quantum cryptography - inspiring innovationlomonaco/slides/qcryptohandout.pdf · quantum...

16
1 Quantum Quantum Crypto ?? Crypto ?? Cani Cani Quantum Cryptography Quantum Cryptography Samuel J. Lomonaco, Jr. Samuel J. Lomonaco, Jr. Dept. of Comp. Dept. of Comp. Sci Sci. & Electrical Engineering . & Electrical Engineering University of Maryland Baltimore County University of Maryland Baltimore County Baltimore, MD 21250 Baltimore, MD 21250 Email: Email: [email protected] [email protected] WebPage WebPage: : http:// http://www.csee.umbc.edu/~lomonaco www.csee.umbc.edu/~lomonaco How Alice Outwits Eve How Alice Outwits Eve or or L L - - O O - - O O - - P P The Defense Advance Research Projects Agency (DARPA) & Air Force Research Laboratory (AFRL), Air Force Materiel Command, USAF Agreement Number F30602-01-2-0522. The National Institute for Standards and Technology (NIST) The Mathematical Sciences Research Institute (MSRI). The L-O-O-P Fund. The Institute of Scientific Interchange L L - - O O - - O O - - P P This work is supported by: This work is supported by: Introducing Alice Introducing Alice & Bob & Bob Sender Sender Receiver Receiver Eavesdropper Eavesdropper Alice Alice Bob Bob Eve Eve Bah ! Bah ! Humbug ! Humbug ! Throb Throb ! ! Introducing Alice Introducing Alice & Bob & Bob Sender Sender Receiver Receiver Eavesdropper Eavesdropper Alice Alice Bob Bob Eve Eve Bah ! Bah ! Humbug ! Humbug ! Throb Throb ! ! Roberto Roberto Pia Pia Spia Spia Quantum cryptography provides a new Quantum cryptography provides a new mechanism enabling the parties mechanism enabling the parties communicating with one another to: communicating with one another to: Consequently, it provides a means of Consequently, it provides a means of determining when an encrypted determining when an encrypted communication has been compromised. communication has been compromised. Key Idea Key Idea Automatically detect eavesdropping Automatically detect eavesdropping.

Upload: others

Post on 23-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

1

QuantumQuantumCrypto ??Crypto ??

CaniCani

Quantum CryptographyQuantum Cryptography

Samuel J. Lomonaco, Jr.Samuel J. Lomonaco, Jr.Dept. of Comp. Dept. of Comp. SciSci. & Electrical Engineering. & Electrical Engineering

University of Maryland Baltimore CountyUniversity of Maryland Baltimore CountyBaltimore, MD 21250Baltimore, MD 21250

Email: Email: [email protected]@UMBC.EDUWebPageWebPage: : http://http://www.csee.umbc.edu/~lomonacowww.csee.umbc.edu/~lomonaco

How Alice Outwits Eve How Alice Outwits Eve oror

LL--OO--OO--PP

• The Defense Advance Research ProjectsAgency (DARPA) & Air Force Research

Laboratory (AFRL), Air Force Materiel Command,USAF Agreement Number F30602-01-2-0522.

• The National Institute for Standards and Technology (NIST)

• The Mathematical Sciences Research Institute (MSRI).

• The L-O-O-P Fund.

• The Institute of Scientific Interchange

LL--OO--OO--PP

This work is supported by:This work is supported by: Introducing AliceIntroducing Alice & Bob& Bob

SenderSender ReceiverReceiver

EavesdropperEavesdropper

AliceAlice BobBob

EveEveBah !Bah !

Humbug !Humbug !

Throb

Throb !!

Introducing AliceIntroducing Alice & Bob& Bob

SenderSender ReceiverReceiver

EavesdropperEavesdropper

AliceAlice BobBob

EveEveBah !Bah !

Humbug !Humbug !

Throb

Throb !! RobertoRoberto

PiaPia

SpiaSpia

Quantum cryptography provides a new Quantum cryptography provides a new mechanism enabling the parties mechanism enabling the parties communicating with one another to:communicating with one another to:

Consequently, it provides a means of Consequently, it provides a means of determining when an encrypted determining when an encrypted communication has been compromised.communication has been compromised.

Key IdeaKey Idea

Automatically detect eavesdroppingAutomatically detect eavesdropping..

