The channel may cause errors in the sifted bits: QBER q Correcting errors: Alice and Bob want the same secret Errors have to be corrected Classical error correction coding A fraction of the sifted bits are lost in this q Privacy amplification All errors assumed to be caused by Eve Ł part of bits discarded q Conventional method: If QBER > 11% Ł key rate = 0 10

IDQuantique QKD setup Alice 50 km optical fiber in between Bob

Measurement Results Gap between theory and practice: Coding inefficiency (can be shrunk a bit) Authentication q ID Quantique commercial product Clavis2 q Error correction based on Cascade q Key production runs lasting days Fluctuations in performance observed 12

Advantage Distillation q The conventional scheme (and QBER < 11% bound) is based on assumption that Bob reconstructs the whole key before privacy amplification q Relaxing this it is possible to construc two-way protocols that work up to QBER 20% [Chau 2002, Renner 2005] q Advantage Distillation: Discard some part of the sifted key where there is a higher density of errors Concentrate on correcting a part with a lower density of errors q Two-way key exchange enables longer distances 13

Problems of Two-way Protocols q Why does, e.g., ID Quantique not use two-way protocol? q Conventional wisdom about two-way protocols: when QBER is low, they produce low key rate [Scarani 2009] q This wisdom holds with current protocols q We do not see any fundamental reason why this should be so. 14

Projected Perfromance of Advantage Distillation 15

Zoom A. Potential range increase from advantage distillation B. Problematic range where detector dark count dominates QBER (cooling helps) 16

Summary q Discussed Quantum key distribution q Reported measurement results from key production runs lasting days q Reported work on error correction in Quantum Key Distribution q Novel error correction & privacy amplification that can be used with any quantum key generation protocol q Applying on top of state of the art commercial equipment would increase range by ~10% (almost for free) q The best protocol in classical part with any QBER q High potential to further increase range, if cooling applied to reduce detector-induced errors 17