Single Photon Quantum Encryption Rob Grove April 25, 2005
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Telephone Internet Courier In person Bob needs to get a secure message to Alice
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Private Key Private Key Cryptography BobAlice Eve Private key encryption uses permutations and other reversible mathematical operations to encode the message. Private Key Encrypt/Decrypt
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Public Key Cryptography BobAlice Eve Public Key Encrypted Message Public Key Encrypt Private Key Decrypt Public key encryption uses prime multiplication and other very hard to reverse mathematical operations to encode the message.
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions 1.In conventional data transmission every bit has a definite value of 0 or 1. 2.Linearly polarized atomic particles can be used as data bits for quantum data transmission. 3.Qubits can change their state when measured. 4.Linear polarized photons are natural qubits. 5.Qubits are extremely delicate. Quantum bits (Qubits)
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Polarization of Photons
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Wave Polarization Circular Polarization Linear Polarization
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Polarizing Filters Filters can be used to measure photon polarization Polarized at 45 degrees Filters can be used to polarize photons into qubits for data transmission
Background Alice’s Receiving Filters Key 1111 Current Encryption Quantum Mechanics Quantum Encryption LimitationsPredictions Bob’s Values Alice’s Measured Values Encryption Example Bob’s Sending Filters Bob Confirms Correct Filters
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Method Bob Alice 1. Bob generates two random number sequences. Bob’s Filter Alice’s Filter Alice generates one random sequence and uses it to filter Bob’s data. 3. Alice tells Bob her filter sequence and Bob tells her which ones are wrong. Subset of Bob’s Key
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Introduces gross error > 25% Quantum Encryption BobAlice Eve Key
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Shannon’s Secure Cryptography Equation The only way this can happen is if a totally random key of equal length to the message is XOR’d with the message.
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Quantum Encryption Problems Restricted to fiber-optics cable Greatest distance proven is under 62 miles Hardware is expensive Individual photons have not been demonstrated Data throughput is not very high, 1~10 kb / s
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations Predictions Specific Application Encryption Will not be a substitute for public key encryption for most applications Will not directly impact 99% of internet users Will be a useful tool against massive internet attacks on back bone structure Will be a solution for line of sight business encryption
Background Current Encryption Quantum Mechanics Quantum Encryption Limitations PredictionsReferences _6.pdfhttp:// _6.pdf theory.chem.washington.edu/~trstedl/quantum/quantum.htmlhttp://www- theory.chem.washington.edu/~trstedl/quantum/quantum.html pto_demoed_ htmlhttp:// pto_demoed_ html