Page 2: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

2

The DilemmaThe Dilemma

AliceAlice

How do I prevent How do I prevent Eve from Eve from

eavesdropping ???eavesdropping ???

How can I How can I outwit Eve outwit Eve

??????

? ? ? ? ? ?

? ? ? ?

? ?

Alice Takes a Cryptography CourseAlice Takes a Cryptography Course

AliceAlice

TheTheClassicalClassical

WorldWorld

ClassicalClassicalShannonShannon

BitBit

0 or 1

DecisiveIndividual

CopyingCopyingMachineMachine

InIn OutOut

ClassicalClassical BitsBits CanCan BeBe CopiedCopied

CryptographicCryptographicSystemsSystems

Page 3: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

3

A Classical Cryptographic Communication SystemA Classical Cryptographic Communication System

InsecureInsecureChannelChannel

P = PlaintextP = PlaintextC = C = CiphertextCiphertext

TransmitterTransmitterAliceAlice

ReceiverReceiverBobBob

EavesdropperEavesdropperEveEve

P = PlaintextP = Plaintext

SecureSecureChannelChannel

InfoInfoSourceSource EncrypterEncrypter DecrypterDecrypter InfoInfo

SinkSink

KeyKey

Catch 22Catch 22

There are perfectly good ways to There are perfectly good ways to communicate in secret communicate in secret providedprovidedwe can already communicate in we can already communicate in secret secret ……

Il cane Il cane cheche sisi mordemorde la codala coda

Classical Crypto SystemsClassical Crypto Systems

CHECK LISTCHECK LIST

•• Eavesdropping Detection ?Eavesdropping Detection ?

•• Authentication ?Authentication ?

•• Catch 22 Solved ?Catch 22 Solved ?

NONO

NONO

NONO

Types of Communication SecurityTypes of Communication Security

•• PracticalPractical SecrecSecrecyy (Circa 106 BC)(Circa 106 BC)

CiphertextCiphertext breakable after breakable after xx yearsyears

ExamplesExamples:: Data Encryption Standard (DES), Data Encryption Standard (DES), Advanced Data Encryption Standard (AES)Advanced Data Encryption Standard (AES)

•• PerfectPerfect SecuritySecurity (Shannon, 1949)(Shannon, 1949)

CiphertextCiphertext CC without key gives no without key gives no information about plaintext information about plaintext PP

( ) ( )Prob P|C Prob P=

An Example of Perfect SecurityAn Example of Perfect SecurityThe The VernamVernam CipherCipher, a.k.a., , a.k.a., the Onethe One--TimeTime--PadPad

Consider a random sequence of bits Consider a random sequence of bits

1 2 nKey K K K K= =

Encrypting algorithmEncrypting algorithm

mod 2i i iC P K= +0110 0101 11011010 1110 01001100 1011 1001

PKC

==

⊕ =

•• Perfectly secure if key Perfectly secure if key KK is unknownis unknown

•• Easy to decode with Easy to decode with Key = KKey = K

DifficultiesDifficulties

•• PROBLEM: Long random bit sequences PROBLEM: Long random bit sequences must be sent over a secure channelmust be sent over a secure channel

•• CATCH 22: There are perfectly good ways CATCH 22: There are perfectly good ways to communicate in secret provided we can to communicate in secret provided we can communicate in secret communicate in secret ……

•• KEY PROBLEM in CRYPTOGRAPHY: KEY PROBLEM in CRYPTOGRAPHY: We need some way to securely We need some way to securely communicate keycommunicate key

Page 4: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

4

Objective of All Crypto Systems: Objective of All Crypto Systems: SafetySafety

Old Idea:Old Idea:Unconditional SecurityUnconditional Security

The crypto system can resist any The crypto system can resist any cryptanaliticcryptanalitic attack no matter attack no matter how much computation is involved.how much computation is involved.

The crypto system is The crypto system is unbreakable unbreakable because of the computational cost of because of the computational cost of cryptanalysiscryptanalysis, but would succumb to , but would succumb to an attack with unlimited computation.an attack with unlimited computation.

New Idea:New Idea:ComputationalComputational SecuritySecurity

Objective of All Crypto Systems: Objective of All Crypto Systems: SafetySafety

Computational SecurityComputational Security

•• Requires Requires 10103030 years to be broken on the years to be broken on the fastest known computerfastest known computer

For example, the crypto system:For example, the crypto system:

•• Or, requires Or, requires 1010100100 bits of memory to breakbits of memory to break

•• Or, requires Or, requires 10103030 euros to breakeuros to break

System computationally safe implies safe for System computationally safe implies safe for all practical purposesall practical purposes

Idea comes from a field in computer science called Idea comes from a field in computer science called Computational ComplexityComputational Complexity..

