Rita Pizzi Department of Information Technology Università degli Studi di Milano.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Networking at Home the Office and Globe
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Security & Encryption Thomas Fenske & Joseph Minter.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Introduction to Data communication
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Cryptography, Authentication and Digital Signatures
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Computer network  A network consists of multiple computers connected to each other to share data and resources.
UNIT -1. DATA COMMUNICATIONS The term telecommunication means communication at a distance. The word data refers to information presented in whatever form.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Presented By: Mathew Hazel John Healy & Ira Nicks.
AS Computing Data transmission. Basic data transmission Baud The rate that the voltage changes is called the Baud. If the voltage changes 10 times every.
Quantum cryptography How could you transmit information safety? Thanks to codes.
FUNDAMENTALS OF NETWORKING
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Antonio Acín
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Lecture 11: Quantum Cryptography Wayne Patterson SYCS 654 Spring 2009.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Storage System Optimization. Introduction Storage Types-DAS/NAS/SAN The purposes of different RAID types. How to calculate the storage size for video.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 1 – Data Communications, Data Networks, and.
Key Wrap Algorithm.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
J. Miranda University of Ottawa 21 November 2003
Networking Devices.
COMPSCI 290.2: Computer Security
QUANTUM CRYPTOGRAPHY.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Brandin L Claar CSE 597E 5 December 2001
Quantum Cryptography Scott Roberts CSE /01/2001.
OSI Model The Seven Layers
Security in Wide Area Networks
Presentation transcript:

Rita Pizzi Department of Information Technology Università degli Studi di Milano

PROTOTYPE OF A QUANTUM CRYPTOGRAPHY SYSTEM FOR THE END USER

QUANTUM INFORMATION The quantum computer does non exist yet But a real world application based on quantum information exists: QUANTUM CRYPTOGRAPHY It allows the secure transmission of data, independent from algorithms and computing power of the attacker It is possible to detect any intrusion immediately Nowadays optical fiber systems exist that reach distances of 100 km Methods to increase distances and usability are underway (quantum repeaters for optical fibers / satellite transmissions)

QUANTUM CRYPTOGRAPHY TODAY Quantum cryptography performances captured the interest of banks, big companies and institutions. Systems already on sale: MagiQ Technologies New York idQuantique Geneve SmartQuantum York QinetiQ UK (defence) Toshiba Corp Tokio National Institute of Standards and Technology (US government agency ) are acquiring this technology

QUANTUM CRYPTOGRAPHY TODAY Today the cost of a system is around $ Less expensive applications are interesting, affordable for the end user: ATM terminals, online internet transactions We developed our prototype to this purpose A compact and cheap system that could be embedded in a smartphone

THE BB84 PROTOCOL (Bennet Brassard 1984) In quantum physics the act of observation modifies in an unpredictable way the observed system Thus any external action in the system will corrupt the flow of information, revealing the intrusion The BB84 protocol is based on the polarization properties of the photons

THE BB84 PROTOCOL (Bennet Brassard 1984) Alice chooses rendomly a sequence of 1 and 0 bits, turns them into photons, applies to each bit one of the possible polarizations, then sends them to Bob. Bob chooses randomly a polarization to examine each of the received photons, turns them into bits and records the results of his observations.

THE BB84 PROTOCOL (Bennet Brassard 1984) Now Bob sends to Alice on a public channel (e.g. Internet) his polarization sequence (but NOT the result of his measures) Alice selects the positions in the sequence that Bob sent correctly and sends them back to Bob on the public channel

THE BB84 PROTOCOL (Bennet Brassard 1984) Both Alice and Bob share now an identical sequence of bits, i.e. they possess a shared key that is definitely secret.

BB84 – THE INTRUSION In this kind of transaction an intrinsic error rate exists, that can be minimized by means of error correction and privacy amplification techniques If an eardropper E interposes to intercept the sequence of bits, for the quantum physics laws he corrupts the sequence and sends back to Bob a sequence with a much higher error rate This reveals immediately the presence of the intruder and the transaction can be stopped without damage

OUR SYSTEM Our system is based on two custom cards: the transmitter and the receiver. TRANSMITTER It is an electronic circuit that drives four high-performances LEDs The LEDS are endowed with polarizing filters and their intensity is suitably attenuated. Random logical signals are generated that turn on the four LEDs in sequence

OUR SYSTEM RECEIVER The receiving circuit must re-establish a sequence of data starting from the received photons. Four high-sensitivity photodiodes turn the photons (passed through four polarizing filters) into electrical signals, then into bits. This is made possible by a logic state analyzer that detects the voltage peaks coming from the photodiodes.

THE FIRMWARE A C-written software drives the whole process on two separated PCs. In the first PC the software, using the BlumBlumShub pseudorandom number generator, generates the sequence of bits and synchronizes it This is acquired by the transmitter through the parallel port.

THE FIRMWARE On the second PC the software reads the signals reconstructed by the logic state analyzer and syncronizes them We also simulated the comparison on public channel between sequences generated by transmitter and receiver At the end of simulation we obtain the secure key.

FUTURE DEVELOPMENTS At the moment our system is a prototype on optical bench In the future it can be adapted to work on optical fibers or directly on ATM terminals. The system performances are improvable with more effective components and with more powerful software algorithms

FUTURE DEVELOPMENTS We are acquiring avalanche photodiodes that will ensure single-photon performances The software random number generator will be substituted by a portable and affordable hardware generator (IdQuantique o custom) Robust algorithms of error correction and privacy amplification will be developed.