Quantum Cryptography Christian Schaffner

Slides:



Advertisements
Similar presentations
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Advertisements

Christian Schaffner CWI Amsterdam, Netherlands Position-Based Quantum Cryptography: Impossibility and Constructions Seminar Eindhoven, Netherlands Wednesday,
Position-Based Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic Tea, ILLC Tuesday, 14/02/2012.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Position-Based Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Advances in Quantum Cryptography Workshop.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Bachelor.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Cryptography, Authentication and Digital Signatures
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Amsterdam.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September.
Nawaf M Albadia
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Tropical QKD Waterloo, ON, Canada Wednesday, 16 June 2010.
Cryptography In the Bounded Quantum-Storage Model
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Cryptography in the Bounded-Quantum-Storage Model Christian Schaffner BRICS, University of Aarhus PhD Defense Friday, April 27 th 2007.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
CSE 311: Foundations of Computing Fall 2013 Lecture 9: Set theory and functions.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Institute of Physics (IOP), Bhubaneswar
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Homomorphic encryption of quantum data
Encryption and Integrity
Lesson 7: Public Key Cryptography Lesson 8: Rapid Research - Cybercrime Day 37.
Chuck Frank Northern Kentucky University
Quantum Cryptography Christian Schaffner ICT OPEN 2017
Computer Communication & Networks
COMPSCI 290.2: Computer Security
Review Video Dina Dwi Maharani 3 D3 IT A
Cryptography & Security
Public Key Encryption Systems
ICNFP, Kolymbari, Crete, Greece August 28 – September 5, 2013
Quantum Cryptography Quantum Computing
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Q Jeff Kinne.
Quantum Cryptography Alok.T.J EC 11.
Chuck Frank Northern Kentucky University
Assignment #4 – Solutions
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
Practical Aspects of Modern Cryptography
Quantum Cryptography Scott Roberts CSE /01/2001.
The Security of Quantum Cryptography
Appendix 5: Cryptography p
Lecture 10: Network Security.
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Basic of Modern Cryptography
Asymmetric Cryptographic Algorithms
Public Key Encryption Systems
Secure Diffie-Hellman Algorithm
Introduction to Cryptography
Presentation transcript:

Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Research Center for Quantum Software BSc IW visit to ILLC Tuesday, 31 October 2017

Classical Cryptography 3000 years of fascinating history Until 1970: private communication was the only goal Scytale Enigma

Modern Cryptography is everywhere! Edward Snowden is everywhere! is concerned with all settings where people do not trust each other

Secure Encryption Alice Bob Eve k = ? m = 0000 1111 m = “I love you” Alice Eve Bob k = ? k = 0101 1011 k = 0101 1011 Goal: Eve does not learn the message Setting: Alice and Bob share a secret key k

Perfectly Secure Encryption: One-Time Pad 5 m = 0000 1111 c = m © k = 0101 0100 m = c © k = 0000 1111 Alice Eve Bob k = 0101 1011 k = ? Goal: Eve does not learn the message Setting: Alice and Bob share a key k Recipe: It is perfectly secure! x y x © y 1 m = 0000 1111 c = 0101 0100 k = 0101 1011 k = 0101 1011 c = m © k = 0101 0100 c © k = 0000 1111 c © k = m © k © k = m © 0 = m

Problems With One-Time Pad 6 m = 0000 1111 c = m © k = 0101 0100 m = c © k = 0000 1111 Alice Eve Bob k = ? k = 0101 1011 k = 0101 1011 BSc Informatica course: Modern Cryptography The key has to be as long as the message. The key can only be used once. In practice, other encryption schemes (such as AES) are used which allow to encrypt long messages with short keys. Master of Logic course: Basic Probability for encrypting internet traffic Master of Logic course: Information Theory Master of Logic course: Computational Complexity

Quantum Mechanics + basis £ basis Measurements: with prob. 1 yields 1 0/1

Wonderland of Quantum Mechanics

Can Quantum Computers Be Built? Possible to build in theory, no fundamental theoretical obstacles have been found yet. Canadian company “D-Wave” claims to have build a quantum computer with 2048 qubits. Did they? 2014/15: 135+50 Mio € investment in QuTech centre in Delft 2015: center in Amsterdam 2017+: 1 Bio € EU flagship on Quantum Technology Martinis group (UCSB) 9 qubits Master of Logic course: Quantum Computing Possibilities for Research Projects at QuSoft

Quantum Key Distribution (QKD) [Bennett Brassard 84] 10 Alice Bob k = ? k = 0101 1011 k = 0101 1011 Eve Offers a quantum solution to the key-exchange problem Puts the players into the starting position to use symmetric-key cryptography (such as the one-time pad)

Quantum Key Distribution (QKD) [Bennett Brassard 84] 11 Alice Bob Eve technically feasible: no quantum computer required, only quantum communication

Quantum Key Distribution (QKD) [Bennett Brassard 84] 12 Alice Bob Eve technically feasible: no quantum computer required, only quantum communication

Summary One-Time Pad Quantum Key Distribution BSc Informatica course: Modern Cryptography Master of Logic course: Computational Complexity Master of Logic course: Basic Probability Master of Logic course: Quantum Computing Master of Logic course: Information Theory Possibilities for Research Projects at QuSoft