Computational Security Computational Security ((DiffieDiffie--HellmanHellman, circa 1970), circa 1970)

Public PhonePublic PhoneDirectoryDirectory

TransmitterTransmitterAliceAlice

ReceiverReceiverBobBob

EavesdropperEavesdropperEveEve

CCEncrypterEncrypter

InfoInfoSourceSource

PP

DecrypterDecrypter

InfoInfoSinkSink

PP

Public Key Crypto SystemsPublic Key Crypto Systems …… Example: RSAExample: RSA

CC CCInsecureInsecureChannelChannel

EEBB

DDBB

Public Key Crypto SystemsPublic Key Crypto Systems

CHECK LISTCHECK LIST

••Eavesdropping Detection ?Eavesdropping Detection ?

••Authentication ?Authentication ?

•• Catch 22 Solved ?Catch 22 Solved ? Yes & NoYes & No

YesYes

NoNo

Alice Takes a Quantum Mechanics CourseAlice Takes a Quantum Mechanics Course

AliceAlice

Page 5: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

5

TheTheQuantumQuantum

WorldWorld

Introducing the Quantum BitIntroducing the Quantum Bit …… The The QubitQubit

Look HereLook Here

IndecisiveIndecisiveIndividualIndividual

Can be bothCan be both 00 & & 11at the same time !at the same time !

Quantum Representations of Quantum Representations of QubitsQubits

ExampleExample 11. . A spinA spin-- particleparticle12

Spin UpSpin Up Spin DownSpin Down

1 01 0

Quantum Representations of Quantum Representations of QubitsQubits

ExampleExample 22. . The polarization state of a photonThe polarization state of a photon

VerticalVerticalPolarizationPolarization

HorizontalHorizontalPolarizationPolarization

1 = 0 = ↔

H=Where does a Where does a QubitQubit live ?live ?

HomeDef. A Hilbert Space is a vector space over together with an inner product such that

HH H, :− − × →

The elements of will be called The elements of will be called ketskets, and , and will be denoted bywill be denoted by label

H

1) & 1 2 1 2, , ,u u v u v u v+ = + 1 2 1 2, , ,vu u v u vu+ = +2) , ,u v u vλ λ=3) , ,u v v u∗ =4) Cauchy seq in , ∀ 1 2, ,u u … H Hlim nn

u→∞

A A QubitQubit is a is a quantum quantum systemsystem whose whose statestate is is represented by a represented by a KetKetlying in a 2lying in a 2--D Hilbert D Hilbert SpaceSpaceH

Page 6: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

6

Superposition of StatesSuperposition of States

A typical Qubit is ???

Inde

cisive

0 10 1α α= +

where 2 20 1 1α α+ =

The above Qubit is in a SuperpositionSuperposition of statesand

It is simultaneously both and !!!0 1

10

““CollapseCollapse”” of the Wave Functionof the Wave Function

0 10 1α α+ =

Observer

Qubit

Whoosh !!!

i

Prob

= |a i|

2

MeasurementMeasurementConnectingConnecting

Quantum VillageQuantum Villageto theto the

Classical WorldClassical World

Another Activity in Quantum Village:Another Activity in Quantum Village:

MeasurementMeasurementMeasurementMeasurement

Group of Friendly PhysicistsGroup of Friendly Physicists

Another Activity in Quantum Village:Another Activity in Quantum Village:

MeasurementMeasurementMeasurementMeasurement

Group of Group of AngryAngry PhysicistsPhysicists

ObservablesObservables

What does our observer What does our observer actually observe ?actually observe ?

??????

Observables = Observables = HermitianHermitian OperatorsOperatorsO

H HA

O OTA A=

wherewhere

Page 7: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

7

, and let , and let denote the corresponding denote the corresponding eigenvalueseigenvaluesLet be the Let be the eigenketseigenkets of of

Observables (Cont.)Observables (Cont.)

What does our observer actually What does our observer actually observe ?observe ?

