quantum cryptography

40
A PRESENTATION ON QUANTUM CRYPTOGRAPHY

Upload: bise-mond

Post on 26-Jan-2015

3.140 views

Category:

Education


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Quantum  Cryptography

A PRESENTATION ON QUANTUM

CRYPTOGRAPHY

Page 2: Quantum  Cryptography

SOUGATO GHOSH ECE 22

Page 3: Quantum  Cryptography

Cryptography (derived from the Greek words kryptos and graphein meaning hidden writing) is

the science of codes and ciphers.

.

What is cryptography?

Page 4: Quantum  Cryptography

A cipher is essentially a cryptographic algorithm which is used to convert a

message, known as the plaintext, into unreadable

text. Then the message can then be safely

transmitted without fear of letting sensitive information fall into the hands of the enemy.

What is cipher?

Page 5: Quantum  Cryptography

Sender

The process

Plaintext

Cryptotext

Decryption

PlaintextRecipient

Message encryption

Key

Key ready for use

Secure key distribution

Encryption

Securetransmission

Hard Problem for conventionalencryption

Page 6: Quantum  Cryptography

The classic cryptographyEncryption algorithm and related key

are kept secret.Breaking the system is hard due to

large numbers of possible keys.For example: for a key 128 bits long there are 38128 102

keys to check using brute force.

The fundamental difficulty is key distribution to parties who want to exchange messages.

Page 7: Quantum  Cryptography

In 1970s the Public Key Cryptography emerged.

Each user has two mutually inverse keys,The encryption key is published;The decryption key is kept secret.Anybody can send a message to x but only x can read it.

PKC :the modern cryptography

Page 8: Quantum  Cryptography

RSA

The most widely used PKC is the RSA algorithm based on the difficulty of

factoring a product ot two large primes.

Easy Problem Hard Problem

qpn

Given two large primes p and q compute

Given n compute p and q.

Page 9: Quantum  Cryptography

Light waves are propagated as discrete quanta called photons.

They are massless and have energy, momentum and angular momentum called spin.

Spin carries the polarization.If on its way we put a polarization

filter a photon may pass through it or may

not.We can use a detector to check of a

photon has passed through a filter.

Elements of the Quantum Theory

Page 10: Quantum  Cryptography

IntroductionSpawned during the last centuryDescribes properties and interaction between

matter at small distance scalesQuantum state determined by(among others)

PositionsVelocitiesPolarizationsSpins

qubits

Page 11: Quantum  Cryptography

Each photon carries one qubit of information

Polarization can be used to represent a 0 or 1.

In quantum computation this is called

qubit.

Binary information

Page 12: Quantum  Cryptography

NotationBra/Ket notation (pronounced “bracket”)From Dirac 1958Each state represented by a vector denoted

by a arrow pointing in the direction of the polarization

Page 13: Quantum  Cryptography

NotationSimplified Bra/Ket-notation in this

presentationRepresentation of polarized photons:

horizontally: vertically: diagonally: and

Page 14: Quantum  Cryptography

Polarized photonsMeasurement of a state not only measures but

actually transforms that state to one of the basis vectors and

If we chose the basis vectors and when measuring the state of the photon, the result will tell us that the photon's polarization is either or , nothing in between.

ψb

a

Page 15: Quantum  Cryptography

ExperimentClassical experimentEquipment:

laser pointer three polarization filters

The beam of light i pointed toward a screen.The three filters are polarized at

, and respectively

Page 16: Quantum  Cryptography

ExperimentThe filter is put in front of the screenLight on outgoing side of filter is now 50% of

original intensity

Page 17: Quantum  Cryptography

ExperimentNext we insert a filter whereas no light

continue on the output side

Page 18: Quantum  Cryptography

ExperimentHere is the puzzling part…We insert a filter in betweenThis increases the number of photons passing

through

Page 19: Quantum  Cryptography

Experiment explainedFilter is hit by photons in random states. It

will measure half of the photons polarized as

Page 20: Quantum  Cryptography

Experiment explainedFilter is perpendicular to that and will

measure the photons with respect to , which none of the incoming photons match

Page 21: Quantum  Cryptography

Experiment explainedFilter measures the state with respect to

the basis {, }

Page 22: Quantum  Cryptography

Experiment explainedPhotons reaching filter will be measured as

with 50% chance. These photons will be measured by filter as with 50% probability and thereby 12,5% of the original light pass through all three filters.

Page 23: Quantum  Cryptography

Key distributionAlice and Bob first agree on two

representations for ones and zeroes One for each basis used, {,}

and {, }. This agreement can be done in publicDefine

1 = 0 = 1 = 0 =

Page 24: Quantum  Cryptography

Key distribution - BB841. Alice sends a sequence of photons to Bob.

Each photon in a state with polarization corresponding to 1 or 0, but with randomly chosen basis.

2. Bob measures the state of the photons he receives, with each state measured with respect to randomly chosen basis.

3. Alice and Bob communicates via an open channel. For each photon, they reveal which basis was used for encoding and decoding respectively. All photons which has been encoded and decoded with the same basis are kept, while all those where the basis don't agree are discarded.

