Quantum Technology programme

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

Hands-On Quantum Uncertainty. Quantum uncertainty is present in the diffraction, polarization and interference of light.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
PHYS Quantum Mechanics PHYS Quantum Mechanics Dr Jon Billowes Nuclear Physics Group (Schuster Building, room 4.10)
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Systems of Linear Equations
Entry Task: October 15 th Monday Question: Does it take more energy for the painter to get to the middle of the ladder or the top? You have 5 minutes!!
CS4600/5600 Biometrics and Cryptography UTC/CSE
SYSTEM OF EQUATIONS SYSTEM OF LINEAR EQUATIONS IN THREE VARIABLES
Gagan Deep Singh GTBIT (IT) August 29,2009.
In 1887,when Photoelectric Effect was first introduced by Heinrich Hertz, the experiment was not able to be explained using classical principles.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Hands-On Quantum Uncertainty This development of this workshop was supported by the Perimeter Institute of Theoretical Physics.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
PART 2 QUANTUM THEORY.
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
The EPR Paradox, Bell’s inequalities, and its significance By: Miles H. Taylor.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Lecture 11: Quantum Cryptography Wayne Patterson SYCS 654 Spring 2009.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Entangled Electrons.
Early quantum optics Blackbody radiation
Linear Equation in Two Variables
Math Module 2 Lines.
J. Miranda University of Ottawa 21 November 2003
Systems of Linear Equations
Concurrency: Deadlock and Starvation
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Quantum Information Promises new insights Anthony J
Graphing Equations and Inequalities
Quantum Cryptography Quantum Computing
Quantum Theory.
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
AP CSP: Making a reliable Internet & DNS
Quantum Key Distribution
Opening Activity: Jan. 11, 2018 Turn in your decomposer packet – Due today! Have ecology initial ideas ready to stamp. Each group of 2 students.
Quantum Model of the Atom
Quantum Cryptography Alok.T.J EC 11.
Polarized light.
Brandin L Claar CSE 597E 5 December 2001
Lecture 14: Blocking and Catching Photons Background
Warm-up: Check the equation y = 3x – x3 for symmetry.
KS4 Mathematics Linear Graphs.
Quantum Cryptography Scott Roberts CSE /01/2001.
Section 1.2 Straight Lines.
Equations of Straight Lines
Using the “Clicker” If you have a clicker now, and did not do this last time, please enter your ID in your clicker. First, turn on your clicker by sliding.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Linear Functions.
1-D Kinematics AP1.
A8 Linear and real-life graphs
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Which of these lines have a positive gradient
Presentation transcript:

Quantum Technology programme Quantum key distribution and entanglement

Quantum key distribution A possible method for quantum key distribution relies on entangled particles such as electrons. When an entangled pair is produced the overall angular momentum in the universe must remain constant. This means that if one particle is measured to have spin up along one direction the other must have spin down along the same direction.

Quantum entanglement Before measuring the spin each particle has equal chance of having spin up or spin down along the same direction. 50% UP 50% DOWN But measuring the spin of one particle along any direction will decide which spin (up or down) the particle has. The spin of that particle will now remain up or down, as if measuring it decided what spin the particle has.

Quantum entanglement Imagine we measure one of the two particles’ spin through the vertical direction Spin detector Spin detector 100% UP If the particle on the left has measured spin down along a vertical direction, the entangled particle will measure spin up along the vertical direction. This can become quite complex for the students, but we think that showing the possible spin before detection along the z (vertical) and x (horizontal) axes only might be helpful in simplifying the slide and in understanding the situations in the next few slides. It should suffice to explain to students that once we measure the spin of a particle along a certain axis we destroy any information about the spin along any other axis (due to the uncertainty principle). In other words, by measuring the spin along an axis, we have ‘forced the particle’ into choosing spin up/down along that axis. Keeping just z and x makes it simpler to see what’s happening, although we could measure the spin along any direction.

Quantum entanglement If the second particle is measured along a different axis the measurements are not linked. Spin detector (horizontal orientation) Spin detector (vertical orientation) 50% UP 50% DOWN This means we can still have 50% chance of having spin down or up on the particle on the right after spin measurement along the horizontal direction.

Quantum key distribution Sender’s measurement Receiver’s measurement If the particles on the left were measured by the sender and those on the left by the receiver, they could both share publicly the orientation of the measurements (x or z axes) and keep the ones that are along the same axis (both vertical/z, or both horizontal/x) and discard those along different bases.

Quantum key distribution We could assign 1 to spin up and 0 to spin down and use these values to generate our key. Sender’s measurement Receiver’s measurement What value would sender and receiver agree for this measurement? Remember that the receiver will need to invert the result, as they are getting the opposite spin to the sender’s (for the same base used). Make a note of the results!

Quantum key distribution We could assign 1 to spin up and 0 to spin down and use these values to generate our key. Sender’s measurement Receiver’s measurement What value would sender and receiver agree for this measurement? Different axes  value discarded

Quantum key distribution We could assign 1 to spin up and 0 to spin down and use these values to generate our key. Sender’s measurement Receiver’s measurement What value would sender and receiver agree for this measurement? 1

Quantum key distribution We could assign 1 to spin up and 0 to spin down and use these values to generate our key. Sender’s measurement Receiver’s measurement What value would sender and receiver agree for this measurement? 1

Quantum key distribution We could assign 1 to spin up and 0 to spin down and use these values to generate our key. Sender’s measurement Receiver’s measurement What value would sender and receiver agree for this measurement?

