Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

Similar documents
+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Communication

A central problem in cryptography: the key distribution problem.

Quantum Key Distribution. The Starting Point

Ping Pong Protocol & Auto-compensation

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Quantum threat...and quantum solutions

and their applications Andrea Fiore Photonics and Semiconductor Nanophysics Department t of Applied Physics

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

C. QUANTUM INFORMATION 111

Quantum Cryptography. Marshall Roth March 9, 2007

Practical Quantum Key Distribution

10 - February, 2010 Jordan Myronuk

Quantum Cryptography

Quantum Communication. Serge Massar Université Libre de Bruxelles

C. QUANTUM INFORMATION 99

Accommodation of a quantum communication transceiver in an optical terminal

Applications of Quantum Key Distribution (QKD)

Realization of B92 QKD protocol using id3100 Clavis 2 system

QuReP. Quantum Repeaters for Long Distance Fibre-Based Quantum Communication. Rob Thew. Coordinator: Nicolas Gisin

Optical Quantum Communication with Quantitative Advantage. Quantum Communication

Device-Independent Quantum Information Processing

Integrated optical circuits for classical and quantum light. Part 2: Integrated quantum optics. Alexander Szameit

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Labs 3-4: Single-photon Source

An entangled LED driven quantum relay over 1km

LECTURE NOTES ON Quantum Cryptography

Problem Set: TT Quantum Information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Quantum Cryptography and Security of Information Systems

Ground-Satellite QKD Through Free Space. Steven Taylor

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Nano and Biological Technology Panel: Quantum Information Science

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

Device-Independent Quantum Information Processing (DIQIP)

Entanglement and Quantum Teleportation

Introduction to Quantum Computing

Security and implementation of differential phase shift quantum key distribution systems

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Practical aspects of QKD security

QUANTUM TECHNOLOGIES: THE SECOND QUANTUM REVOLUTION* Jonathan P. Dowling

Cyber Security in the Quantum Era

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres

Universal Blind Quantum Computing

Experimental realization of quantum cryptography communication in free space

Introduction to Quantum Key Distribution

Cryptography in a quantum world

Quantum Technologies: Threats & Solutions to Cybersecurity

Entanglement and Quantum Key Distribution at ESA

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

Quantum Wireless Sensor Networks

Communications Quantiques

IBM quantum experience: Experimental implementations, scope, and limitations

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

Entanglement and information

Quantum Teleportation Pt. 1

arxiv:quant-ph/ v1 21 Apr 2004

State Decoding in Multi-Stage Cryptography Protocols

Semiconductors: Applications in spintronics and quantum computation. Tatiana G. Rappoport Advanced Summer School Cinvestav 2005

Quantum non-demolition measurements:

Introduction to Quantum Cryptography

Security of Quantum Key Distribution with Imperfect Devices

Practical quantum-key. key- distribution post-processing

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

CS120, Quantum Cryptography, Fall 2016

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

Quantum Key Distribution and the Future of Encryption

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Quantum Gates, Circuits & Teleportation

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

CMSC 33001: Novel Computing Architectures and Technologies. Lecture 06: Trapped Ion Quantum Computing. October 8, 2018

Secrets of Quantum Information Science

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin

PROGRESS IN OPTICS VOLUME 4 9. E. Wolf

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Talk at 4th ETSI/IQC workshop on quantum-safe cryptography, September 19-21, 2016

arxiv:quant-ph/ v1 6 Dec 2005

TOYOSHIMA Morio, TAKENAKA Hideki, SHOJI Yozo, TAKAYAMA Yoshihisa, KOYAMA Yoshisada, and KUNIMORI Hiroo

Quantum Computing: it s the end of the world as we know it? Giesecke+Devrient Munich, June 2018

Quantum Information Processing

Mobile Free Space Quantum Key Distribution for short distance secure communication

Quantum Cryptography

Linear-optical quantum information processing: A few experiments

Research, Development and Simulation of Quantum Cryptographic Protocols

Differential Phase Shift Quantum Key Distribution and Beyond

Quantum applications and spin off discoveries in rare earth crystals

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Trojan-horse attacks on quantum-key-distribution systems

Francesco Vedovato Admission to III year 22 September 2017

Quantum Dense Coding and Quantum Teleportation

Advanced Cryptography Quantum Algorithms Christophe Petit

DATA ENCRYPTION DEVICE USING RADIOACTIVE DECAY AND A HYBRID QUANTUM ENCRYPTION ALGORITM

Transcription:

