cryptopresentationfinal

39
Quantum Cryptography Harsh Dawar Sumit Kadyan

Upload: skadyan1

Post on 18-Feb-2017

833 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Cryptopresentationfinal

Quantum Cryptography

Harsh DawarSumit Kadyan

Page 2: Cryptopresentationfinal

• Introduction• Quantum cryptography is the one of the most successful application of Quantum Computing/Information Theory.

• For the first time in history, we can use the forces of nature to implement perfectly secure cryptosystems.

• Quantum cryptography has been proved to work practically.

Page 3: Cryptopresentationfinal

•State of the art•Classical Cryptography(RSA) relies heavily on the complexity of factoring integers.

• Future Quantum Computers can use Shor’s Algorithm to efficiently break today’s cryptosystems.•Quantum computers can solve factoring problems in polynomial time.

What happens when that day arrives?

Page 4: Cryptopresentationfinal

•Today’s Talk

•Basic Ideas in Cryptography• Ideas from the Quantum World•Quantum Key Distribution (QKD)•BB84 without eavesdropping

•BB84 with eavesdropping•Working Prototypes•Practical Implementation of QC•Conclusion

Page 5: Cryptopresentationfinal

•Basic Ideas of Cryptography• Cryptography: “the coding and decoding of secret messages.”• The basic idea is to modify a message so as to make it unintelligible to anyone but the intended recipient.• For message (plaintext) M, e(M, K) encryption - ciphertextd[e(M, K), K] = M decryption

Page 6: Cryptopresentationfinal

•Keys and key distribution

K is called the key. The key is known only to

sender and receiver: it is secret.

Anyone who knows the key can decrypt the message.

Key distribution is the problem of exchanging the key between sender and receiver.

Page 7: Cryptopresentationfinal

•Perfect Secrecy and OTP

There exist perfect cryptosystems.

Example: One-Time Pad (OTP)

The problem of distributing the keys in the first place remains.

Key length has to be same as message length!!

Page 8: Cryptopresentationfinal

•Quantum Key Distribution

Using the laws of quantum mechanics, we can distribute keys in perfect secrecy!!

The Result: The Perfect Cryptosystem,QC = QKD + OTP

Page 9: Cryptopresentationfinal

•Quantum Physics Basics

Physical Qubits Any subatomic

particle can be used to represent a qubit, e.g. an electron.

A photon is a convenient choice.

A photon is an electromagnetic wave.

Page 10: Cryptopresentationfinal

•Polarization

•A photon has a property called polarization, which is the plane in which the electric field oscillates.•We can use photons of different polarizations to represent quantum states:

0 state 090 state 1

Page 11: Cryptopresentationfinal

• Ideas from Quantum World

Measurement

Observing, or measuring, a quantum system will alter its state.

Example: the Qubit

When observed, the state of a qubit will collapse to unpredictable random state 1 or 0.

Page 12: Cryptopresentationfinal

•Polarizers & Basics

• A device called a polarizer allows us to place a photon in a particular polarization• The polarization basis is frame of reference for quantum measurement.

Page 13: Cryptopresentationfinal

•Measuring Photons

•A calcite crystal can be used to recover the bits encoded into a stream of photons.

13

CaCO3 Diagonal axis (X)

1 0 1 0

Page 14: Cryptopresentationfinal

•Uncertainty Principle

•What if the crystal has the wrong orientation?

14

CaCO3 RECTILINEAR axis(+)

???50% chance

of getting right answer.Either | or ---

Page 15: Cryptopresentationfinal

•No Cloning theorem• It is impossible to make a device that perfectly copies an unknown qubit.

• Suppose there is a quantum process that implements: |q,_> ->|q,q>

Page 16: Cryptopresentationfinal

•Quantum Key Distribution

•Quantum Key Distribution exploits the effects discussed in order to thwart eavesdropping.

• If an eavesdropper uses the wrong polarization basis to measure the channel, the result of the measurement will be random.

Page 17: Cryptopresentationfinal

•QKD Protocols

•A protocol is a set of rules governing the exchange of messages over a channel.•There are three main security protocols for QKD: BB84, B92, and Entanglement-Based QKD.• Lets discuss the BB84 in detail.

Page 18: Cryptopresentationfinal

•BB84

•BB84 was the first security protocol implementing Quantum Key Distribution.• It uses the idea of photon polarization.•The key consists of bits that will be transmitted as photons.•Each bit is encoded with a random polarization basis!

