qucrypto
TRANSCRIPT
-
8/2/2019 qucrypto
1/28
YOGESH KUMAR PALE.C
0808331052
-
8/2/2019 qucrypto
2/28
QuantumCryptography
Quantuman indivisible elementary particle, usually a photon
+Cryptography
the practice and study of hiding information
=Quantum Cryptographythe use of quantum mechanics to guarantee securecommunication.
2
What the...?
-
8/2/2019 qucrypto
3/28
QuantumCryptography
Quantum cryptography is the single
most successful application ofQuantum Computing/InformationTheory.
For the first time in history, we canuse the forces of nature toimplement perfectly securecryptosystems.
Quantum cryptography has beentried experimentally: it works!
3
-
8/2/2019 qucrypto
4/28
QuantumCryptography
Classical Cryptography relies heavily on thecomplexity of factoring integers.
Quantum Computers can use Shors Algorithm toefficiently break todays cryptosystems.
We need a new kind of cryptography!
4
State of the Art
-
8/2/2019 qucrypto
5/28
QuantumCryptography
5
Todays Talk
Basic Ideas inCryptography
Ideas from theQuantum World
Quantum KeyDistribution (QKD)
BB84 withouteavesdropping
BB84 witheavesdropping
Working PrototypesResearch here at
Warwick
Conclusion
-
8/2/2019 qucrypto
6/28
QuantumCryptography
Basic Ideas in
CryptographyCryptography: the coding and decoding
of secret messages. [Merriam-Webster]Cryptography < + .The basic idea is to modify a message so as
to make it unintelligible to anyone butthe intended recipient.
For message (plaintext)M,
e(M, K) encryption -ciphertextd[e(M, K), K]= M decryption
6
-
8/2/2019 qucrypto
7/28
QuantumCryptography
Keys and Key
DistributionKis called the key.
The key is known only to sender
and receiver: it is secret.Anyone who knows the key can
decrypt the message.
Key distribution is the problemof exchanging the key betweensender and receiver.
7
-
8/2/2019 qucrypto
8/28
QuantumCryptography
Perfect Secrecy and the
OTP
There exist perfectcryptosystems.
Example: One-Time Pad (OTP)
The problem of distributingthe keys in the first placeremains.
8
-
8/2/2019 qucrypto
9/28
QuantumCryptography
Enter QKD QKD: Quantum Key Distribution
Using quantum effects, we can distribute
keys in perfect secrecy!The Result: The Perfect Cryptosystem,
QC = QKD + OTP
9
-
8/2/2019 qucrypto
10/28
QuantumCryptography
Ideas from the
Quantum WorldMeasurement Observing, or measuring, a quantum system will
alter its state.
Example: the Qubit
When observed, the state of a qubit will collapse toeither a=0 or b=0.
10
0 1a b
-
8/2/2019 qucrypto
11/28
QuantumCryptography
PhotonsPhysical qubits
Any subatomic
particle can be usedto represent a qubit,e.g. an electron.
A photon is aconvenient choice.
A photon is anelectromagneticwave.
11
-
8/2/2019 qucrypto
12/28
QuantumCryptography
A photon has a property called polarization, which
is the plane in which the electric field oscillates.
We can use photons of different polarizations to
represent quantum states:
12
Polarization
0 state 0
90 state 1
-
8/2/2019 qucrypto
13/28
QuantumCryptography
A device called a polarizer allows us to place
a photon in a particular polarization. A
Pockels Cell can be used too.The polarization basis is the mapping we
decide to use for a particular state.
13
Polarizers and Bases
0 state 0
90 state 1
Rectilinear:
45 state 0
135 state 1
Diagonal:
-
8/2/2019 qucrypto
14/28
QuantumCryptography
A calcite crystal can be used to recover the bits
encoded into a stream of photons.
14
Measuring Photons
CaCO3
DIAGONAL axis
1 0 1 0
-
8/2/2019 qucrypto
15/28
QuantumCryptography
What if the crystal has the wrong orientation?
