Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Economic Stimulus : Valorization of Single Photon Detectors and Quantum Key Distribution Systems Hugo Zbinden Group of Applied Physics (GAP), UNIGE NCCR.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Spanish Cryptography Days, November 2011, Murcia, Spain Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Device-Independent.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Security of practical quantum cryptography with heralded single photon sources Mikołaj Lasota 1, Rafał Demkowicz-Dobrzański 2, Konrad Banaszek 2 1 Nicolaus.
Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
1 candidate: Vadim Makarov Quantum cryptography and quantum cryptanalysis Defence for the degree doktor ingeniør at the Norwegian University of Science.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Trondheim 2003 NTNU Vadim Makarov Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
CIS 325: Data Communications1 Chapter Seventeen Network Security.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Antonio Acín
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
INCS 741: Cryptography Overview and Basic Concepts.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Quantum Key Distribution in the GÉANT network
J. Miranda University of Ottawa 21 November 2003
QUANTUM CRYPTOGRAPHY.
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006

2 Outline  Quantum physics and information technology  The limits of classical cryptography  The principles of quantum cryptography  Practical systems and applications  Future directions

3 Moore’s law and quantum physics

4 Classical and Quantum physics Classical physics  …  Describes the macroscopic world  Deterministic  Intuitive Quantum physics  …  Description of the microscopic world  Probabilistic  Central role of the observer  Not very intuitive Quantum physics  Novel information processing possibilities  Quantum Information Theory (QIT)

5 Generating random numbers with quantum physics  High bit rate 4 or 16 Mbits/s  Continuous monitoring  Main OS’s supported

6 Outline  Quantum physics and information technology  The limits of classical cryptography  The principles of quantum cryptography  Practical systems and applications  Future directions

7 Introduction: Classical Cryptography  Secret Key Cryptography  Public Key Cryptography Alice Bob Different keys  Key exchange solved Vulnerabilities!!!

8 Security of public key cryptography Encryption Decryption (with key) Selected Key Length

9 Vulnerabilities of public key cryptography Selected Key Length

10 Vulnerabilities of public key cryptography & Theoretical progress Selected Key Length

11 Where does Quantum Cryptography fit in?  Message Secret Key Scrambled Message  Secret Key Alice Bob Quantum Cryptography is a key distribution technique! Quantum Key Distribution is a better name!!! Secret key exchange by quantum cryptography

12 Outline  Quantum physics and information technology  The limits of classical cryptography  The principles of quantum cryptography  Practical systems and applications  Future directions

13 Physical implementation of a data channel Fragile ! "0" "1" Classical communicationQuantum communication Security guaranteed by the laws of quantum physics

14 Quantum Cryptography: rules of the game 1.Details of the protocole publicly known 2.Goal: to produce a secret key or nothing  « Eve cannot do better than cutting the line » Alice and Bob: to estimate Eve’s information on key I AE small: Produce a key I AE large:   k’ Eve Quantum channel Classical channel QUANTUM KEY DISTRIBUTION

15 Polarization of Photons  Direction of oscillation of the electric field associated to a lightwave  Polarization states  What can we do with it ? 50 %

16 Irreversibility of Measurements Incoming photon polarized at 90  Incoming photon polarized at 45  50 % Rotation of polarizer 50 %

17 Quantum communications  Transmitting information with a single-photon  Use a quantum property to carry information Liner States = "0" = |0> = "1" = |1>

18 Eavesdropping (1)  A single-photon constitutes an elementary quantum system It cannot be split  Semi-transparent mirror 50%

19 Eavesdropping (2)  Communication interception  Use quantum physics to force spy to introduce errors in the communication |0> Eve BobAlice