??????

iϕ OA

OA i i iaϕ ϕ=

ia, i.e., , i.e.,

CaveatCaveat:: We only consider observables whoseWe only consider observables whoseeigenketseigenkets form an orthonormal basis of form an orthonormal basis of H

Observables (Cont.)Observables (Cont.)

What does our observer observe ?What does our observer observe ?

??????

So with probability , the observer So with probability , the observer observes the observes the eigenvalueeigenvalue , and, and

The state of an The state of an nn--QubitQubit register can register can be written in the be written in the eigenketeigenket basis asbasis as

i iiα ϕΨ =∑

ia2

i ip α=

iϕ Whoosh !

Whoosh !

Measurement RevisitedMeasurement Revisited

InIn OutOut

jj

j

PPψ

ψψ ψ

O

BlackBoxBlackBox

MacroWorldMacroWorld

QuantumQuantumWorldWorld

EigenvalueEigenvalueObservableObservable

Q. Sys.Q. Sys.StateState

Q. Sys.Q. Sys.StateState

Pr job Pψ ψ=

j jjPλ= ∑Owherewhere Spectral DecompositionSpectral Decomposition

PhysicalPhysicalRealityReality

PhilosopherPhilosopherTurfTurf

Important Feature ofImportant Feature ofQuantum MechanicsQuantum Mechanics

It is important to mention that:It is important to mention that:

We cannot completelyWe cannot completelycontrol the outcome of control the outcome of quantum measurementquantum measurement

MoreMoreDiracDirac

NotationNotation

More More DiracDirac NotationNotation

LetLet ( )H H* ,Hom=

Hilbert SpaceHilbert Spaceof morphismsof morphismsfrom tofrom toH

We call the elements of We call the elements of BraBra’’s, and s, and denote them asdenote them as

H*

label

Page 8: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

8

More More DiracDirac NotationNotation

There is a There is a dualdual correspondencecorrespondence between and between and H* H

KetKetBraBra

There exists a bilinear mapThere exists a bilinear mapdefined bydefined by

which we more which we more simpysimpy denote by denote by

H H* × →( )( )1 2ψ ψ ∈

1 2|ψ ψ

ψ ψ↔KetKet Bra

Bra

BraBra--cc--KetKet

DiracDirac Notation (Cont.)Notation (Cont.)

•• Consider a Quantum System in the Consider a Quantum System in the state state

ψ KetKet

•• Suppose we measure many of these Suppose we measure many of these states with the observable states with the observable A

HermitianHermitianOperatorOperator

•• Then the average value of all these Then the average value of all these measurements measurements w.r.tw.r.t. . AA is:is:

( ) | |A A Aψ ψ ψ ψ= =

Avg.Avg.of Aof A

HeisenbergHeisenberg’’s Uncertainty Principles Uncertainty Principle

Otherwise, Otherwise, AA and and BB are are incompatibleincompatible..

DefinitionDefinition. Observables . Observables AA and and BB are are compatiblecompatible if if [ ], 0A B AB BA= − =

Let Let A A A∆ = −

HeisenbergHeisenberg’’s Uncertainty Principles Uncertainty Principle

( ) ( ) [ ] 22 2 1 ,4

A B A B∆ ∆ ≥

is the is the Standard DeviationStandard Deviation. It is . It is a measure a measure of the uncertaintyof the uncertainty of the observable of the observable AA ..( )2A∆

1=

CopyingMachine

OutIn

CloningCloningThe NoThe No-- TheoremTheorem

DieksDieks, , WoottersWootters, , ZurekZurek

An Example of An Example of HeisenbergHeisenberg’’ss

UncertaintyUncertaintyPrinciplePrinciple

Particle Particle vsvs Wave Picture of MatterWave Picture of MatterYoungYoung’’s 2s 2--slit Experimentslit Experiment

EE

BBLLOOCCKK

EE

EE EE

EE

Page 9: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

9

Particle Particle vsvs Wave Picture of MatterWave Picture of MatterYoungYoung’’s 2s 2--slit Experimentslit Experiment

EE

BBLLOOCCKK

EE

EE

EE

EE

Particle Particle vsvs Wave Picture of MatterWave Picture of MatterYoungYoung’’s 2s 2--slit Experimentslit Experiment

An interference pattern appearsAn interference pattern appearsParticle Particle notnot observedobserved

But a wave observedBut a wave observed

Particle Particle vsvs Wave Picture of MatterWave Picture of MatterYoungYoung’’s 2s 2--slit Experimentslit Experiment

Observe

Observe

What happens if we observe which ofWhat happens if we observe which ofthe two slits each electron passes ?the two slits each electron passes ?

