Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
Quantum Computing MAS 725 Hartmut Klauck NTU
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Quantum Cryptography Marshall Roth March 9, 2007.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Gagan Deep Singh GTBIT (IT) August 29,2009.
Alice and Bob’s Excellent Adventure
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
CHAPTER 15: Quantum cryptography
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Quantum Information Science The size of transistors decreases by half every eighteen months Intel’s 20 and 45 nm transistor Laser MRI Information Theory.
CSE 311 Foundations of Computing I Lecture 10 Set Theory Autumn 2012 Autumn 2012CSE
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
Quantum Cryptography Antonio Acín
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Lecture 11: Quantum Cryptography Wayne Patterson SYCS 654 Spring 2009.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Le avventure di Alice, Bob & Eve nel mondo dei quanti Stefano Mancini Dipartimento di Fisica Università di Camerino.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Encryption and Integrity
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Brandin L Claar CSE 597E 5 December 2001
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Presentation transcript:

Quantum Key Establishment Wade Trappe

Talk Overview Quantum Demo Quantum Key Establishment

Demo

Basics of Photon Polarity and Quantum A photon’s polarization can be represented by a unit vector in two- dimensional complex vector space. Let, be a ON basis for, then a photon’s polarity can be expressed as: Polaroid filters perform a measurement with respect to a vector (state). Suppose is measured against the state then the probability that the outcome is in state is Example: measured by gives the state with probability. One of the basic principles of quantum mechanics is that measurement forces the state of the photon into the result of the measurement.

Bennett-Brassard Quantum Key Distribution Alice chooses two bases B 1 and B 2, denoted: Alice will encode a 0 with the first element of a basis, and a 1 with the second element. Procedure: –Alice randomly generates bits, and randomly chooses a basis for each bit. and polarizes a photon according to that bit’s value and which basis is chosen. –The photons are sent to Bob over an optical channel. –Bob randomly chooses a basis for each bit and measures the state using the basis states. –Bob calls Alice via a classical channel and tells her what bases he used. –They keep the bits that used the same bases and discard the other bits.

Example Alice wants to send: 0,1,1,1,0,0,1,0. She chooses B 1, B 2, B 1, B 1, B 2, B 2, B 1, B 2 and sends: Bob chooses the bases B 2, B 2, B 2, B 1, B 2, B 1, B 1, B 2. The 2nd, 4th, 5th, 7th, and 8th match, giving the measurements: These correspond to the bits 1,1,0,1,0. Alice and Bob share their list of bases used, and then may use as a key for future communication over a classical channel.

Why Quantum Crypto is Cool An eavesdropper, Eve, must perform measurements in order to observe the photon transmissions between Alice and Bob. If Eve uses the same basis as Alice, then the photons will pass onto Bob unaltered, while if she uses a different basis the photons will be altered. When Bob uses the correct basis, there will be a 25% chance that he will measure the wrong value. Example: Alice sends to Bob. –If Eve uses B1, then the photon passes through correctly. –If Eve uses B2, then the photon is equally likely to be and. –When Bob uses the correct basis, half of the measurements will be correct, while half will be incorrect. If Alice and Bob test their data for discrepancies over a conventional channel (e.g. vial parity checks), they will detect any eavesdropping.