20 Quantum Cryptography Protocole  BB84  A better name: Quantum Key Distribution

21 Eavesdropping (3) 50% Bob Eve Ok Error Alice

22 Key Distillation (ideal case) AliceBob Quantum channel Qubits Transmission Basis Reconciliation QBER estimate QBER = 0 : no eavesdropping > 0 : eavesdropping Sifted key Reveals rather than prevents eavesdropping quantum key distribution A better name: quantum key distribution

23 Key Distillation (realistic case) AliceBob Quantum channel Public channel (losses) Qubits Transmission Basis Reconciliation QBER estimate Error correction Privacy amplification Sifted key Raw key Key

24 Information curves Shannon Information QBER I AE Opt. indiv. attack Secret key rate

25 The Principles of Quantum Cryptography: Summary Quantum Cryptography Conventional Symmetric Cryptography Point-to-point optical link Future-proof key exchange with security guaranteed by the laws of physics

26 Outline  Quantum physics and information technology  The limits of classical cryptography  The principles of quantum cryptography  Practical systems and applications  Future directions

27 Building a Quantum Key Distibution System  Necessary components  “System approach” Channel Single-Photon Source Single-Photon Detector

28 Polarization Coding  Typical system

29 Interferences

30 Interferometer  Classical interference

31 Phase encoding  Quantum optics: single-photon Base 1:  A = 0;  Base 2:  A =  Basis choice:  B = 0;  Compatible: Alice  A  D i Bob D i   A (  A -  B = n  ) Bases Incompatible:Alice and Bob ?? (  A -  B =  )

32 Phase encoding (2)  Stability of such system ???  In practice 10 km 10 km ± /10 (100 nm) +

33 Auto-compensated set-up  Time multiplexing

34 Practical requirements  Distance limitation < 100 km Current range is sufficient for a vast majority of MAN/SAN applications  Point-to-point dark fiber Amplifiers Opto-electro-opto conversion  perturbation of the quantum state of the photon Distance Signal, Noise p noise p signal

35 Link Encryptors with QKD  Network Appliance Point-to-point link encryption Layer 2 device Network protocole independent Compatible with higher layer encryption Specifications - Encryption: AES (128, 192, 256 bits) - Key rate as high as 100 keys / s - Distance < 100 km (60 miles) - Pair of dark fiber Target Applications MAN or SAN encryption

36 « Swiss Quantum » Pilot Site

37 Outline  Quantum physics and information technology  The limits of classical cryptography  The principles of quantum cryptography  Practical systems and applications  Future directions

38 Extending the key distribution distance  Chaining links  Better components  Free space links to low-earth-orbit (LEO) satellites  Quantum relays and repeaters Tokyo Geneva

39 Compatibility with conventional optical networks  Optical switching  WDM Links

40 Thank you very much for your attention id Quantique SA Chemin de la Marbrerie, 3 CH-1227 Carouge Switzerland Ph: Fax:

41 Optical Taps  Optical taps are cheap and simple to use « Tapping a fibre-optic cable without being detected, and making sense of the information you collect isn’t trivial but has certainly been done by intelligence agencies for the past seven or eight years. These days, it is within the range of a well funded attacker, probably even a really curious college physics major with access to a fibre optics lab and lots of time on his hands. » John Pescatore, former NSA Analyst The submarine « USS Carter » worth $4.1 bn will be able to tap and eavesdrop undersea cables.

42 Key use  The key produced by a quantum cryptography system is used with conventional symmetric encryption algorithms One-time pad  « unconditional security » Other symmetric algorithms (AES, Tripe-DES, etc.)  enhanced security by frequent key change  Why is Quantum Cryptography not used to transmit data? 1)Quantum Cryptography cannot guarantee that one particular bit will actually be received. With a random key, it is not a problem. With data, it is. 2)Quantum Cryptography does not prevent eavesdropping, but reveals it a posteriori. Sending a key and verifying its secrecy allows to prevent information leakage.

43 Device Authentication Initial key Quantum Cryptography Session n: key material Authentication keyEncryption/decryption key Session n Authentication key n Authentication key refreshed