J. Miranda University of Ottawa 21 November 2003

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Public Key Model 8. Cryptography part 2.
Gagan Deep Singh GTBIT (IT) August 29,2009.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
1 Central Limit Theorem The theorem states that the sum of a large number of independent observations from the same distribution has, under certain general.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
Differentially Encoding
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Our Proposed Technique
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Intrusion Resilience via the Bounded-Storage Model Stefan Dziembowski Warsaw University and CNR Pisa.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
The Secure Sockets Layer (SSL) Protocol
Attacks on Public Key Encryption Algorithms
Encryption and Integrity
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
COMPSCI 290.2: Computer Security
Cryptography & Security
Quantum Information Promises new insights Anthony J
QUANTUM CRYPTOGRAPHY.
Quantum Cryptography Quantum Computing
Group theory exercise.
with Weak Measurements
Cryptography.
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Quantum Cryptography Alok.T.J EC 11.
A Brief Introduction to Information Theory
CS/ECE 478 Network Security Dr. Attila Altay Yavuz
Brandin L Claar CSE 597E 5 December 2001
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
Authenticated QKD protocol using one-time ID
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Quantum Cryptography Quantum Computing
Secure Diffie-Hellman Algorithm
Presentation transcript:

J. Miranda University of Ottawa 21 November 2003 Quantum Cryptography J. Miranda University of Ottawa 21 November 2003

Outline Background info on secure comms Description of current systems Where quantum mechanics fits in Description of BB84 protocol Conclusion -- the topic of discussion is the use of Quantum Mechanics in secure communications systems -- therefore, I’ll be giving you a brief backgrounder on secure comms systems ...

Secure Comms System block diagram for secure comms: A A Encryption Decryption -- 5 components: tx, channel, rx -- the secure part lies with the encryption and decryption boxes -- encryption accomplished by cryptography (difficult mathematical functions) -- 6th component is a most important - the key and is the focus of this presentation -- piece of information required to make it easier to decrypt the data 01101 01101 Transmitter Channel Receiver 01101

Secret-key System the same key is used to encrypt & decrypt -- two types of systems, the first is SECRET-KEY SYSTEM -- disadvantage is getting the key to the receiver how does the key get to the receiver?

Public-key System public key for encryption private key for decryption -- public-key system is a solution to the SECRET-KEY system -- two types of keys, a public key for encrypting and a private key for decrypting -- the weakness in this system is that the public-key and private-key are mathematically related; therefore, it is possible that the private key can be determined via the public key problem is that the keys are mathematically related

Quantum Key Distribution Quantum Mechanics? in both cases, there was a key-distribution problem quantum mechanics is solution Quantum Cryptography Quantum Key Distribution

Qubits states of binary bit: 1,0 states of qubit: |1>,|0> differences between bit & qubit: states of superposition examination for state determination -- a qubit stands for a quantum bit -- analogous to a binary bit -- as a binary bit can have two states (1,0) so can a qubit -- two main differences between bits and qubits -- qubits can also be in a state which is a superposition of the 1 and 0 state -- and bits can be examined to determine the state that they are in, not so for qubits -- quantum mechanics only allows certain information to be determined when examining a qubit

BB84 Protocol linear polarization (+) circular polarization (*) -- returning to quantum key distribution, how is it accomplished? -- several protocols, one of which is the BB84 protocol developed in ..., by... -- in this protocol, an encoding scheme is used to translate a binary 1 or 0 into a quantum state -- bits represented by voltage levels, qubits by polarization of photons -- BB84 protocol requires to encoding schemes to represent the bits

BB84 Protocol Public Comms Channel Quantum Channel -- describing this process requires 3 players: -- Vanessa to send a message -- Powers to receive it -- and Dr. Evil to try to intercept it

BB84 Protocol chooses random Key sequence (100111010110…) for each bit: encoding scheme corresponding state transmits to Austin Powers K bit scheme state 1 + | > * |U> -- there are 5 steps to this protocol to get a random key from Vanessa to Austin -- Step 1, Vanessa is required to generate a random bit sequence, parts of which will become the key -- Step 2 Vanessa will randomly choose an encoding scheme to represent the state of each bit of the number sequence. -- and she transmits the photons individually over the quantum communications channel to Powers

BB84 Protocol + * x photons received guess scheme record & check Vanessa Austin Check + * x photons received guess scheme record & check RAW KEY -- Step 3 is the receipt of the photons by Austin. -- randomly chooses a polarization scheme to examine the photon (by chance, he’ll have chosen some correctly) -- records his choice of alphabet for each photon. -- In Step 4 Austin contacts Vanessa over the public communications channel -- Both Vanessa and Austin then discard those photons to which Austin applied the incorrect alphabet. -- What remains is a sequence of random bits referred to as a raw key which has been transmitted securely from Vanessa to Austin. This is so because Vanessa has transmitted the photons one at a time and they cannot be split nor cloned. Additionally, any attempt at examining the photons while in transit to Austin will modify some of their properties. -- For example, measuring a linearly polarized photon with a diagonal filter will result in a 50% chance that the photon will go through, and if it does, it will have a different polarization when it reaches Austin. Dr. Evil has changed the message. Measuring a horizontally polarized photon with a vertical filter will block that photon and will not allow it to go through to Austin. Again, Dr. Evil has changed the message. This is the secure part of the protocol.

BB84 Protocol final check, reveal a portion of raw key Public Comms Channel raw key = 10111… final check, reveal a portion of raw key error correction & indication of Dr. Evil -- Step 5 is a final check, Vanessa and Austin take a sample of the raw key and over a public communications channel reveal the values that they have, to determine if there were any errors introduced by noise and Dr. Evil eavesdropping -- if the error count is below a given threshold, then what they both have is a key that can be used in a one-time pad encryption system. This key will only be used for one message and a new key will be developed for subsequent messages.

Conclusion secure communications important Quantum Key Distribution = security -- Secure communications systems are in greater demand in today’s digital world. Quantum mechanics can offer greater security in systems that currently in use via Quantum Key Distribution