Seung Hwan An University of Washington October 18, 2016 PHYS 494

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Quantum data locking, enigma machines and entropic uncertainty relations Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro,
Ilja Gerhardt QUANTUM OPTICS CQT GROUP Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Entanglement-based Free.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Gagan Deep Singh GTBIT (IT) August 29,2009.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Cryptography In the Bounded Quantum-Storage Model
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Antonio Acín
Entanglement-based Free Space Quantum Cryptography in Daylight Antía Lamas-Linares, Matthew P. Peloso, Ilja Gerhardt, Caleb Ho and Christian Kurtsiefer.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Lecture from Quantum Mechanics. Marek Zrałek Field Theory and Particle Physics Department. Silesian University Lecture 11.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Le avventure di Alice, Bob & Eve nel mondo dei quanti Stefano Mancini Dipartimento di Fisica Università di Camerino.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Institute of Physics (IOP), Bhubaneswar
Quantum Key Distribution in the GÉANT network
Encryption and Integrity
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
ICNFP, Kolymbari, Crete, Greece August 28 – September 5, 2013
QUANTUM CRYPTOGRAPHY.
Quantum Cryptography Quantum Computing
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Public Key Infrastructure
CV Cryptography Using a Bidirectional Quantum Channel
Quantum Cryptography Christian Schaffner
Quantum Cryptography Alok.T.J EC 11.
DEPARTMENT OF COMPUTER SCIENCE
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
Quantum Cryptography Scott Roberts CSE /01/2001.
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
One Time Signature.
Unit 8 Network Security.
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Secure Diffie-Hellman Algorithm
Presentation transcript:

Seung Hwan An University of Washington October 18, 2016 PHYS 494 Quantum Cryptography Seung Hwan An University of Washington October 18, 2016 PHYS 494

Introduction Background Quantum Key Distribution Protocols Experiments Limitations

Background Cryptography is the practice of techniques used for secure communication Prevents a third party from reading private messages First machine assisted system was the rotor cipher machine

Classical Encryption Example Pretty Good Privacy (PGP) is a classical encryption program that provides privacy for data communication in emails. “wUwDPglyJu9LOnkBAf4vxSpQgQZltcz7LWwEquhdm5kSQIkQlZtfxtSTsmaw q6gVH8SimlC3W6TDOhhL2FdgvdIC7sDv7G1Z7pCNzFLp0lgB9ACm8r5RZOBi N5ske9cBVjlVfgmQ9VpFzSwzLLODhCU7/2THg2iDrW3NGQZfz3SSWviwCe7G mNIvp5jEkGPCGcla4Fgdp/xuyewPk6NDlBewftLtHJVf =PAb3” Lock with public key, unlock with private key “Come on over for hot dogs and soda!”

Quantum Key Distribution Guarantee secure communication Produce shared random key BB84 – Photon Polarization E91 – Entangled Pairs http://ercim-news.ercim.eu/en85/special/high-speed-quantum-key-distribution-and-beyond

Terminologies Qubit – Unit of quantum information. The classical counterpart is the “bit”. Basis – State of an isolated quantum system.

BB84 Alice encodes qubits randomly into one of the two basis Bob measures qubits with random basis Half of sent qubits are used to create a private key

Alice and Bob Both figures: http://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/

The Eavesdropper “Eve” Alice and Bob can determine the presence of an eavesdropper If Eve did Eavesdrop, Alice and Bob can abort the key P number

E91 Utilizes an entangled pairs of photons. Each one goes to Alice and Bob Only 2 out of 9 measurements are used to create a key, but provide a more secure establishment

Gigahertz Decoy University of Cambridge 1.02 Megabits per second over 20 kilometers with BB84 Practical and low cost QKD systems for broadband communication A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields, "Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate," Opt. Express 16, 18790-18797 (2008)

E91 QKD University of Singapore Reached 200 bits per second over 1.5 kilometer Ling, Alexander, Matt Peloso, Ivan Marcikic, and Christian Kurtsiefer. "Experimental E91 Quantum Key Distribution." ResearchGate (2008): n. pag. Web. 18 Oct. 2016.

Satellite Quantum Communications University of Padua, Italy Satellite to Ground Feasibility of using BB84 Protocol in space Qubits are sent at 100 Megahertz and photon reflected back Vallone et al. Phys. Rev. Lett. 115, 040502 (2015)

Limitations Computers capable of transmitting quantum cryptography are custom made and expensive High attenuation over 50 kilometers Non-quantum cryptography is still very safe Human error