Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Transmisi Optik Pertemuan 10 Matakuliah: H0122 / Dasar Telekomunikasi Tahun: 2008.
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
Data Communications and Networking
Note Bandwidth utilization is the wise use of available bandwidth to achieve specific goals. Efficiency can be achieved by multiplexing; privacy and.
An Optical Receiver for Interplanetary Communications Jeremy Bailey.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Lecture: 10 New Trends in Optical Networks
Transmission Basics ITNW 1325, Chapter III. OSI Physical Layer.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Economic Stimulus : Valorization of Single Photon Detectors and Quantum Key Distribution Systems Hugo Zbinden Group of Applied Physics (GAP), UNIGE NCCR.
1 Lecture 5b Fiber-Optics in Digital Communication Systems & Electronic Interfaces 1. Introduction 2.Geometric Optics 3.Classification of Optical Fibers.
Quantum Encryption. Conventional Private Key Encryption: Substitution: First known use was by Caesar to communicate to generals during war Improved by.
EE 230: Optical Fiber Communication Lecture 10 From the movie Warriors of the Net Light Sources and Transmitters.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Introduction to Fiber Optics
Chapter 7 Photonic Transmission Systems (Digital & Analog)
331: STUDY DATA COMMUNICATIONS AND NETWORKS.  1. Discuss computer networks (5 hrs)  2. Discuss data communications (15 hrs)
CS4600/5600 Biometrics and Cryptography UTC/CSE
Fundamental of Fiber Optics. Optical Fiber Total Internal Reflection.
Digital to analogue conversion. 1 DIGITAL-TO-ANALOG CONVERSION Digital-to-analog conversion is the process of changing one of the characteristics (A,
Gagan Deep Singh GTBIT (IT) August 29,2009.
By: Dr. N. Ioannides (Feb 2010)CT0004NI - L.06 – Fibre Optic Communications - pp 1/28 Fibre Optic Communications Saroj Regmi Lecture 06 CT0004NI Principles.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
1 Business Telecommunications Data and Computer Communications Chapter 3 Data Transmission.
Sistem Jaringan dan Komunikasi Data #2. Data vs Information  What is data?  What is information?  What are differences between data and information?
Dense Wavelength Division Multiplexing (DWDM) Technology
CS 453 Computer Networks Lecture 4 Layer 1 – Physical Layer.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Data and Computer Communications
Security of practical quantum cryptography with heralded single photon sources Mikołaj Lasota 1, Rafał Demkowicz-Dobrzański 2, Konrad Banaszek 2 1 Nicolaus.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Mahmoud Al-Saba – Majed Al-Bishi –
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
Optical Fiber Communications
1 candidate: Vadim Makarov Quantum cryptography and quantum cryptanalysis Defence for the degree doktor ingeniør at the Norwegian University of Science.
Chapter 10 Optical Communication Systems
Copyright 1998, S.D. Personick. All Rights Reserved. Telecommunications Networking I Lectures 12&13 Fiber Optics.
Trondheim 2003 NTNU Vadim Makarov Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Optical telecommunication networks.  Introduction  Multiplexing  Optical Multiplexing  Components of Optical Mux  Application  Advantages  Shortcomings/Future.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
Nawaf M Albadia
Quantum Information Science The size of transistors decreases by half every eighteen months Intel’s 20 and 45 nm transistor Laser MRI Information Theory.
Presented by, P.Anitha(08MCS204)
1 Mid term – Laser Swarm Optical Receiving Payload Single-Photon Detection -Photonmultiplier tube -Single Photon Avalanche Diode(SPAD) Wavelength Estimation.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Entanglement-based Free Space Quantum Cryptography in Daylight Antía Lamas-Linares, Matthew P. Peloso, Ilja Gerhardt, Caleb Ho and Christian Kurtsiefer.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Quantum Key Distribution in the GÉANT network
by: Mrs. Aboli N. Moharil Assistant Professor, EXTC dept.
COMPSCI 290.2: Computer Security
QUANTUM CRYPTOGRAPHY.
Quantum Information with Continuous Variables
Introduction to Fiber Optics
Back End & LO PDR April 2002 FIBRE-OPTIC LINKS -An Introduction Ralph Spencer Jodrell Bank Observatory University of Manchester UK --The use of.
