Quantum Wireless Sensor Networks

Similar documents
Technical Report Communicating Secret Information Without Secret Messages

Entanglement and Quantum Teleportation

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

CSCI 2570 Introduction to Nanocomputing. Discrete Quantum Computation

Hiding Data in a QImage File

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Classical Verification of Quantum Computations

A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY

CS120, Quantum Cryptography, Fall 2016

CPSC 467b: Cryptography and Computer Security

Quantum Cryptography

Cryptographical Security in the Quantum Random Oracle Model

Notes for Lecture 17

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Entanglement and information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Fraud within Asymmetric Multi-Hop Cellular Networks

2. Cryptography 2.5. ElGamal cryptosystems and Discrete logarithms

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.

Introduction to Quantum Information Hermann Kampermann

Ping Pong Protocol & Auto-compensation

IBM quantum experience: Experimental implementations, scope, and limitations

Quantum Information Transfer and Processing Miloslav Dušek

Lecture 11 September 30, 2015

Lecture 28: Public-key Cryptography. Public-key Cryptography

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

Other Topics in Quantum Information

arxiv:quant-ph/ v1 6 Dec 2005

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Lecture: Quantum Information

Quantum information and quantum computing

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Research Article Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Lecture 6: Quantum error correction and quantum capacity

Quantum Information Processing and Diagrams of States

Quantum Cryptography

Quantum Teleportation Pt. 3

CS257 Discrete Quantum Computation

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Security Implications of Quantum Technologies

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

arxiv:quant-ph/ v1 27 Dec 2004

A Highly Secure Quantum Communication Scheme for Blind Signature using Qubits and Qutrits

Universal Blind Quantum Computing

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

10 - February, 2010 Jordan Myronuk

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Perfectly secure cipher system.

Security of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent

A probabilistic quantum key transfer protocol

Quantum Gates, Circuits & Teleportation

Lecture 1: Introduction to Public key cryptography

Quantum Cryptography and Security of Information Systems

C. QUANTUM INFORMATION 111

CPSC 467: Cryptography and Computer Security

A Piggybank Protocol for Quantum Cryptography

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Practice Assignment 2 Discussion 24/02/ /02/2018

A survey on quantum-secure cryptographic systems

Errors, Eavesdroppers, and Enormous Matrices

Quantum Teleportation Pt. 1

The odd couple: MQV and HMQV

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Asymmetric Encryption

Grover s algorithm based multi-qubit secret sharing scheme

SUPERDENSE CODING AND QUANTUM TELEPORTATION

Decay of the Singlet Conversion Probability in One Dimensional Quantum Networks

CS-E4320 Cryptography and Data Security Lecture 11: Key Management, Secret Sharing

arxiv: v3 [quant-ph] 6 Sep 2009

arxiv:quant-ph/ v2 3 Oct 2000

Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable,

Lectures 1&2: Introduction to Secure Computation, Yao s and GMW Protocols

Lecture 18 - Secret Sharing, Visual Cryptography, Distributed Signatures

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Quantum Computation and Communication

Question: Total Points: Score:

EFFICIENT SIMULATION FOR QUANTUM MESSAGE AUTHENTICATION

C. QUANTUM INFORMATION 99

Public Key Cryptography

A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State

arxiv: v7 [quant-ph] 20 Mar 2017

Quantum Symmetrically-Private Information Retrieval

Advanced Cryptography Quantum Algorithms Christophe Petit

Universal Single Server Blind Quantum Computation Revisited

arxiv:quant-ph/ v2 2 Jan 2007

1 Number Theory Basics

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

Lattice-Based Cryptography

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

Multiparty Quantum Remote Control

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.

Transcription:

Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008

Main Result Quantum cryptography can solve the problem of security in sensor networks. The security scheme presented in the following slides uses secret keys to encrypt messages. The secret keys are developed in a quantum setting and thus have the advantage of quantum cryptography: The secret keys are effectively unbreakable.

Administrator - Walks in the field, listens and sends messages in the sensor network. Takes decision concerning movement, queries. Central Authority - Provides security. Sensor Nodes - Measure parameters in their environment. Send and receive messages. Intruder - Listens to the environment to gather information. Task: Protect the environment from the intruder.

Overview 1 Sensor Networks 2 Security 3 Entangled Qubits 4 Quantum Sensor Networks 5 Quantum Teleportation and Entanglement Swapping 6 Security Protocols 7 Conclusions 8 Open Problems

Sensor Networks Sensor nodes are deployed at random. Restricted by their transmission range, they self organize in a network. The administrator is moving in the field. The central authority (CA) can communicate with the administrator.

Security in Sensor Networks Security in sensor networks has been studied less extensively than the reliability of sensor networks. The problem of security in sensor networks arises from the type of application the sensor network is used for. The type of application also defines the type of possible attacks on the network. 1 External Attacks Listening to the environment for messages passed in the network. Inserting a fake node. 2 Internal Attacks Physically capturing a node and then using the compromised node to send virus-type messages.