Quantum key distribution We could assign 1 to spin up and 0 to spin down and use these values to generate our key. Sender’s measurement Receiver’s measurement What value would sender and receiver agree for this measurement? Different axes  value discarded

Quantum key distribution We could assign 1 to spin up and 0 to spin down and use these values to generate our key. Sender’s measurement Receiver’s measurement What value would sender and receiver agree for this measurement? 1

Quantum key distribution What key would the sender and receiver know they have generated through the measurements taken so far? 0 1 1 0 1

Quantum key distribution What would sender and receiver know, if they got a reading like this? Sender’s measurement Receiver’s measurement It is impossible for entangled particles to both measure spin down through the same base, so someone must have detected one of the particles and re-emitted it with the wrong spin (because they do not know what base the sender and receiver have used yet) There is an eavesdropper!

Quantum key distribution Now try this simulation to understand further how this technology works. You don’t need to understand the ‘wavefunction’ mentioned in the introduction, but you might find the ”step by step explanation” useful to complete the task in your worksheet on this simulation.

The BB84 protocol The U.K. Quantum Technology Hubs are developing a technology for quantum key distribution that uses polarized photons, called BB84 protocol. Vertical base (V) Horizontal base (H) Sender and receiver randomly choose one of four orientations for their filter – Vertical (V) or Horizontal (H), -45º or +45º

Photon vertically polarized by sender  cannot pass through H filter The BB84 protocol Photon vertically polarized by sender  cannot pass through H filter In this scenario the receiver doesn’t get a photon through his/her filter, but the filters are at 90º, so he/she knows the sender sent a vertically polarized photon. A value of 1 could be given to the vertically polarized photon. Vertical base (V) Horizontal base (H) If the filters are perpendicular (90º), the results are certain and can be used to generate a key

Photon vertically polarized by sender passes through V filter The BB84 protocol Photon vertically polarized by sender passes through V filter In this scenario the receiver detects the photon through his/her filter, because the filters are parallel, so he/she knows the sender sent a vertically polarized photon. A value of 1 could be given to the vertically polarized photon. Vertical base (V) Horizontal base (H) If the filters are parallel, the results are also certain and can be used to generate a key

Photon polarized at -45º by sender  cannot pass through +45º filter The BB84 protocol Photon polarized at -45º by sender  cannot pass through +45º filter In this scenario the receiver doesn’t get a photon through his/her filter, but the filters are at 90º, so he/she knows the sender sent a vertically polarized photon. A value of 0 could be given to the -45º polarized photon. -45º +45º If the filters are perpendicular (90º), the results are certain and can be used to generate a key

Photon polarized at +45º by sender passes through +45º filter The BB84 protocol Photon polarized at +45º by sender passes through +45º filter In this scenario the receiver detects the photon through his/her filter, because the filters are parallel, so he/she knows the sender sent a vertically polarized photon. A value of 1 could be given to the +45º polarized photon. +45º +45º If the filters are parallel, the results are also certain and can be used to generate a key

The BB84 protocol Photon has 50% chance to go through, or be blocked by the receiver’s filter Photon has 50% chance to go through, or be blocked by the receiver’s filter, so this measurement cannot be used to generate a key and both receiver and sender discard this data. Vertical base (V) +45º If the filters are 45º from each other, the results are random, so they cannot be used for key generation and they are discarded

The BB84 protocol An eavesdropper doesn’t know what orientation the sender has used and he/she will disturb the measurement in at least some cases, causing errors +45º Vertical base (V) +45º The receiver knows he/she should have received a photon with +45º polarization, but he doesn’t, so he/she knows someone has tried to intercept their communications

Quantum key distribution - BB84 You can try this simulation to understand further how this technology works. You might find the ”introduction” and “challenges” useful to play this simulation.

Quantum key distribution In summary, the steps to quantum key generation and distribution using entangled particles are: a source generates entangled particles/photons pairs the particles in the pair are sent to the sender of the message and the receiver (one to each) both sender and receiver measure the spin of the particles along a randomised axis (so the sender chooses z or x axis for each measured particle randomly, so does the receiver). At this stage they cannot know which axis was used for each measure. both sender and receiver make a note of the spin measured and the axis they used for each measurement now both sender and receiver share publicly the orientations (axes) used for each measurement, but do not share the spin observed (up/down) along that direction. So, the sender only knows his/her measurements and the receiver knows only his/her measurements This and the next two slides are very wordy, so you might want to hide them and discuss these points as you go introduce the activity from the previous slide, or as you show the slides with the measurements of the spin of the particles.

Quantum key distribution because the spins measured along different axes for the same pair are not connected (as entanglement is maintained along the same axis only), the sender and receiver just discard all the spins obtained for particle pairs measured along different axes. to check that their communications are not being intercepted, they now share only few measurements of the spin obtained along the same axis and they check for consistency. Every time the sender gets a spin up, the receiver must obtain a spin down for these pairs. If the sender obtains a spin up and the receiver also obtains a spin up (or both down) for some of the measurements, they know someone must have tried to measure the spins along the way and re-emitted a particle to either the sender or receiver along the same axis, but with an incorrect spin (up for up, or down for down).

Quantum key distribution this is because the eavesdropped cannot know the axes either the sender or receiver used before they shared them publicly, but they cannot not share them publicly until they have received a particle to observe, i.e. the eavesdropper must re-emit a particle with random orientation and random spin, so with enough shared measurements to check they sender and receiver will find enough errors to know the line is not safe this means they know if they are being intercepted even before they have generated a secure key if they do not find any errors, the sender and receiver know they are on a secure line and can use the spin measurements they obtained to generate a secure key (e.g. spin ups for 1 and spin down for 0)

Quantum Technology programme