Fiber Optic Transmission
Metrological characterisation of single-photon avalanche diodes
Presentation transcript:

Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve an average of ~ 0.1 photons per pulse. This ensures that the probability of two photons appearing in the same bit period is less than 0.5%, thus reducing the probability of a photon splitting eavesdropper attack. The ~ 850 nm single-mode fibre is fusion spliced to the transmission medium, which is standard telecommunications ~ 1.3/1.55  m optical fibre. Two polarising beam splitters (PBS’s) and two SPAD’s are used to filter and detect the two non-orthogonal polarisation states. In the point-to-point application, we have achieved net bit rates greater than 100,000 bits -1 for a 4.2 km transmission range and a corresponding quantum bit error rate (QBER) of 2.1%, which, to the best of our knowledge, are the highest key exchange rates demonstrated in an optical fiber system (IEEE Journal of Quantum Electronics - July 2004). Quantum key distribution (QKD) allows two parties to share a verifiably secure encryption key, guaranteed by the laws of quantum mechanics. In these experiments we have used an implementation of the B92 protocol. The binary values ‘0’ and ‘1’ are encoded using two non- orthogonal linear polarisation states at a separation angle of 45º. In this case the Heisenberg’s Uncertainty Principle states that the measurement of one property necessarily affects the other. Hence, if the communication channel is tapped by an eavesdropper, changes in the photon states will create an increase in the error that the transmitter (Alice) and receiver (Bob) can quantify when they perform a comparison of a sub-set of the transmitted bits Fibre distance (km) Raw Bit rate (Hz) = 850nm = 1550nm Comparison of Bit Rates of Heriot-Watt’s = 850 nm and = 1550 nm QKD Systems The transmitter and receiver (Alice and Bob) use single mode fibre at ~ 850nm, which allows them to take full advantage of the mature technology of silicon single photon avalanche diodes (SPAD’s), in conjunction with standard telecommunication fibre. This system is capable of significantly higher key-exchange rates than systems using InGaAs/InP single-photon detectors at e.g. ~ 1550nm Distance (km) QBER (%) 100MHz [5ns] 1GHz [0.5ns] ,000 10, ,000 1,000, Distance (km) 100MHz [5ns] 1GHz [0.5ns] Net bit rate (s -1 ) DFB: Distributed feedback laserSPC: Fibre based polarisation controllerAPD: Avalanche photodiode VCSEL: Vertical-cavity surface-emitting laser PBS: Polarising Beam SplitterSPAD: Single photon avalanche diodeWDM: Wavelength division multiplexor “?”: Ambiguous measurement Point-to-Point Link at 100MHz and 1 GHz Clock Frequencies IEEE Journal of Quantum Electronics - July 2004 POINT-TO-POINT LINK Quantum key distribution can also be used in a multi-user system, such as a QKD system with more than one receiver (multiple Bobs). The multiple receivers can be linked to the transmitter via a 1  N splitter. When each photon reaches the splitter, because it constitutes an indivisible particle, the outcome at any one of the ports will be random. This is essential to make possible that each Bob is provided with a unique and verifiably secure key. We have demonstrated a gigahertz-clocked multi-user application comprising a 1  32 splitter and standard telecom fibre designed for single-mode operation at ~ 1.3/1.55  m Distance (km) QBER (%) Multi-user Point-to-point MULTI-USER INTRODUCTION Currently we are investigating methods of improving the performance of the point-to point QKD system at a clock frequency of 2 GHz. Perkin Elmer commercially available SPAD’s were used for the 100 MHz and 1 GHz results shown above. However these SPAD’s have a jitter of ~ 350 ps which is insufficient to resolve a data stream at a clock rate of 2 GHz. Shallow-junction SPAD’s developed by Professor Sergio Cova’s group at the Politecnico di Milano in Italy are currently being investigated as detectors in this system. The initial results shown opposite exhibit a significant improvement in QBER when the Shallow-junction SPAD is implemented in the QKD system. The shallow junction SPAD has a temporal response of ~ 35 ps, an order of magnitude less than the Perkin Elmer commercially available device. Splitter 1x32 Alice 1 Bob 2 Bob 4 ~850nm fibre Fusion splice Bob 32 Bob 1 Bob 3 ~850nm fibre ~1/3/1.55  m fibre DEVELOPMENT OF 2GHZ SYSTEM As the clock frequency of the QKD system is increased the QBER becomes higher as a direct consequence of the temporal response of the single photon detector. This graph illustrates this at a fixed fibre length of 4km for both the Perkin Elmer device and the developmental shallow- junction SPAD.