qucrypto

Upload: anil-pal

Post on 06-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 qucrypto

    1/28

    YOGESH KUMAR PALE.C

    0808331052

  • 8/2/2019 qucrypto

    2/28

    QuantumCryptography

    Quantuman indivisible elementary particle, usually a photon

    +Cryptography

    the practice and study of hiding information

    =Quantum Cryptographythe use of quantum mechanics to guarantee securecommunication.

    2

    What the...?

  • 8/2/2019 qucrypto

    3/28

    QuantumCryptography

    Quantum cryptography is the single

    most successful application ofQuantum Computing/InformationTheory.

    For the first time in history, we canuse the forces of nature toimplement perfectly securecryptosystems.

    Quantum cryptography has beentried experimentally: it works!

    3

  • 8/2/2019 qucrypto

    4/28

    QuantumCryptography

    Classical Cryptography relies heavily on thecomplexity of factoring integers.

    Quantum Computers can use Shors Algorithm toefficiently break todays cryptosystems.

    We need a new kind of cryptography!

    4

    State of the Art

  • 8/2/2019 qucrypto

    5/28

    QuantumCryptography

    5

    Todays Talk

    Basic Ideas inCryptography

    Ideas from theQuantum World

    Quantum KeyDistribution (QKD)

    BB84 withouteavesdropping

    BB84 witheavesdropping

    Working PrototypesResearch here at

    Warwick

    Conclusion

  • 8/2/2019 qucrypto

    6/28

    QuantumCryptography

    Basic Ideas in

    CryptographyCryptography: the coding and decoding

    of secret messages. [Merriam-Webster]Cryptography < + .The basic idea is to modify a message so as

    to make it unintelligible to anyone butthe intended recipient.

    For message (plaintext)M,

    e(M, K) encryption -ciphertextd[e(M, K), K]= M decryption

    6

  • 8/2/2019 qucrypto

    7/28

    QuantumCryptography

    Keys and Key

    DistributionKis called the key.

    The key is known only to sender

    and receiver: it is secret.Anyone who knows the key can

    decrypt the message.

    Key distribution is the problemof exchanging the key betweensender and receiver.

    7

  • 8/2/2019 qucrypto

    8/28

    QuantumCryptography

    Perfect Secrecy and the

    OTP

    There exist perfectcryptosystems.

    Example: One-Time Pad (OTP)

    The problem of distributingthe keys in the first placeremains.

    8

  • 8/2/2019 qucrypto

    9/28

    QuantumCryptography

    Enter QKD QKD: Quantum Key Distribution

    Using quantum effects, we can distribute

    keys in perfect secrecy!The Result: The Perfect Cryptosystem,

    QC = QKD + OTP

    9

  • 8/2/2019 qucrypto

    10/28

    QuantumCryptography

    Ideas from the

    Quantum WorldMeasurement Observing, or measuring, a quantum system will

    alter its state.

    Example: the Qubit

    When observed, the state of a qubit will collapse toeither a=0 or b=0.

    10

    0 1a b

  • 8/2/2019 qucrypto

    11/28

    QuantumCryptography

    PhotonsPhysical qubits

    Any subatomic

    particle can be usedto represent a qubit,e.g. an electron.

    A photon is aconvenient choice.

    A photon is anelectromagneticwave.

    11

  • 8/2/2019 qucrypto

    12/28

    QuantumCryptography

    A photon has a property called polarization, which

    is the plane in which the electric field oscillates.

    We can use photons of different polarizations to

    represent quantum states:

    12

    Polarization

    0 state 0

    90 state 1

  • 8/2/2019 qucrypto

    13/28

    QuantumCryptography

    A device called a polarizer allows us to place

    a photon in a particular polarization. A

    Pockels Cell can be used too.The polarization basis is the mapping we

    decide to use for a particular state.

    13

    Polarizers and Bases

    0 state 0

    90 state 1

    Rectilinear:

    45 state 0

    135 state 1

    Diagonal:

  • 8/2/2019 qucrypto

    14/28

    QuantumCryptography

    A calcite crystal can be used to recover the bits

    encoded into a stream of photons.

    14

    Measuring Photons

    CaCO3

    DIAGONAL axis

    1 0 1 0

  • 8/2/2019 qucrypto

    15/28

    QuantumCryptography

    What if the crystal has the wrong orientation?