Previous Work 1 External Attacks Various secret key management schemes Encrypt every packet. Authenticate every sensor node. 2 Internal Attacks Eliminate nodes that have a high probability of being compromised or of becoming compromised in the future.

New Approach: Using a Quantum Setting Addresses external attacks. Uses the advantages of quantum cryptography. It is a simple secret key management system. The secret keys are quantum generated. The secret key is generated only when needed and is used exactly once. Therefore, an intruder has practically no chance to discover the secret key. The intruder has to know in advance both the time and the place in the network, where the key will be generated.

Qubits A classical bit has two states: 0 and 1. A qubit is a vector on a unitary sphere. The position of the vector on the sphere yields the binary value. If the vector is Up. The qubit has the value 1. Down. The qubit has the value 0. On the equator. The qubit has an equal probability (50%) of being 0 or 1. In any other position. The qubit is in some superposition of 0 and 1.

Measuring the Value of a Qubit In general, a qubit Ψ = α 0 + β 1 is a superposition of 0 and 1. When Ψ is measured, the result will be a classical 0 or 1. The probability to measure a 0 is α 2 and the probability to measure a 1 is β 2.

Entangled Qubits An ensemble of two qubits is represented as the tensor product of its component vectors. For example: Ψ = ( 1 0 + 1 1 ) ( 1 0 1 1 ) = 1 ( 00 01 + 10 11 ). 2 2 2 2 2 Now, there exist states describing an ensemble of two (or more) qubits that cannot be decomposed into a tensor product of two distinct qubits. For example: \ α, β, γ, δ such that (α 0 + β 1 ) (γ 0 + δ 1 ) = = αγ 00 + αδ 01 + βγ 10 + βδ 11 = 1 2 00 + 1 2 11 An ensemble of (two) qubits that cannot be written as a tensor product is called entangled. The states of the two qubits are not independent.

Entangled Qubits - Continued The most common entangled states are the Bell states: q A q B = Φ + = 1 2 ( 00 + 11 ) q A q B = Φ = 1 2 ( 00 11 ) q A q B = Ψ + = 1 2 ( 01 + 10 ) q A q B = Ψ = 1 2 ( 01 + 10 ) For each Bell state, measuring one qubit, collapses the other qubit to a classical state. For Φ +, the following two scenarios are possible: q A = 0 > q B = 0 q A = 1 > q B = 1

Quantum Sensor Networks Each sensor node has some n qubits. The administrator has m qubits, with m > n. Each of these qubits is entangled with a second qubit stored at the central authority.

Security Setting The central authority (CA) is trusted. The administrator is trusted. The sensor nodes are trusted. This is a strong assumption. The environment carrying the messages is not trusted.

Security Problem The intruder listens to the environment to gather information about the location of events, the nature of the events, the parameters of the events, and so on. Problem: Encrypt the messages broadcast in the environment such that they will not be intelligible to the intruder.

Security Protocols The paper discusses two possible scenarios 1 The administrator wants to obtain information from a selected sensor at location (x, y). 2 A sensor node detects some event at its location (x, y) and wants to inform the administrator. It is advantageous if sensor nodes have unique identifiers, beside their physical location. In this case, all messages addressed to a sensor node contain the identifier, rather than the location, thus hiding (x, y) from the intruder.

First Security Protocol - The Administrator s Query The administrator wants to obtain information from a selected sensor at location (x, y). 1 The administrator broadcasts a query into the field.

First Security Protocol - The Administrator s Query The administrator wants to obtain information from a selected sensor at location (x, y). 1 The administrator broadcasts a query into the field. 2 The selected sensor node answers the query. Messages can be further exchanged.

First Security Protocol - The Administrator s Query The administrator wants to obtain information from a selected sensor at location (x, y). 1 The administrator broadcasts a query into the field. 2 The selected sensor node answers the query. Messages can be further exchanged. The intruder will not be able to gather information about the nature or the parameters of the events at (x, y), but is able to know that there was a query for (x, y). [Think of (x, y) as the node identifier, not its coordinates.]

Second Security Protocol - The Sensor Node s Request A sensor node detects some event and wants to inform the administrator. 1 The sensor node broadcasts a request in the network, presenting itself as (x, y).

Second Security Protocol - The Sensor Node s Request A sensor node detects some event and wants to inform the administrator. 1 The sensor node broadcasts a request in the network, presenting itself as (x, y). 2 The administrator broadcasts a query into the field.

Second Security Protocol - The Sensor Node s Request A sensor node detects some event and wants to inform the administrator. 1 The sensor node broadcasts a request in the network, presenting itself as (x, y). 2 The administrator broadcasts a query into the field. 3 The selected sensor node answers the query. Messages can be further exchanged.