The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk

Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer key generation Spin-off. The prospect of a factoring machine

Off the shelf systems 40K 40K idquantique (www.idquantique.com www.idquantique.com) system: 100km link guaranteed 1000 secure keybits per second Plug and play Other commercial systems from: Smartquantum: www.smartquantum.com MagiQ: www.magiqtech.com Development systems: Toshiba, NTT AS YET ALL SYSTEMS REQUIRE DARK FIBRE for QUANTUM LINK

Certification Common Criteria CC EAL4 Incorporating AES encryptor systems Certification to CC EAL4 XOR quantum key with public key distributed private keys

Quantum cryptography metro networks: Boston, Vienna, Geneva www.secoqc.net

Long Range Key exchange: now to 250km using Coherent one-way protocol (COW) using Corning ultra-low loss fibres

The quantum repeater Entangled pair generator Entangled pair generator Correlation With Bob photons Repeater = Bell measurement= Compares photons Correlation with Alice photons Throughput is always limited by attenuation of entire channel Requires a quantum memory

Entanglement based quantum communication over 144km. R. Ursin, et al quant-ph/0607182, Nature Physics 3 481, 2007 144km key exchange

ESA OGS 1 metre telescope (Bob)

ISS to ground QKD A quantum terminal onboard the ISS is capable of transmission of faint laser pulses to 1 ground station transmission of faint laser pulses to 1 ground station transmission of single photons to ground stations (to one at a time) distribution of entangled photon pair to 2 separate ground stations reception of single photons (uplink) Possible Scenarios Single link to ground Maximum distance Spacecraft- OGS:1800km Double link to ground Maximum distance OGS-OGS: OGS: 1400 km Link availability statistics will be presented by Mr. Baister in the next talk 10

Quantum non-locality from space, global key exchange

Short range low cost systems for consumer applications

The PROBLEM Most rapidly growing fraud is card not present fraud How do we protect our on-line transactions The SOLUTION: Bringing quantum secured key exchange to the consumer Could use one-time-pad to protect the PIN Generate one-time-pad using quantum secured key exchange Key exchange at ATM allows user to top-up a personal one-time-pad. Protects against skimming

Pictures of the present handheld system < 3000 < 10 Key exchange at ATM allows user to top-up a personal one-time-pad. Protects against skimming One time pad encoding of PIN protects online transactions

Alice unit drive electronics and optics LED s Beam combiner Polariser Pinholes Pulse shortening circuit and diode driver Alice Optics

Future FPGA/DSP Alice unit (2 yrs) ASIC single chip $1-10 100MHz pulse rates to give ~1Mbit keys in 100ms Millimetre cubed Alice optics unit, (?waveguides, credit card?) Miniature low cost Random number generator (RNG) Fully tested low cost time tagging instrument Rapid alignment without cradle?

Why is it unique: Weekly top-up a personal one-timepad into a personal phone/card. Protects against skimming Type your PIN into YOUR device Absolute security for PIN online Eventually low cost, free to all customers The competition At home: present readers provide simplistic security based on toy codes. In shops: data between the card and reader isn t encrypted during a transaction and the PIN is sent in the clear! (See http://www.cl.cam.ac.uk/~sd410/)

Spin-off technologies near market instrument flexible photon counting instruments based on FPGA technology True random number generators Photon counting detectors

Far Futures: the threat of quantum computing Quantum technologies could revolutionise computing, sensing and communications in the 21 st century: Exponential speed up of computing using single quanta atoms, electrons, ions, photons as Qubits. Spintronics with individual spins. Ultrasensitive magnetometry: sensing of single spins in surfaces through their effect on a single spin in an AFM tip. Sub-wavelength scale measurement and lithography.

An integrated CNOT gate realised in Silica on Silicon Politi et al: Science 320, 647, 2008. Shor s Factoring Algorithm on a Photonic Chip: Politi et al et al Science 325, 1221 (Sept 2009) Established fabrication technology for classical communication systems at 1.55 um wavelength

Future proof systems Where will QC be used: Medical records Government secrets Any data that needs to remain secret for some time Cost competitive systems Consumer systems Simplified schemes Back up in case of development of polynomial factoring Quantum computer Classical algorithm

Thankyou: now lets discuss

Bob detector unit

Alice unit schematic

FPGA based time tag unit

Overview of system

Transfer matrices between Alice and Bob

Error rate and secret bit rate as a function of background light