15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Quantum Computing Joseph Stelmach.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Public Key Model 8. Cryptography part 2.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Chapter 21 Public-Key Cryptography and Message Authentication.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Quantum Cryptoanalysis and Quantum Cryptography (An introduction)
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Computing Basic Concepts and Applications.
By Joseph Szatkowski and Cody Borgschulte. ● Uses phenomenon associated with quantum mechanics instead of electrical circuitry ● Quantum mechanics explains.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Computing by Mathew Ross Jared Davis - Group L -
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
Quantum Computers By Andreas Stanescu Jay Shaffstall.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
FNI 1H Quantum Mechanics 1 Quantum Mechanics I don't like it, and I'm sorry I ever had anything to do with it. -- Erwin Schrodinger talking about Quantum.
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Advanced electronic configuration Done by: Su Di Yang (8)
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Encryption and Integrity
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Quantum Information Promises new insights Anthony J
QUANTUM CRYPTOGRAPHY.
Quantum Cryptography Quantum Computing
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Q Jeff Kinne.
Quantum Teleportation
Quantum Cryptography Alok.T.J EC 11.
Brandin L Claar CSE 597E 5 December 2001
Lecture 14: Blocking and Catching Photons Background
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Quantum Mechanics College Chemistry.
Quantum Computing Joseph Stelmach.
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Presentation transcript:

15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing

Quantum Communication NOT used to encrypt data! (so not really cryptography) Goal, instead, is to detect eavesdroppers Could be used to distribute a private key (could also add extra security for transmitting encrypted data) Page 2

15-853Page 3 Uncertainty Principle In quantum mechanics, certain pairs of properties of particles cannot both be known simultaneously, e.g., –Position and momentum of an electron (Heisenberg) If a measurement determines (with precision) the value of one of the properties, then the value of the other cannot be known

Photon Spin (Polarization) Photons can be given either “rectilinear’’ or “diagonal’’ spin as they travel down a fiber. Rectilinear: or Diagonal: or Measuring rectilinear spin with a rectilinear filter yields polarization of photon Page 4 blocked

15-853Page 5 What if the wrong filter is used? (equal probability) or measure diagonal measure rectilinear destroys state

15-853Page 6 Quantum Key Exchange 1.Alice sends Bob photon stream randomly polarized in one of 4 polarizations: 2.Bob measures photons in random orientations e.g.: x + + x x x + x (orientations used) \ | - \ / / - \ (measured polarizations) and tells Alice in the open what orientations he used, but not what he measured. 3.Alice tells Bob in the open which are correct 4.Bob and Alice keep the correct values Susceptible to a man-in-the-middle attack

Detecting an Eavesdropper Alice and Bob now confirm that they have received the same private key. How could they do this? Page 7

15-853Page 8 In the “real world” In April 2014 China began installing a kilometer quantum communications link between Beijing and Shanghai

Quantum Computers The state of a computer consists of the contents of its memory and storage, including values of registers (including the program counter), memory, disk contents, etc. In a conventional computer each memory “unit” holds one value at a time. Computation consists of a sequence of state transitions. But in a quantum computer, a memory unit holds “superposituion” of possible values Page 9

Qubit A single quantum “bit” which is 1 with probability p and 0 with probability 1-p. Multiple qubits exhibit “quantum entanglement”. Suppose two bits have value 00 with probability ½ and 11 with probability ½. If the bits are separated and measured at different locations, the measurements must yield the same values. A qubit could be implemented using a photon to carry a horizontal or vertical polarization Page 10

Factoring Large Primes In 1994 Peter Shor showed that a quantum computer can factor a number n in O(log 3 n) time. A similar result holds for solving the discrete logarithm problem. If a large-enough quantum computer can be built, then RSA and Diffie-Hellman key-exchange will no longer be secure Page 11

Controversial Quantum Computer D-Wave Systems, Inc., purports to build a quantum computer based on a 128-qubit chipset. No convincing demonstration of speed-up over conventional computer yet. Unresolved debate about whether there is actually quantum entanglement among the qubits. (Evidence seems to be leaning towards yes?) Page 12