Quantum Key Distribution

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Gagan Deep Singh GTBIT (IT) August 29,2009.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Nawaf M Albadia
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Le avventure di Alice, Bob & Eve nel mondo dei quanti Stefano Mancini Dipartimento di Fisica Università di Camerino.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Security Outline Encryption Algorithms Authentication Protocols
Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council.
Encryption and Integrity
J. Miranda University of Ottawa 21 November 2003
Computer Communication & Networks
COMPSCI 290.2: Computer Security
QUANTUM CRYPTOGRAPHY.
Weak Value Assisted Quantum Key Distribution
with Weak Measurements
Introduction to security goals and usage of cryptographic algorithms
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Cryptography.
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
NET 311 Information Security
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Quantum Cryptography Alok.T.J EC 11.
Security through Encryption
Brandin L Claar CSE 597E 5 December 2001
Secure Electronic Transaction (SET) University of Windsor
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
Quantum Cryptography Scott Roberts CSE /01/2001.
The Secure Sockets Layer (SSL) Protocol
Appendix 5: Cryptography p
CDK: Chapter 7 TvS: Chapter 9
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Key Distribution Reference: Pfleeger, Charles P., Security in Computing, 2nd Edition, Prentice Hall, /18/2019 Ref: Pfleeger96, Ch.4.
Basic of Modern Cryptography
Secure Diffie-Hellman Algorithm
Presentation transcript:

Quantum Key Distribution In response to hackers’ attacks, the kit has become markedly more secure. Field trials have shown that delicate quantum light signals can be sent through the same fibres that bring the internet to homes and businesses. And efforts to make quantum-enhanced versions of the equipment that amplifies and distributes standard optical signals are bearing fruit. Quantum networks are springing up or expanding. And quantum communications, just like their conventional counterparts, will soon be whizzing through space, too. The most discussed and deployed technique is called quantum-key distribution (QKD). In one set-up, a sender launches single photons toward a receiver, randomly choosing one of four planes along which the light particles are polarised, two of them associated with a 0 and the other two with a 1. The receiver likewise randomly chooses which kind of polarisation to check for. After sending a string of these bit-associated photons, the pair can publicly compare notes on which polarisations they employed; whenever they happen to have chosen the same one, the 0 or 1 associated with that polarisation can be used as a bit in a cryptographic key. http://www.economist.com/technology-quarterly/2017-03-09/quantum-devices

Secure communication and QKD. Secure Communication: Suppose a sender, Alice, would like to send a secret message to a receiver, Bob, through an open communication channel. Encryption is needed. If they share a common string of secret bits, called a key, Alice can use her key to transform a plain-text into a cipher-text, which is unintelligible to Eve. In contrast, Bob, with his key, can decrypt the cipher-text and recover the plain- text. In cryptography, the security of a crypto-system should rely solely on the secrecy of the key. The question is: how to distribute a key securely? In conventional cryptography, this is often done by trusted couriers. Unfortunately, in classical physics, couriers may be bridled or compromised without the users noticing it. This motivates the development of quantum key distribution (QKD). Quantum Key Distribution: The best-known QKD protocol (BB84) was published by Bennett and Brassard in 1984 [3]. Alice sends Bob a sequence of photons prepared in different polarization states, which are chosen at random from two conjugate bases. For each photon, Bob selects randomly one of the two conjugate bases and performs a measurement. He records the outcome of his measurement and the basis choice. Through an authenticated channel, Alice and Bob broadcast their measurement bases. They discard all polarization data sent and received in different bases and use the remaining data to generate a sifted key. To test for tampering they compute the quantum bit error rate (QBER) of a randomly selected subset of data and verify that the QBER is below a certain threshold value. By applying classical post-processing protocols such as error correction and privacy amplification, they generate a secure key. This key can be used to make the communication unconditionally secure by using a one-time-pad protocol [4]. https://arxiv.org/pdf/1505.05303.pdf

References https://en.wikipedia.org/wiki/Quantum_key_distribution BB84 Algorithm https://en.wikipedia.org/wiki/BB84