The interference pattern disappears !! The interference pattern disappears !!

Wave Wave notnot observed;observed;But a particle is observed ! But a particle is observed !

Application of HeisenbergApplication of Heisenberg’’s s UncetaintyUncetainty PrinciplePrinciple

NoteNote:: XX and and PP are are incompatible observablesincompatible observables; for:; for:[ ], 0X P i= − ≠

1=ObservablesObservables

XX Position OperatorPosition Operator

PP Momentum OperatorMomentum Operator

Ergo, to know precisely which of the two slits the Ergo, to know precisely which of the two slits the electron passed through, forces the momentum to be electron passed through, forces the momentum to be uncertainuncertain

Therefore, by Therefore, by HeisenbergHeisenberg’’s Uncertainty Principles Uncertainty Principle::

( ) ( ) [ ]2 2 1 1,4 4

X P X P∆ ∆ ≥ =

UncertaintyUncertaintyin Positionin Position

UncertaintyUncertaintyin Momentumin Momentum

Alice DaydreamsAlice Daydreams

AliceAlice

How do I prevent How do I prevent Eve from Eve from

eavesdropping ???eavesdropping ???

How can I How can I outwit Eve outwit Eve

??????

? ? ? ? ? ?

? ? ? ?

? ?

Alice Has an IdeaAlice Has an Idea

AliceAlice

Idea:Idea: CouldnCouldn’’t I somehow t I somehow use Heisenberguse Heisenberg’’s s

Uncertainty Principle to Uncertainty Principle to detect Evedetect Eve’’s eavesdropping s eavesdropping

??????

But How ???But How ???

Page 10: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

10

AliceAlice BobBob

What if I use the What if I use the thethe electron gun to send Bobelectron gun to send Boba message, i.e., an interference pattern ???a message, i.e., an interference pattern ???

AliceAlice

EveEve

Aha! Bob knows the evil Eve is listening in !!!Aha! Bob knows the evil Eve is listening in !!!

BobBob

What if the evil Eve tries to listen in ??? What if the evil Eve tries to listen in ???

Alice Invents the BB84 Alice Invents the BB84 Quantum Crypto ProtocolQuantum Crypto Protocol

BB84 = BennettBB84 = Bennett--BrasardBrasard 19841984

A Quantum Crypto System for the A Quantum Crypto System for the BB84 ProtocolBB84 Protocol

EveEve

TwoTwo--Way CommunicationWay Communication

OneOne--Way CommunicationWay Communication

PublicPublicChannelChannel

Second StageSecond Stage Second StageSecond Stage

QuantumQuantumChannelChannel

AliceAlice BobBob

First StageFirst Stage First StageFirst Stage

The Quantum ChannelThe Quantum Channel

•• Alice will communicate over the quantumAlice will communicate over the quantumchannel by sending channel by sending 00’’s and s and 11’’s, each encoded s, each encoded as a as a quantumquantum polarizationpolarization statestate of an of an individualindividualphotonphoton..

•• Reminder: We note that the Reminder: We note that the polarizationpolarizationstatestate of an of an individualindividual photonphoton is an element is an element

of a 2of a 2--D Hilbert space D Hilbert space HH ..ψ•• The slanted polarization states The slanted polarization states

also form a basis of also form a basis of HH which we will call the which we will call the obliqueoblique basis basis

andand

•• The vertical and horizontal polarization The vertical and horizontal polarization states states

form a basis of form a basis of HH which we will call the which we will call the vertical/horizontalvertical/horizontal ((V/HV/H) basis ) basis

↔andand

Two Bases of 2Two Bases of 2--D Hilbert Space HD Hilbert Space H

Page 11: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

11

Quantum ChannelQuantum Channel Encoding ConventionsEncoding Conventions

•• For the For the V/HV/H basis , Alice & Bob agree to basis , Alice & Bob agree to communicate via the following communicate via the following quantum alphabetquantum alphabet

"1" =

"0" = ↔

•• For the For the obliqueoblique basis , Alice & Bob agree basis , Alice & Bob agree to communicate via the following to communicate via the following quantum alphabetquantum alphabet

"1" =

"0" =

Using HeisenbergUsing Heisenberg’’s Uncertainty Principles Uncertainty Principle

•• So Alice communicates to Bob by randomly So Alice communicates to Bob by randomly choosing between the two quantum alphabets choosing between the two quantum alphabets

and .and .

