Quantum Cryptography Post Tenebras Lux!

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

1 Decoy State Quantum Key Distribution (QKD) Hoi-Kwong Lo Center for Quantum Information and Quantum Control Dept. of Electrical & Comp. Engineering (ECE);
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Economic Stimulus : Valorization of Single Photon Detectors and Quantum Key Distribution Systems Hugo Zbinden Group of Applied Physics (GAP), UNIGE NCCR.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Completed/planned activities of AGH in VD-A Miroslaw Kantor, Marcin Niemiec Department of Telecommunications AGH University of Science and Technology VD-A.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
Security of practical quantum cryptography with heralded single photon sources Mikołaj Lasota 1, Rafał Demkowicz-Dobrzański 2, Konrad Banaszek 2 1 Nicolaus.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
1 candidate: Vadim Makarov Quantum cryptography and quantum cryptanalysis Defence for the degree doktor ingeniør at the Norwegian University of Science.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Trondheim 2003 NTNU Vadim Makarov Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Copyright © 2006 Keio University Applications of an Entangled Quantum Internet Conference on Future Internet Technologies Seoul, Korea June 20, 2008 Rodney.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Nawaf M Albadia
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Antonio Acín
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Entanglement-based Free Space Quantum Cryptography in Daylight Antía Lamas-Linares, Matthew P. Peloso, Ilja Gerhardt, Caleb Ho and Christian Kurtsiefer.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
QUANTUM CRYPTOGRAPHY.
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

Quantum Cryptography Post Tenebras Lux! Grégoire Ribordy Changer Logo  A Quantum Leap for Cryptography Logo en bas ?

Outline Introduction: Cryptography Quantum Information Processing Quantum cryptography protocole Practical system Applications and outlook

Cryptography Eve Bob Alice Key transmission Document Document Secure communication Bob Key Key Decryption Encryption Alice Key transmission Logo en bas: sans slogan; slogan à droite Key generation

Secret key cryptography Encryption and decryption key identical Problem: Key exchange The longer the key, the higher the security One-time pad

Public key cryptography Encryption key  Decryption key (public) (private) One way function Key distribution problem solved? Caution: vulnerable Mathematical progress: Security is based on mathematical assumptions Technological progress: Computers become more powerful 13  31 = 403

Computational complexity Complexity of a computer program… P(n) = n + n2 + n3+…+nk E(n) = exp (n) = n + n2 + n3 + n4 … + n In cryptography

Another look at Moore’s Law Trend of computer chip development  hit a « quantum wall » Potential of quantum physics not yet exploited in industrial applications

Quantum Physics and Cryptography Public key cryptography cracking Eve Document Document Secure communication Bob Key Key Decryption Encryption Alice Key transmission Logo en bas: sans slogan; slogan à droite Key generation

Quantum Random Number Generator Physical randomness source Commercially available Applications Cryptography Numerical simulations Statistics Concurrence: logiciel QRNG (actuellement – 2e gén – application: SSL – contact avec fabriquant cartes crypto)

Quantum Physics and Cryptography Public key cryptography cracking Eve Document Document Secure communication Bob Key Key Decryption Encryption Alice Key transmission Logo en bas: sans slogan; slogan à droite Key generation

Classical vs quantum communications Communication System Secure channel over dedicated optical fiber Absolute security guaranteed by the laws of quantum physics "0" "1" Fragile ! Mentionner Heisenberg Limitation de la distance

Quantum communications Transmitting information with a single-photon Light Polarization Linear States = "0" = "1"

Eavesdropping (1) A single-photon constitutes an elementary quantum system It cannot be split Semi-transparent mirror 50%

Eavesdropping (2) Communication interception Use quantum physics to force spy to introduce errors in the communication Alice Bob "0" "0" Eve

Polarization measurement Using polarizing filters to measure polarization states and and probabilistic modification But and ? Heisenberg’s Uncertainty Relations = "0" = "0" Base 1 Base 2 = "1" = "1"

Quantum Cryptography Protocole BB84 A better name: Quantum Key Distribution

Key Distillation (ideal case) Transmission Qubits Alice Bob Quantum channel Sifted key Reconciliation Basis QBER estimate 0 : no eavesdropping Reveals rather than prevents eavesdropping A better name: quantum key distribution QBER = > 0 : eavesdropping

Key Distillation (realistic case) Transmission Qubits Alice Bob Quantum channel (losses) Raw key Public channel Reconciliation Basis Sifted key QBER estimate correction Error amplification Privacy Key Key

Implementing the quantum channel Necessary components Channel Single-Photon Source Single-Photon Detector

Quantum Cryptography System Collaboration: id Quantique – UniGe Pilot tests in 2003

Field tests Optical fibers Distance: 67 km Genève – Lausanne

Deployment Computer network A Computer network B Optical Fiber (classical channel) Optical Fiber (quantum channel) QKD Hardware QKD Hardware Traffic Network A to B Encrypted traffic Encryption Main features Encryption Transparent High-bit rate (1 Gbit/s) Remote monitoring Automated key management Classical channel Decryption Encrypted traffic Traffic Network B to A Quantum channel Key exchange

Applications Advantages Constraints Automated key management Long term security Constraints Optical fiber Distance < 100 km High-security applications in a metropolitan area network Financial sector, e-government Storage, disaster recovery

Extending the distance Secure relays Improved components Photon counting detectors Photonic crystal fibers: 0.2 dB/km  0.02 dB/km Quantum repeater Free-space links to satellites

Quantum Repeater Quantum Teleportation Rudimentary quantum repeater Quantum version of a fax Recently at Unige: teleportation of a photon over 2km Rudimentary quantum repeater 01100111010101000110010

Free-space QKD Satellites = secure relay Experiments over horizontal links 23.4 km in the German Alps Tokyo Genève

Post Tenebras Lux?

Thank you for your attention id Quantique SA Chemin de la Marbrerie, 3 CH-1227 Carouge / Geneva Switzerland Ph: +41 22 301 83 71 Fax: +41 22 301 83 79 info@idquantique.com www.idquantique.com