Page 19: Cryptopresentationfinal

•BB84 With no Eavesdropping

•Alice is going to send Bob a key.•She begins with a random sequence of bits. •Bits are encoded with a random basis, and then sent to Bob:

Bit 0 1 0 1 1Basis + × × + ×Photo

n

Page 20: Cryptopresentationfinal

•BB84 With no Eavesdropping

• Bob receives the photons and must decode them using a random basis.

• Some of his measurements are correct.

Photon

Basis? + + × + ×Bit? 0 0 0 1 1

Page 21: Cryptopresentationfinal

•BB84 With no eavesdropper

•Alice and Bob talk on the public encrypted channel:• Alice chooses a subset of the bits (the test bits) and reveals which basis she used to encode them to Bob.• Bob tells Alice which basis he used to decode the same bits.

Page 22: Cryptopresentationfinal

•Comparing measurements

Alice’s Bit 0 1 0 1 1Alice’s Basis + × × + ×

PhotonBob’s Basis + + × + ×Bob’s

Bit 0 0 0 1 1The test bits allow Alice and Bob to test whether the channel is secure.

Page 23: Cryptopresentationfinal

•The Catch•As long as no errors and/or eavesdropping have occurred, the test bits should agree.

•Alice and Bob have now made sure that the channel is secure. The test bits are removed.

•Alice tells Bob the basis she used for the other bits, and they both have a common set of bits: the final key!

Page 24: Cryptopresentationfinal

•Deriving the final key

Alice’s Bit 0 1 0 1 1Alice’s Basis + × × + ×

PhotonBob’s Basis + + × + ×Bob’s

Bit 0 0 0 1 1

Final Key = 01

Test bits discarded

Page 25: Cryptopresentationfinal

• In the presence of eavesdropper

• If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bob’s measurements.

• In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect measurement: Eve’s measurements are bound to affect the states of the photons.

Page 26: Cryptopresentationfinal

Eavesdropper Effect

Page 27: Cryptopresentationfinal

• In the presence of Eavesdropper• As Eve intercepts Alice’s photons, she has to measure them with a random basis and send new photons to Bob.

• The photon states cannot be cloned (non-cloneability).

• Eve’s presence is always detected: measuring a quantum system irreparably alters its state.

Page 28: Cryptopresentationfinal

•QKD - Review

Page 29: Cryptopresentationfinal

•BB84 – Key Distillation Sifting –Unmatched Bases; “stray” or “lost” qubits

Error Correction – Noise & Eaves-dropping detected – Uses “cascade” protocol – Reveals information to Eve so need to track this.

Privacy Amplification – reduces Eve’s knowledge obtained by previous EC

Authentication – avoid man-in-middle attacks .Many protocols in development!!

Page 30: Cryptopresentationfinal

Researchers at Nokia and the University of Bristol in UK have come up with quantum cryptography in mobile phones.Goal: To perform "quantum key distribution" (QKD) using simple and potentially inexpensive "client" electronics that could be integrated within a single chip.

Page 31: Cryptopresentationfinal

•Making use of twisting and turning

•Makes use of the Reference independent frame QKD[RfiQKD]•Polarization or phase is measured in context with a reference frame•They select a specific threshold value and drop below this value signals there is an eavesdropper .

Page 32: Cryptopresentationfinal

•Advantages

• It will help protect the password that are transmitted using mobile phones• Nokia has patented the technology and looking forward to engineer into mobile devices.

Page 33: Cryptopresentationfinal

•Quantum City Project(Durban)• 4 Node network connected in a star configuration.

• Quantum Links as long as 26Kms

• Data Transmitted : data records, telephones, and internet traffic.

• 99.3% of the time the system functioned effectively and was stable.

Page 34: Cryptopresentationfinal

•Limitations of QC• Expensive :- Quantum Cryptography needs expensive dedicated equipment to be set up before keys can be exchanged. Approx. 25 Millions $ for 2000 Km network!!Survey of 500 prospective QC users show they prefer QC for banking/military purpose.

Page 35: Cryptopresentationfinal

•Limitations • Range :- The current Range of QC systems are a maximum of 250 kms. Lot of active research is being done to increase range!!

• Since one cant use repeaters or amplifiers Trusted nodes are needed to extend the Range.

Page 36: Cryptopresentationfinal

•Breaking Quantum Crypto• Break underlying cryptography??• Not possible!! Governed by law of physics• Attack the implementation• Hardware Attack

What if the laser generates more than one photon

Page 37: Cryptopresentationfinal

•Breaking Quantum Crypto•Measure the color of the spectrum and not the state of photon!!

Page 38: Cryptopresentationfinal

•Future of Quantum Cryptography

•QKD with satellites:-Research groups are actively working to demonstrate key exchange with satellites.

Page 39: Cryptopresentationfinal

•Thank you!!