•• Because of HeisenbergBecause of Heisenberg’’s uncertainty principle, s uncertainty principle, Alice & Bob know that observations with respect Alice & Bob know that observations with respect to the basis are incompatible with to the basis are incompatible with observations with respect to the basis.observations with respect to the basis.

BB84: Eve BB84: Eve NotNot Present Present (No Noise is Assumed)(No Noise is Assumed)

AliceAlice

BobBob

↔ ↔

Raw KeyRaw Key

WW CC

0000 11 11 0000

1111

1111

000000 00

00

11111111 11000000 0000

WW WWWWCCCCCC CCCC

00

If Eve is eavesdropping, then she will create If Eve is eavesdropping, then she will create (because of Heisenberg(because of Heisenberg’’s uncertainty principle) an s uncertainty principle) an error rateerror rate between Alicebetween Alice’’s & Bobs & Bob’’s s RAW KEYRAW KEY. .

Thus, Alice and Bob can determine EveThus, Alice and Bob can determine Eve’’s presence by s presence by publicly comparing a small portion of their respective publicly comparing a small portion of their respective RAW RAW KEYKEYss. If there are errors, they know Eve is . If there are errors, they know Eve is present, discard their RAY present, discard their RAY KEYsKEYs, and start all over , and start all over again. If there are no errors, they will then again. If there are no errors, they will then discard the discard the publicallypublically disclosed portion. Then the disclosed portion. Then the undisclosed portion of their RAW undisclosed portion of their RAW KEYsKEYs agree, and is agree, and is now an uncompromised secret now an uncompromised secret FINAL KEYFINAL KEY shared by shared by Alice and Bob. Alice and Bob.

BB84: Eve BB84: Eve IsIs Present Present (No Noise is Assumed)(No Noise is Assumed)

Second CommunicationSecond Communication22--WayWay

First CommunicationFirst Communication11--WayWay

AliceAlice BobBob

QuantumQuantumChannelChannel

Classical PublicClassical PublicChannelChannel

Topic:Topic: Which Observable Did You Use ?Which Observable Did You Use ?

50% of Bits Discarded50% of Bits DiscardedResultResult: : Raw KeyRaw Key

Public DiscussionPublic Discussion

SummarySummary

Their Their Raw KeysRaw Keys agreeagree if Eve not eavesdroppingif Eve not eavesdropping

What HappensWhat Happensifif

Eve Listens In ?Eve Listens In ?

Page 12: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

12

BB84: Eve BB84: Eve IsIs Present Present (No Noise is Assumed)(No Noise is Assumed)

AliceAlice

BobBob

--------BobBob’’ss

Raw KeyRaw Key 1111 111100 00

↔ ↔

11111111 11000000 0000

EveEve

1100 11 11 00111111 00 00

1100 11 11 00001111 11 00

-------- 1111 000000 00AliceAlice’’ssRaw KeyRaw Key

Choosing Quantum AlphabetsChoosing Quantum Alphabets

EveEve’’ssChoiceChoice

ProbProb=1/2=1/2

ProbProb=1/2=1/2

BobBob’’ssChoiceChoice

ProbProb=1/2=1/2

ProbProb=1/2=1/2

ProbProb=1/2=1/2

ProbProb=1/2=1/2

Raw KeyRaw Key

Raw KeyRaw Key

Raw KeyRaw Key

Raw KeyRaw Key

AliceAlice’’ssChoiceChoice

ProbProb=1/2=1/2

100%100%

100%100%

50%50%

50%50%

BB84: Eve BB84: Eve IsIs Present Present (No Noise is Assumed)(No Noise is Assumed)

Hence, Hence, if Eve eavesdropsif Eve eavesdrops, then Alice , then Alice & Bob& Bob’’s Raw Keys s Raw Keys disagreedisagree by 25%.by 25%.

The BB84 Protocol Step by StepThe BB84 Protocol Step by StepNo NoiseNo Noise

•• Over the quantum channel, Alice sends her message to Bob, Over the quantum channel, Alice sends her message to Bob, randomly choosing between the quantum alphabetsrandomly choosing between the quantum alphabets

•• Over the public channel, Bob communicates to Alice which Over the public channel, Bob communicates to Alice which quantum alphabets he used for each measurement.quantum alphabets he used for each measurement.