15
Uncertainty Principle
CaCO3
RECTILINEAR axis
???50% chance of
getting rightanswer.
-
8/2/2019 qucrypto
16/28
QuantumCryptography
We have to prevent Eve from eavesdroppingon communications between Alice and Bob.
16
Meet Alice and Bob
Eve
Alice Bob
Alan J. Learner,Quantum
Cryptographer
-
8/2/2019 qucrypto
17/28
QuantumCryptography
Quantum Key Distribution exploits the effects
discussed in order to thwarteavesdropping.
If an eavesdropper uses the wrong polarizationbasis to measure the channel, the result of themeasurement will be random.
17
Quantum Key
Distribution
-
8/2/2019 qucrypto
18/28
QuantumCryptography
A protocol is a set of rules governing the exchange
of messages over a channel.
A security protocol is a special protocol designed to
ensure security properties are met duringcommunications.
There are three main security protocols for QKD:BB84, B92, and Entanglement-Based QKD.
We will only discuss BB84 here.
18
QKD Protocols
-
8/2/2019 qucrypto
19/28
QuantumCryptography
BB84 was the first security protocol implementing
Quantum Key Distribution.
It uses the idea of photon polarization.
The key consists of bits that will be transmitted asphotons.
Each bit is encoded with a random polarizationbasis!
19
BB84
-
8/2/2019 qucrypto
20/28
QuantumCryptography
Alice is going to send Bob a key.
She begins with a random sequence of bits.
Bits are encoded with a random basis, andthen sent to Bob:
20
BB84 with no
eavesdropping
Bit 0 1 0 1 1
Basis + +
Photon
-
8/2/2019 qucrypto
21/28
QuantumCryptography
Bob receives the photons and must decode them
using a random basis.
Some of his measurementsare correct.
21
BB84 with no
eavesdropping (2)
Photon
Basis? + + +
Bit? 0 0 0 1 1
-
8/2/2019 qucrypto
22/28
QuantumCryptography
Alice and Bob talk on the telephone:
Alice chooses a subset of the bits (the test bits) andreveals which basis she used to encode them to Bob.
Bob tells Alice which basis he used to decode thesame bits.
Where the same basis was used, Alice tells Bob whatbits he ought to have got.
22
BB84 with no
eavesdropping (3)
-
8/2/2019 qucrypto
23/28
QuantumCryptography
23
Comparing
measurementsAlices Bit 0 1 0 1 1
Alices
Basis + +
Photon
Bobs
Basis + + +
Bobs Bit 0 0 0 1 1
Test bitsThe test bits allowAlice and Bob totest whether thechannel is secure.
-
8/2/2019 qucrypto
24/28
QuantumCryptography
As long as no errors and/or eavesdropping haveoccurred, the test bits should agree.
Alice and Bob have now made sure that the channelis secure. The test bits are removed.
Alice tells Bob the basis she used for the other bits,and they both have a common set of bits: the final
key!
24
The Trick
-
8/2/2019 qucrypto
25/28
QuantumCryptography
25
Getting the Final Key
Alices Bit 0 1 0 1 1Alices
Basis + +
Photon
Bobs
Basis + + +
Bobs Bit 0 0 0 1 1
Test bitsdiscarded
Final Key = 01
-
8/2/2019 qucrypto
26/28
QuantumCryptography
If an eavesdropper Eve tries to tap the channel, thiswill automatically show up in Bobs measurements.
In those cases where Alice and Bob have used thesame basis, Bob is likely to obtain an incorrectmeasurement: Eves measurements are bound toaffect the states of the photons.
26
In the presence of eavesdropping
Q
-
8/2/2019 qucrypto
27/28
QuantumCryptography
Quantum cryptography is a major achievement insecurity engineering.
As it gets implemented, it will allow perfectly securebank transactions, secret discussions forgovernment officials, and well-guarded trade secretsfor industry!
28
Conclusion
Q t
-
8/2/2019 qucrypto
28/28
QuantumCryptography
29