Page 25: Quantum  Cryptography

EavesdroppingEve has to randomly select basis for her

measurementHer basis will be wrong in 50% of the time.Whatever basis Eve chose she will measure 1 or 0When Eve picks the wrong basis, there is 50%

chance that she'll measure the right value of the bit

E.g. Alice sends a photon with state corresponding to 1 in the {,} basis. Eve picks the {, } basis for her measurement which this time happens to give a 1 as result, which is correct.

Page 26: Quantum  Cryptography

EavesdroppingAlice’sbasis

Alice’sbit

Alice’sphoton

Eve’sbasis

Correct Eve’sphoton

Eve’sbit

Correct

{,}

1 {,} Yes 1 Yes

{, } No 1 Yes

0 No

0 {,} Yes 0 Yes

{, } No 1 No

0 Yes

{, }

1 {,} No 1 Yes

0 No

{, } Yes 1 Yes

0 {,} No 1 No

0 Yes

{, } yes 0 Yes

Page 27: Quantum  Cryptography

Eves problemEve has to re-send all the photons to Bob Will introduce an error, since Eve don't know

the correct basis used by Alice Bob will detect an increased error rateStill possible for Eve to eavesdrop just a few

photons, and hope that this will not increase the error to an alarming rate. If so, Eve would have at least partial knowledge of the key.

Page 28: Quantum  Cryptography

Detecting eavesdroppingWhen Alice and Bob need to test for

eavesdroppingBy randomly selecting a number of bits from

the key and compute its error rateError rate < Emax assume no eavesdropping

Error rate > Emax assume eavesdropping(or the channel is unexpectedly noisy)Alice and Bob should then discard the whole key and start over

Page 29: Quantum  Cryptography

NoiseNoise might introduce errorsA detector might detect a photon even

though there are no photonsSolution:

send the photons according to a time schedule.then Bob knows when to expect a photon, and

can discard those that doesn't fit into the scheme's time window.

There also has to be some kind of error correction in the over all process.

Page 30: Quantum  Cryptography

Error correctionSuggested by Hoi-Kwong Lo. (Shortened version)1.Alice and Bob agree on a random permutation of

the bits in the key2.They split the key into blocks of length k3.Compare the parity of each block. If they

compute the same parity, the block is considered correct. If their parity is different, they look for the erroneous bit, using a binary search in the block. Alice and Bob discard the last bit of each block whose parity has been announced

4.This is repeated with different permutations and block size, until Alice and Bob fail to find any disagreement in many subsequent comparisons

Page 31: Quantum  Cryptography

Privacy amplificationEve might have partial knowledge of the

key. Transform the key into a shorter but

secure keySuppose there are n bits in the key and

Eve has knowledge of m bits. Randomly chose a hash function where

h(x): {0,1\}n {0,1\} n-m-s

Reduces Eve's knowledge of the key to 2 –

s / ln2 bits

Page 32: Quantum  Cryptography
Page 33: Quantum  Cryptography
Page 34: Quantum  Cryptography

A user can suggest a key by sending a stream of randomly polarized photons.

This sequence can be converted to a binary key.

If the key was intercepted it could be discarded and a new stream of randomly polarized photons sent.

Binary information

Page 35: Quantum  Cryptography

It solved the key distribution problem.Unconditionally secure key distribution

method proposed by: Charles Bennett and Gilles Brassard in 1984.

.The method is called BB84.Once key is securely received it can be

used to encrypt messages transmitted by conventional channels.

The Main contribution of Quantum Cryptography.

Page 36: Quantum  Cryptography

Quantum cryptography obtains its fundamental security from the fact that each qubit is carried by a single photon, and each photon will be altered as soon as it is read.

This makes impossible to intercept message without being detected.

Security of quantum key distribution

Page 37: Quantum  Cryptography

Experimental implementations have existed since 1990.

Current (2004) QC is performed over distances of 30-40 kilometers using

optical fiber. In general we need two capabilities.(1) Single photon gun.(2) Being able to measure single photons.

State of the Quantum Cryptography technology.

Page 38: Quantum  Cryptography

id Quantique, Geneva SwitzerlandOptical fiber based systemTens of kilometers distancesMagiQ Technologies, NY CityOptical fiber-glassUp to 100 kilometers distancesNEC Tokyo 150 kilometersQinetiQ Farnborough, EnglandThrough the air 10 kilometers.Supplied system to BBN in Cambridge

Mass.

Commercial QC providers

Page 39: Quantum  Cryptography

References

[WIK2] Wikipedia -The free encyclopediahttp://www.wikipedia.org/wiki/Interpretation_of_quantum_mechanics

[WIK3] Wikipedia -The free encyclopediahttp://www.wikipedia.org/wiki/Copenhagen_interpretation

[GIT] Georgia Institute of Technology,The fundamental postulates of quantum mechanicshttp://www.physics.gatech.edu/academics/Classes/spring2002/6107/Resources/The fundamental postulates of quantum mechanics.pdf

[HP] Hoi-Kwong Lo, Networked Systems Department,Hewlett Packard, Bristol, December 1997, Quantum Cryptology

[SS99] Simon Singh, Code Book, p349-382,Anchor Books, 1999

[FoF] Forskning och Framsteg,No. 3, April 2003

Page 40: Quantum  Cryptography

THANKS…………………..