•• Over the public channel, Alice responds by telling Bob which Over the public channel, Alice responds by telling Bob which of his measurements were made with the correct alphabet.of his measurements were made with the correct alphabet.

•• Alice & Bob then delete all bits for which they used Alice & Bob then delete all bits for which they used incompatible quantum alphabets to produce their resulting incompatible quantum alphabets to produce their resulting RAW RAW KEYKEYss..

•• If Eve has not eavesdropped, their If Eve has not eavesdropped, their theirtheir two two RAW RAW KEYKEYsswill be the same.will be the same.

The BB84 Protocol Step by Step (Cont.)The BB84 Protocol Step by Step (Cont.)No NoiseNo Noise

•• Over the public channel, Alice & Bob compare small portions Over the public channel, Alice & Bob compare small portions of their of their RAW RAW KEYKEYss, and then delete the disclosed bits from , and then delete the disclosed bits from their RAW Key to produce their their RAW Key to produce their FINAL KEYFINAL KEY..

•• If Alice & Bob find through their public disclosure that no If Alice & Bob find through their public disclosure that no errors were revealed, then they know Eve was not present, errors were revealed, then they know Eve was not present, and now share a common and now share a common secretsecret FINAL KEYFINAL KEY..

The BB84 With NoiseThe BB84 With Noise

Raw Key is NoisyRaw Key is Noisy

•• Bob can not Bob can not distinquishdistinquish betweenbetween•• Error caused by NoiseError caused by Noise

•• Error caused by EveError caused by Eve

•• Bob adopts the working assumptionBob adopts the working assumption•• All errors caused by EveAll errors caused by Eve

•• Ergo, Eve has some portion of RAW KEYErgo, Eve has some portion of RAW KEY

Page 13: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

13

Solution: Solution: PrivacyPrivacy AmplificationAmplification

PrivacyPrivacy AmplificationAmplification: Distilling a smaller : Distilling a smaller secret key from a larger partially secret secret key from a larger partially secret key.key.

Preamble to Privacy AmplificationPreamble to Privacy Amplification

•• Alice & Bob begin by permuting RAW KEY Alice & Bob begin by permuting RAW KEY with a with a publicallypublically disclosed random permutation.disclosed random permutation.

•• Alice & Bob publicly compare blocks of RAW KEY Alice & Bob publicly compare blocks of RAW KEY to estimate error rate to estimate error rate QQ..

•• Alice & Bob discard any portion of the RAW Alice & Bob discard any portion of the RAW KEY that has been publicly disclosed.KEY that has been publicly disclosed.

•• Privacy Amplification not Privacy Amplification not possible! Restart everything !possible! Restart everything !Q Threshold≥ ⇒

Privacy Amplification BeginsPrivacy Amplification Begins

If If Q < ThresholdQ < Threshold, then Privacy Amplification is , then Privacy Amplification is possiblepossible

•• Based on Based on QQ , Alice & Bob estimate that , Alice & Bob estimate that bits out of bits out of nn are known by Eve.are known by Eve.

k≤

•• Let Let s =s = a security parameter to be adjusted as a security parameter to be adjusted as required.required.

•• Alice & Bob compute the parities of Alice & Bob compute the parities of nn--kk--sspublicly chosen random subsets.publicly chosen random subsets.

•• Both Alice & Bob keep these parities secret. Both Alice & Bob keep these parities secret. These parities form the FINAL SECRET KEY.These parities form the FINAL SECRET KEY.

Change in Role for Change in Role for CrytanalystsCrytanalysts

•• Old Role: Crack ciphers !Old Role: Crack ciphers !

•• New Role: Detect eavesdroppers !New Role: Detect eavesdroppers !

Quantum Crypto ProtocolsQuantum Crypto Protocols

•• BB84BB84

•• B92B92

•• EPREPR

•• OthersOthers

The B92 The B92 PrtocolPrtocol

•• Uses 2Uses 2--D Hilbert space D Hilbert space HH for for polarized photonspolarized photons

•• Use only one Quantum AlphabetUse only one Quantum Alphabet

( )| sin 2θ=

where where 0 / 2θ π< <0 =

1 =θ

Page 14: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

14

Measurement: POVMMeasurement: POVM

11 |

A−

=+

11 |

A−

=+

? 1A A A= − −

NonNon--CommutingCommutingObservablesObservables

Binary Erasure Binary Erasure ChanelChanel (BEC)(BEC)

•• There are eavesdropping strategies that do modify There are eavesdropping strategies that do modify inconclusive results (i.e., % of erasures).inconclusive results (i.e., % of erasures).

