Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.

Slides:



Advertisements
Similar presentations
Relations, Functions, and Matrices Mathematical Structures for Computer Science Chapter 4 Copyright © 2006 W.H. Freeman & Co.MSCS SlidesThe Mighty Mod.
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Math for Liberal Studies.  Problems can occur when data is transmitted from one place to another  The two main problems are  transmission errors: the.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CSE331: Introduction to Networks and Security Lecture 20 Fall 2002.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Chapter 12 Cryptography (slides edited by Erin Chambers)
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
By Nicholas Moradi CST 300L Fall In 1979 Quantum Cryptography was established by Gilles Brassard For security reasons the key had to be unable to.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Security in Computing Chapter 12, Cryptography Explained Part 6
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Introduction to Quantum Key Distribution
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
CRYPTOGRAPHY. WHAT IS PUBLIC-KEY ENCRYPTION? Encryption is the key to information security The main idea- by using only public information, a sender can.
Nawaf M Albadia
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Antonio Acín
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Our Proposed Technique
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 11: Quantum Cryptography Wayne Patterson SYCS 654 Spring 2009.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Problem Set 1: Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Chapter 10 Error Detection And Correction
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Public Key Cryptography
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
Presentation transcript:

Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1

This set of overheads corresponds to section 12.4 in the book The overheads for Chapter 12 roughly track the topics in the chapter Keep this in mind though: On some topics I simply go over the book’s material On other topics I expand on the book’s material in a significant way You are responsible not just for what’s in the book, but also what’s in the overheads that’s not in the book 2

Quantum Cryptography What the book is describing appears to be a protocol named BB84. It was developed by Charles Bennett and Gilles Brassard in The information in this set of overheads is essentially a summary of the article on quantum key distribution in Wikipedia. I found that explanation easier to adapt than the book’s. 3

Recall that a method of secure distribution of symmetric keys is necessary. RSA will eventually succumb or become unwieldy due to advances in hardware or software. BB84 has characteristics that would make it a desirable alternative. Not all of the practical implementation kinks have been worked out yet. 4

Building Blocks for BB84 For the purposes of discussion you have a Sender, a Receiver, and an Eavesdropper. You have a quantum communication channel. For example, this may consist of a fiber optic line and a photon gun that can release one polarized photon at a time. You also have an open (not necessarily even encrypted) communication channel such as the Internet. 5

About the Channels Ultimately, the information that needs to be secure (secret) will be transmitted over the quantum channel. It will be possible to “talk about” the quantum transmission over the open channel. An Eavesdropper is part of the discussion because for both channels it’s assumed that eavesdropping or other attacks might occur. 6

There are two critical points: It will be possible to tell whether eavesdropping has occurred on the quantum channel. In that case you can discard what has been sent and immediately start over so that a compromised key is never used. 7

No System is Perfect A denial of service attack on such a system would be possible. All that would be necessary is continuous eavesdropping. This system is still subject to this question: How do you know the person on the other end of the line is really the person you think you’re talking to? 8

Technical Background The scheme depends on 2 bases each with 2 pairs of states. Let one basis be known as X with states 0 and 1—notation: X(0, 1). Let the other basis be Y(0, 1). The scheme also depends on two filters, X and Y. 9

Filter X allows you to generate one of the two states X(0, 1). Filter X also allows you to correctly read a bit that was sent using filter X. Filter Y is analogous. 10

This is a critical element of the scheme: If you use filter X on states Y(0, 1) the result will be a random 0 or 1—tranformed to X filtering rather than Y filtering. Likewise for filter Y. Once the wrong filter has been applied on reading there are no do-overs. 11

Having once read with the wrong filter, you can’t recover the original X or Y basis and determine the correct state. You’re stuck with random garbage. It is important to the scheme that you can read X with Y or Y with X and some result comes out. It’s not a situation where “no output” tells you that the wrong filter was used. 12

All of these little considerations are necessary to thwart the wicked desires of an eavesdropper. 13

The Process The process goes in rounds. 1. Quantum Transmission from sender to receiver. 2. Broadcast message from sender to receiver. 3. Broadcast message from receiver to sender. 4. On average it will turn out that half of the quantum bits will be wasted, so more than one round will be needed to successfully send a complete secure message. 14

The Quantum Transmission The sender prepares bit string. The sender transmits the bits, randomly encoding them using either filter X or filter Y, i.e., either as one of X(0, 1) or one of Y(0, 1). 15

The Quantum Reception The receiver doesn’t know the filters that were used to send the message. On reception the receiver randomly chooses filter X or filter Y to decode each bit. On average half of the receiver’s filter choices will be wrong. Half of the received message will have to be thrown out. 16

The Broadcast Messages The sender sends the receiver a list, in order, of the filters used to encode each bit, respectively. This allows the receiver to determine which bits were correctly read. The rest can be thrown out. 17

The receiver also transmits to the sender the filters used on reception. This way the sender knows which bits were successfully read and which were not. With this information the sender can prepare what still needs to be sent in the next quantum transmission round. 18

What about Eavesdropping? In theory, an eavesdropper would have half a chance of randomly picking the same correct filter as the intended receiver for any intercepted bit. This would put approximately a quarter of the message at risk. However, it’s possible to tell if eavesdropping has occurred. 19

At the end of all the transmissions there will be n bits successfully transmitted. At this point, the sender transmits q% of the correct message in the clear. This q% has to be a reasonably small subset of the total so that the whole message isn’t compromised. 20

The receiver compares that q% in the clear with the corresponding bits in the decoded quantum transmission. If there is a significant difference between the two, that can’t be the result of random error. 21

The conclusion you reach is that someone has eavesdropped and the message or key that was being sent has been compromised. You need to throw it out and try again. Presumably if the quantum channel is eavesdropped compromised, in order to try again you would have to have another channel that you would try again on. 22

How This Works with Photons It seemed easiest to explain this with the pseudo-mathematical notation for the bases and states, X(0, 1) and Y(0, 1). This can be implemented using polarized photons. One basis would be X(horizontal, vertical). Another would be Y(upper-left  lower-right, lower-left  upper right). 23

You arbitrarily assign the value 0 to H, UL-LR and 1 to V, LL-UR, for example. The hardware to do this kind of thing is “almost there”. Fiber optics and polarizing photon guns and receptors exist. Test systems have been created, but they are limited in distance and reliability. 24

Test Topics Ch. 1, Basics, 44 overheads, 6.5%, (3/50) Ch. 2, Simple Cryptography, 130 overheads, 19.1%, (10/50) Ch. 12, part 1, Hard Problems, 54 overheads, 7.9%, (4, 50) Ch. 12, part 2, Math for Cryptography, 118 overheads, 17.3%, (9/50) Ch. 12, part 3, Fermat’s Little Theorem, 95 overheads, 13.9%, (7/50) 25

Ch. 12, part 4, Euler’s Theorem and RSA, 122 overheads, 17.9%, (9/50) Ch. 12, part 5, Merkle-Hellman, 44 overheads, 6.5%, (3,50) Ch. 12, part 6, DES and AES, 48 overheads, 7%, (3, 50) Ch. 12, part 7, Quantum Cryptography, 27 overheads, 4%, (2/50) Total: 682 overheads The reality will be fewer than 50 questions 26

The End 27