Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.

Slides:



Advertisements
Similar presentations
Sri Lanka Institute of Information Technology
Advertisements

Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Digital Signatures and Hash Functions. Digital Signatures.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
1 Lecture #10 Public Key Algorithms HAIT Summer 2005 Shimrit Tzur-David.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
1 CIS 5371 Cryptography 9. Data Integrity Techniques.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
8. Data Integrity Techniques
Rachana Y. Patil 1 1.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Chapter 4: Intermediate Protocols
Cryptography, Authentication and Digital Signatures
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Midterm Review Cryptography & Network Security
Chapter 21 Public-Key Cryptography and Message Authentication.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Symmetric-Key Cryptography
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Traditional Symmetric-Key Ciphers
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Lecture 2: Introduction to Cryptography
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Overview of Cryptography & Its Applications
Nawaf M Albadia
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Bit Commitment, Fair Coin Flips, and One-Way Accumulators Matt Ashoff 11/9/2004 Cryptographic Protocols.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
A Light-weight Oblivious Transfer Protocol Based on Channel Noise
Presentation transcript:

Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001

References Ekert, A. “From quantum code-making to quantum code-breaking”, 1997 Brassard, et al. “A Quantum Bit Commitment Scheme Provably Unbreakable by both Parties”, 1993

Outline Classical Cryptography overview Problems with classical cryptography Quantum Algorithms Quantum Bit Commitment Quantum Key Distribution Introduction Conclusions

Classical Cryptography Simple Methods Transposition Arrange the “plaintext” in a special permutation Substitution Replace letters of the “plaintext” with other letters or symbols in a certain way Caesar’s Cipher COLD -> FROG

Classical Cryptography Problem with simple methods Security depends on the secrecy of the entire encrypting/decrypting process Need a way to ensure secrecy even if the encryption process is compromised

Classical Cryptography Key-based Cryptography Private Key Secret key locks and unlocks data Encrypt – E Pri (P) = C Decrypt – D Pri (C) = P Public Key Separate keys to lock and unlock data Encrypt – E Pub (P) = C Decrypt – D Pri (C) = P

Classical Cryptography Problem with private-key encryption Depends entirely on the secrecy of the key Requires two parties who initially share no secret information to exchange a secret key An eavesdropper can passively snoop secret key as it’s being exchanged

Classical Cryptography Problems with Public-key encryption No key distribution problem However, security relies on unproven mathematical assumptions such as the difficulty of factoring large integers Shor has already shown that the assumption wont hold up against quantum computation

What can be done? Private key is vulnerable to classical attacks, Public key is vulnerable to quantum attacks Solution: Augment private key encryption with quantum key distribution

A Slightly Different Problem Before worrying about eavesdroppers, let’s consider at simple bit-commitment scenario: Alice and Bob (who are mutually untrustworthy) wish to play a multiplayer game over a network Each player takes one action per round In order to prevent a player from waiting for the other’s move before deciding, each player commits themselves to an action by first transmitting an encrypted move (hash) Upon receiving the actual move, each player can encrypt it and compare to the previously received hash

Quantum Bit Commitment Why is bit commitment useful? Allows Alice to commit to a certain action without revealing that action to Bob Alice gives Bob a “hint” about what her action will be Later, if Alice wishes to reveal that action to Bob, the hint allows Bob to be certain that Alice has not changed the action

Quantum Bit Commitment Obvious problem with classical bit commitment Problem similar to the public-key encryption problem Hard for Alice to give Bob evidence that will both lock in her action AND prevent Bob for interpreting her action from the hint If we give Bob unlimited computational power (or a quantum computer) he could decrypt the hash and gain an advantage over Alice

Quantum Bit Commitment Solution: We need a hash that is not based on a shared algorithm that Bob could reverse Add a quantum channel in parallel to the classical communication channel Utilize quantum channel for transmission of “hint” to Bob

Quantum Bit Commitment Alice wants to commit a bit v to Bob Alice calls a function commit(v) that uses the quantum channel to transmit a “hint” to Bob Later, Alice calls unveil(v) to reveal v Bob can use his hint to ensure that Alice has not changed v

Quantum Bit Commitment Notation Rectilinear Base {|0>,|1>} = ‘+’ Diagonal Base { (|0>+|1>)/sqrt(2), (|0>-|1>)/sqrt(2) } = ‘X’ Vectors |0> = ‘|’ |1> = ‘-’ (|0>+|1>) = ‘/’ (|0>- |1>) = ‘\’