•• There are eavesdropping strategies which do not.There are eavesdropping strategies which do not.

0 =

1 =

p

rp

r ??

( ) 0| sin 2r Rθ= = =

| | | |p A A= =

Eavesdropping StrategiesEavesdropping Strategies

•• Opaque eavesdroppingOpaque eavesdropping

•• Translucent eavesdropping without Translucent eavesdropping without entanglemententanglement

•• Translucent eavesdropping with Translucent eavesdropping with entanglemententanglement

•• Lie low eavesdropping strategiesLie low eavesdropping strategies

•• Other eavesdropping strategies ?Other eavesdropping strategies ?

Opaque EavesdroppingOpaque Eavesdropping

Eve intercepts AliceEve intercepts Alice’’s message, and s message, and then masquerades as Alice by sending then masquerades as Alice by sending on her received message to Bobon her received message to Bob

Translucent Eavesdropping Without EntanglementTranslucent Eavesdropping Without Entanglement

Eve makes the information carrier interact Eve makes the information carrier interact unitarily with her probe, and then lets it unitarily with her probe, and then lets it proceed on to Bob in a slightly modified stateproceed on to Bob in a slightly modified state

0 0'ψ ψ +⇒

1 1'ψ ψ −⇒

where denotes the state of the where denotes the state of the probe.probe.

ψ

Translucent Eavesdropping With EntanglementTranslucent Eavesdropping With Entanglement

To increase her information, Eve may attempt To increase her information, Eve may attempt to entangle the state of her probe and the to entangle the state of her probe and the carrier that she is resending:carrier that she is resending:

0 0' 1'ψ α ψ β ψ+ −⇒ +

1 1' 0'ψ β ψ α ψ− +⇒ +

where denotes the state of the where denotes the state of the probe.probe.

ψ

Page 15: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

15

Optical ImplementationsOptical Implementations

•• Over 100 kilometers of fiber Over 100 kilometers of fiber optic cableoptic cable

•• Over 2 kilometers of free spaceOver 2 kilometers of free space

•• There are many There are many testbedtestbed implementations implementations both in USA and the EUboth in USA and the EU

Next ???Next ???

•• Earth/Satellite CommunicationEarth/Satellite Communication

•• Single photon sourcesSingle photon sources

DifficultiesDifficulties

•• MultiMulti--User Quantum Crypto ProtocolsUser Quantum Crypto Protocols

•• A more rigorous mathematical proof that A more rigorous mathematical proof that quantum crypto protocols are impervious to quantum crypto protocols are impervious to all possible eavesdropping strategies.all possible eavesdropping strategies. The EndThe End

Lomonaco, Samuel J., Jr., Lomonaco, Samuel J., Jr., An Entangled Tale An Entangled Tale of Quantum Entanglementof Quantum Entanglement, in AMS PSAPM/58, , in AMS PSAPM/58, (2002), pages 305 (2002), pages 305 –– 349.349.

Quantum Computation and InformationQuantum Computation and Information,, Samuel J. Samuel J. Lomonaco, Jr. and Howard E. BrandtLomonaco, Jr. and Howard E. Brandt (editors),(editors), AMS AMS CONM/305, (2002). CONM/305, (2002).

Page 16: Quantum Cryptography - Inspiring Innovationlomonaco/slides/QCryptoHandout.pdf · Quantum cryptography provides a new mechanism enabling the parties communicating with one another

16

Other PowerPoint Talks to Be Found atOther PowerPoint Talks to Be Found athttp://http://www.csee.umbc.edu/~lomonacowww.csee.umbc.edu/~lomonaco

•• A Rosetta Stone for Quantum ComputationA Rosetta Stone for Quantum Computation

•• Three Quantum AlgorithmsThree Quantum Algorithms

•• Quantum Hidden Subgroup AlgorithmsQuantum Hidden Subgroup Algorithms

•• An Entangled Tale of Quantum EntanglementAn Entangled Tale of Quantum Entanglement

ElementaryElementary

AdvancedAdvanced