Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Quantum Computing and Qbit Cryptography
Prepared by Dr. Taha MAhdy
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Digital Signatures and Hash Functions. Digital Signatures.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
What is Elliptic Curve Cryptography?
Quantum Computing MAS 725 Hartmut Klauck NTU
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
Great Theoretical Ideas in Computer Science.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Quantum Computation and the Bloch Sphere
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Windows Core Security1© 2006 Microsoft Corp Cryptography: Helping Number Theorists Bring Home the Bacon Since 1977 Dan Shumow SDE Windows Core Security.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Quantum Cryptography Marshall Roth March 9, 2007.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
ROM-based computations: quantum versus classical B.C. Travaglione, M.A.Nielsen, H.M. Wiseman, and A. Ambainis.
Quantum Communication, Quantum Entanglement and All That Jazz Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering,
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Codes, Ciphers, and Cryptography-RSA Encryption
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Presented by: Erik Cox, Shannon Hintzman, Mike Miller, Jacquie Otto, Adam Serdar, Lacie Zimmerman.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Alice and Bob’s Excellent Adventure
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Solving mutual exclusion by using entangled Qbits Mohammad Rastegari proff: Dr.Rahmani.
Darci Miyashiro Math 480 April 29, 2013
Encryption.
Foundations of Computing I CSE 311 Fall It’s Boolean algebra again Definition for  based on  Definition for  based on  Complement works like.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Quantum Convolutional Coding Techniques Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering, University of.
CSE 311 Foundations of Computing I Lecture 10 Set Theory Autumn 2012 Autumn 2012CSE
Elliptic Curves Number Theory and Cryptography. A Pile of Cannonballs A Square of Cannonballs.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
COMPSCI 290.2: Computer Security
Public-key Cryptography
QUANTUM CRYPTOGRAPHY.
Quantum Cryptography Quantum Computing
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Teleportation
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani

What is Quantum Cryptography? In general, quantum computing involves using quantum particles such as electrons or photons in computations Cryptography involves sending sensitive information safely Quantum cryptography is simply cryptography using quantum methods Quantum cryptography is governed by the laws of quantum mechanics

Why Do We Need Quantum Cryptography? Many classical algorithms already exist but a large number of them require a secret key RSA, one of the leading forms of encryption, relies on the difficulty of finding prime factors. Shor's algorithm can break RSA encryption with approximate speed of O((log N) 3 ) (where n is the number of bits in the key) Conclusion: RSA is not secure

Definitions: A theta-function is a function which controls the angle of polarization of a photon A critical time is a time at which a number of theta- functions intersect. A photon is charged if it is governed by some theta- function

Photon Polarization The polarization of a photon can be expressed in bra-ket notation in terms of two state vectors |x> and |y> as a*|x> + b*|y> with a 2 + b 2 equal 1, and a and b are complex numbers Where |x> and |y> form a basis for some Bloch Sphere (basically, the space where quantum states exist) One can assign |x> to 0 while |y> equals 1 a 2 is the probability that the polarization is in the |x> state. b 2 is the probability that the polarization is in the |y> state.

Determination of the Basis Vectors Simplify the vectors such that |0> = i and |1> = j where i= and j= are unit vectors in two space Applying the rotational matrix, M, to these vectors we get that for any general θ, |x> = M* |0> = and |y> = M*|1> = The scalars for these vectors a, b such that a*|x> + b*|y> = V (where V is any vector on the Bloch Sphere) are as follows: a = x*cos(θ) + y*sin(θ) b = -x*sin(θ) + y*cos(θ) a and b are the coordinates of the vector in basis { |x>, |y> }

Assumptions One: A photon can be transported through optical fiber without changing its polarization Two: There exists a mechanism to cause a photon's polarization to change as a specific function of time The function must be of the form f( A*t 5 +B*t 4 +Ct 3 + Dt 2 + Et + F ) where f is any function and A, B, C, D, E, and F are controlled by the mechanism. Three: There exists some way to maintain a photon's state for a period of time. Four: One can measure photons in an arbitrary basis

The Algorithm in Brief Suppose Alice wants to send a message to Bob. Alice will then notify Bob that she wants to communicate. Alice then sends quantum bits charged so that the message appears at a critical time t 0 Alice then sends this time t 0 to Bob in a classically- encrypted message Bob then measures the photons at t 0

Required Properties of Theta- Functions All the theta-functions intersect in exactly one point which will be called θ 0 at time t 0 The functions are all of odd degree of 5 or more. Thanks to the unsolvability of the quintic equation, no one will be able to determine the zero of the equations by a formula even if they can obtain the formula

Generation of the Functions Set f(t) = A*t 5 +B*t 4 +Ct 3 + Dt 2 + Et + F Property two can be determined as follow Set f(t) - θ 0 = (t-t 0 )(t-ai)(t+ai)(t+bi)(t-bi) where i is the imaginary number, then f(t) - θ 0 has only one zero which means f(t) = θ 0 at only one point. Expand the right side then, At 5 +Bt 4 +Ct 3 +Dt 2 +Et+(F- θ 0 ) = t 5 +(-t 0 )t 4 + (a 2 +b 2 )t 3 + (-t 0 [a 2 +b 2 ])t 2 +(a 2 b 2 )t + (-t 0 [a 2 b 2 ])

Generation (Cont) By identification of variables, A = 1; B = -t0; C = a 2 +b 2 ; D = -t 0 *C; E = a 2 b 2 ; F = θ 0 – Et 0 C and E are free variables f(t) = t 5 - t 0 *t 4 +Ct 3 - Ct 0 *t 2 + Et + θ 0 - Et 0 Finally, f(t 0 ) = (t 0 ) 5 – t 0 *(t 0 ) 4 +C(t 0 ) 3 – Ct 0 *(t 0 ) 2 + Et 0 + θ - Et 0 = θ 0 The second criteria is easily visible by the construction of f(t).

Safety of the Algorithm Why is this more secure than the classical encryption which secured the agreed critical time? Alice will ensure that no one can break the code in a time less than t 0 By the time that any eavesdropper has determined the critical time, the information will already be gone. Multiple (at least ten) theta-functions will be used in the algorithm.

Simulation with Bob

Simulation with Eve

Summary The algorithm takes little time compared to many quantum encryption algorithms No eavesdropper can gain information about the message Alice sends There is no need for a secret key to use this method The computations used in the algorithm are easy and efficient.

Contacting Me Name: Caleb Parks Phone: Institution: Southern Arkansas University