Quantum Bit Commitment Algorithm commit(v) Bob supplies Alice with a matrix G that generates code words that differ by at least 10εn bits Alice chooses a random n-bit string(r) Alice uses matrix G to generate a codeword(c) such that rc = v Alice announces r to Bob Alice chooses another n-bit random string(b) Alice sends c to Bob on the quantum channel encoded according to: b i =0 -> +0 = |1 = - b i =1 -> x0 = /1 = \

Quantum Bit Commitment Algorithm commit(v) Bob chooses his own random string of bases (b’) Bob uses b’ to measure the incoming values which gives Bob string c’ Bob now has a “quantum hint” of what Alice’s codeword is However, Bob cannot get any information out of the codeword since he doesn’t know what transmission bases Alice used Statistically Bob will only guess 50% of the bases correctly – 50% of the codeword bits are effectively random

Quantum Bit Commitment Algorithm unveil(v) Alice sends c,b,v to Bob Bob calculates a compare-summation on code words c and c’ for all bits in which Bob correctly guessed the transmission basis.  = (b i = b’ i )  (c i xor c’ i ) / (n/2)

Quantum Bit Commitment Algorithm unveil(v) If rc = v (Alice’s original setup) And c is a valid codeword of matrix G And  < 1.4ε Bob accepts v Otherwise Bob rejects v

Quantum Bit Commitment Example: Alice obtains a c = Generates random base: B = {++X+XX+X} Encodes c in base B: { - | \ - / \ - / } Transmits quantum string to Bob

Quantum Bit Commitment Example cont… Bob receives encoded string Chooses own random base and measures the quantum transmission B’ = {X+++X+XX} Obtains result c’ = { * 0 * 1 0 * * 0 } * = random result

Example cont… Alice sends b, c to Bob Bob compares b to b’ b= {++X+XX+X} b’= {X+++X+XX} Bob compares c and c’ for bits corresponding to matches in b an b’ c = { } c’= {*0*10**0} Quantum Bit Commitment

Can Either Player Cheat? Alice In order to fool Bob, would have to alter her codeword so that rc new = ~v However, she also has to ensure that c new is a valid codeword of generating matrix G This means Alice will have to flip at least 10εn bits to reach a new, valid codeword Also, to avoid detection, all Alice’s bit flips would have to be done on bits in which Bob chose a different measurement base than Alice did

Can Either Player Cheat? Alice’s Chances: The Probability that a given base differs: Prob (b != b’) = 0.5 Prob (success) = (0.5) 10εn So for: N = 1000, ε = 1% P(success) = 7.9 *

Can Either Player Cheat? Favorable conditions for Alice If there is no noise on the channel when Alice transmits Bob can attribute some of the differences to noise Alice could afford to incorrectly flip X bits where x must be: 0.7εn > X = 7 bits in our previous example Improves her chances to 1 * Does not help when n is large enough Flipping bases in conjunction with bits can also help

Can Either Player Cheat? Bob Until Alice reveals b, Bob knows nothing about c since c’ is nothing but random data until the bases are known. The information hidden in c’ “comes into being” only when Alice reveals her quantum transmission bases. Since no information exists prior to Alice’s transmission, it’s impossible for Bob to draw information out of c’

Can Either Player Cheat? Bob does an exhaustive key search Restricting Alice’s codeword choices could help Bob Bob finds all possible code words from matrix G that differ by 0.25n bit flips from the measured codeword However code words themselves only differ by 10εn which would produce an large enough set to negate Bob’s efforts

Can Either Player Cheat? Bob uses a non-standard base: Uses base halfway between diagonal and rectilinear Still only gives Bob 75% bit accuracy Also negates Bob’s ability to check Alice’s moves

Conclusions With a significantly large n and a reasonable ε, a cheat-proof Bit commitment algorithm can be implemented Using a Quantum channel allows a sender to “create” information after it has been transmitted Bob’s random data contains no information until Alice announces her transmission bases Will be a useful property for Quantum Key Distribution The “bothersome” properties of quantum mechanics ensure that the algorithm works If measurement did not destroy quantum information, Bob could continue to measure the bits received until he was probabilistically certain of the correct value Likewise if Bob could clone quantum states