    15

    Uncertainty Principle

    CaCO3

    RECTILINEAR axis

    ???50% chance of

    getting rightanswer.

  • 8/2/2019 qucrypto

    16/28

    QuantumCryptography

    We have to prevent Eve from eavesdroppingon communications between Alice and Bob.

    16

    Meet Alice and Bob

    Eve

    Alice Bob

    Alan J. Learner,Quantum

    Cryptographer

  • 8/2/2019 qucrypto

    17/28

    QuantumCryptography

    Quantum Key Distribution exploits the effects

    discussed in order to thwarteavesdropping.

    If an eavesdropper uses the wrong polarizationbasis to measure the channel, the result of themeasurement will be random.

    17

    Quantum Key

    Distribution

  • 8/2/2019 qucrypto

    18/28

    QuantumCryptography

    A protocol is a set of rules governing the exchange

    of messages over a channel.

    A security protocol is a special protocol designed to

    ensure security properties are met duringcommunications.

    There are three main security protocols for QKD:BB84, B92, and Entanglement-Based QKD.

    We will only discuss BB84 here.

    18

    QKD Protocols

  • 8/2/2019 qucrypto

    19/28

    QuantumCryptography

    BB84 was the first security protocol implementing

    Quantum Key Distribution.

    It uses the idea of photon polarization.

    The key consists of bits that will be transmitted asphotons.

    Each bit is encoded with a random polarizationbasis!

    19

    BB84

  • 8/2/2019 qucrypto

    20/28

    QuantumCryptography

    Alice is going to send Bob a key.

    She begins with a random sequence of bits.

    Bits are encoded with a random basis, andthen sent to Bob:

    20

    BB84 with no

    eavesdropping

    Bit 0 1 0 1 1

    Basis + +

    Photon

  • 8/2/2019 qucrypto

    21/28

    QuantumCryptography

    Bob receives the photons and must decode them

    using a random basis.

    Some of his measurementsare correct.

    21

    BB84 with no

    eavesdropping (2)

    Photon

    Basis? + + +

    Bit? 0 0 0 1 1

  • 8/2/2019 qucrypto

    22/28

    QuantumCryptography

    Alice and Bob talk on the telephone:

    Alice chooses a subset of the bits (the test bits) andreveals which basis she used to encode them to Bob.

    Bob tells Alice which basis he used to decode thesame bits.

    Where the same basis was used, Alice tells Bob whatbits he ought to have got.

    22

    BB84 with no

    eavesdropping (3)

  • 8/2/2019 qucrypto

    23/28

    QuantumCryptography

    23

    Comparing

    measurementsAlices Bit 0 1 0 1 1

    Alices

    Basis + +

    Photon

    Bobs

    Basis + + +

    Bobs Bit 0 0 0 1 1

    Test bitsThe test bits allowAlice and Bob totest whether thechannel is secure.

  • 8/2/2019 qucrypto

    24/28

    QuantumCryptography

    As long as no errors and/or eavesdropping haveoccurred, the test bits should agree.

    Alice and Bob have now made sure that the channelis secure. The test bits are removed.

    Alice tells Bob the basis she used for the other bits,and they both have a common set of bits: the final

    key!

    24

    The Trick

  • 8/2/2019 qucrypto

    25/28

    QuantumCryptography

    25

    Getting the Final Key

    Alices Bit 0 1 0 1 1Alices

    Basis + +

    Photon

    Bobs

    Basis + + +

    Bobs Bit 0 0 0 1 1

    Test bitsdiscarded

    Final Key = 01

  • 8/2/2019 qucrypto

    26/28

    QuantumCryptography

    If an eavesdropper Eve tries to tap the channel, thiswill automatically show up in Bobs measurements.

    In those cases where Alice and Bob have used thesame basis, Bob is likely to obtain an incorrectmeasurement: Eves measurements are bound toaffect the states of the photons.

    26

    In the presence of eavesdropping

    Q

  • 8/2/2019 qucrypto

    27/28

    QuantumCryptography

    Quantum cryptography is a major achievement insecurity engineering.

    As it gets implemented, it will allow perfectly securebank transactions, secret discussions forgovernment officials, and well-guarded trade secretsfor industry!

    28

    Conclusion

    Q t

  • 8/2/2019 qucrypto

    28/28

    QuantumCryptography

    29