Second Security Protocol - The Sensor Node s Request A sensor node detects some event and wants to inform the administrator. 1 The sensor node broadcasts a request in the network, presenting itself as (x, y). 2 The administrator broadcasts a query into the field. 3 The selected sensor node answers the query. Messages can be further exchanged. The intruder can detect the initiative of the sensor node, but gathers no information about the nature and parameters of the event.

Role of the Central Authority Construct a k-bit key to be used by the administrator and sensor node for secure communication. This is done through entanglement swapping.

Entanglement Swapping The following steps involve the CA when performing entanglement swapping. 1. The administrator informs the CA of the intention to query a sensor at the approximate location (x, y). The classical channel uses classical binary bits (non-quantum) and can be authenticated using private keys or public keys for digital signature.

Entanglement Swapping - Continued 2. The CA selects a sensor node in the vicinity location (x, y). 3. The CA selects k of its qubits entangled with the qubits of the sensor at (x, y) and k qubits entangled with qubits of the administrator.

Entanglement Swapping - Continued 4. Consider two such entangled pairs The CA performs an entanglement swap. This is done for all k pairs.

How Entanglement Swapping Is Performed The CA performs a measurement on q a and q s in the Bell Basis. Φ + = 1 2 ( 00 + 11 ) Φ = 1 2 ( 00 11 ) Ψ + = 1 2 ( 01 + 10 ) Ψ = 1 2 ( 01 10 ) Now the administrator and the sensor node have entangled qubits.

Entanglement Swapping - Ensemble of the Four Qubits before Measurement ensemble = 1 2 ( 00 + 11 ) 1 2 ( 00 + 11 ) = 1 2 ( 0000 + 0011 + 1100 + 1111 ) = 1 2 2 ( 0 Φ+ 0 + 1 Φ + 1 + 0 Φ 0 1 Φ 1 + 0 Ψ + 1 + 1 Ψ + 0 + 0 Ψ 1 1 Ψ 0 ).

How Entanglement Swapping Is Performed - Continued 1 The CA performs a partial measurement in the Bell basis. The outcome of the measurement is one of the values Φ +, Φ, Ψ +, or Ψ. 2 The CA informs the administrator of the outcome of the measurement. The communication is done via the classical authenticated channel.

How Entanglement Swapping Is Performed - Continued 1 The administrator knows now the type of the entanglement of its qubit with the sensor node.

Forming the Secret Key The administrator and the sensor node, each measure their qubits to obtain one (classical) bit of the (k-bit) secret key. 1 If the entanglement was of type Φ + or Φ that bit would be the same for both the administrator and the sensor node. 2 If the entanglement was of type Ψ + or Ψ, the administrator and the sensor node will have complementary bits. Consequently, the administrator s bit gets flipped.

First Protocol - The Administrator Gathers Information from the Field 1 The administrator sends the location of interest (x, y) to the central authority. 2 The central authority locates a sensor node s close to (x, y).

First Protocol - Continued 3 The administrator and the sensor establish a secret key using entanglement swapping. 4 The administrator sends an encrypted query to the node s. 5 The node s sends the answer back, using the same encryption key.

Second Protocol - Some Node s Detects an Event 1 The sensor s detects an event. 2 s broadcasts an unencrypted message saying that it wants to communicate with the administrator from its own location (x, y). 3 From here on, the protocol follows the steps of the first protocol.

Security Properties The intruder can listen to the environment and understand all unencrypted messages. The intruder cannot get the position of the location (x, y) of interest. The intruder cannot get any information about the value of the secret key. No information in the field or on the authenticated classical channel reveals anything about the value of the secret key. The intruder cannot decrypt the communication messages between the administrator and the node. These messages would reveal the nature and parameters of the event. Further, it is only the (x, y) sensor node that can encrypt and decrypt messages for the administrator. Thus, if the intruder corrupts a random node, that node won t yield any information about the (x, y) sensor.

Conclusion 1 Security of sensor networks can benefit from quantum cryptography. 2 Encryption / decryption can be done with (quantum generated) classical secret keys. 3 Secret key generation is based on entanglement and entanglement swapping. 4 Quantum generated secret keys are effectively unbreakable.

Open Problems 1 We have shown a scheme to protect the environment. The sensor nodes are considered trusted and this is a strong assumption. The problem of sensor node corruption has not yet been addressed using quantum cryptographic means. Our protocol, however, as it is, offers already some limited protection in node corruption attacks. Any node, except the node of interest (x, y) does not know the quantum generated key. Thus, corrupting a node and reading the information inside it, does not reveal any additional information to listening to the environment. 2 Specific quantum cryptographic methods apply to unusual settings. We believe that the applicability of quantum cryptography is much larger than presently exploited.