Quantum Cryptography http://www.dcs.warwick.ac.uk/~esvbb Nick Papanikolaou Third Year CSE Student npapanikolaou@iee.org http://www.dcs.warwick.ac.uk/~esvbb.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Matrices in Real Life
Quantum Cryptography Post Tenebras Lux!
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Cryptography encryption authentication digital signatures
RSA.
1 Pretty Good Privacy (PGP) Security for Electronic .
Public Key Cryptosystem
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Block Cipher Modes of Operation and Stream Ciphers
Codes, Ciphers, and Cryptography Quantum Cryptography.
Name Convolutional codes Tomashevich Victor. Name- 2 - Introduction Convolutional codes map information to code bits sequentially by convolving a sequence.
Public Key Cryptography INFSCI 1075: Network Security – Spring 2013 Amir Masoumzadeh.
25 seconds left…...
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Complexity ©D.Moshkovitz Cryptography Where Complexity Finally Comes In Handy…
Off-the-Record Communication, or, Why Not To Use PGP
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
FNI 1H Quantum Mechanics 1 Quantum Mechanics I don't like it, and I'm sorry I ever had anything to do with it. -- Erwin Schrodinger talking about Quantum.
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
INCS 741: Cryptography Overview and Basic Concepts.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
QUANTUM CRYPTOGRAPHY.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Brandin L Claar CSE 597E 5 December 2001
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
Presentation transcript:

Quantum Cryptography http://www.dcs.warwick.ac.uk/~esvbb Nick Papanikolaou Third Year CSE Student npapanikolaou@iee.org http://www.dcs.warwick.ac.uk/~esvbb

Introduction Quantum cryptography is the single most successful application of Quantum Computing/Information Theory. For the first time in history, we can use the forces of nature to implement perfectly secure cryptosystems. Quantum cryptography has been tried experimentally: it works!

State of the Art Classical Cryptography relies heavily on the complexity of factoring integers. Quantum Computers can use Shor’s Algorithm to efficiently break today’s cryptosystems. We need a new kind of cryptography! Breaking current cryptosystems!

Today’s Talk Basic Ideas in Cryptography Ideas from the Quantum World Quantum Key Distribution (QKD) BB84 without eavesdropping BB84 with eavesdropping Working Prototypes Research here at Warwick Conclusion

Basic Ideas in Cryptography Cryptography: “the coding and decoding of secret messages.” [Merriam-Webster] Cryptography < κρυπτός + γραφή. The basic idea is to modify a message so as to make it unintelligible to anyone but the intended recipient. For message (plaintext) M, e(M, K) encryption - ciphertext d[e(M, K), K] = M decryption Terminology must be introduced

Keys and Key Distribution K is called the key. The key is known only to sender and receiver: it is secret. Anyone who knows the key can decrypt the message. Key distribution is the problem of exchanging the key between sender and receiver.

Perfect Secrecy and the OTP There exist perfect cryptosystems. Example: One-Time Pad (OTP) The problem of distributing the keys in the first place remains. One-time pad: two people, two books, each page used once then discarded.

Enter QKD … QC = QKD + OTP QKD: Quantum Key Distribution Using quantum effects, we can distribute keys in perfect secrecy! The Result: The Perfect Cryptosystem, QC = QKD + OTP

Ideas from the Quantum World Measurement Observing, or measuring, a quantum system will alter its state. Example: the Qubit When observed, the state of a qubit will collapse to either a=0 or b=0.

Photons Physical qubits Any subatomic particle can be used to represent a qubit, e.g. an electron. A photon is a convenient choice. A photon is an electromagnetic wave.

Polarization A photon has a property called polarization, which is the plane in which the electric field oscillates. We can use photons of different polarizations to represent quantum states:

Polarizers and Bases A device called a polarizer allows us to place a photon in a particular polarization. A Pockels Cell can be used too. The polarization basis is the mapping we decide to use for a particular state. Rectilinear: Diagonal:

Measuring Photons A calcite crystal can be used to recover the bits encoded into a stream of photons. CaCO3 DIAGONAL axis

Uncertainty Principle What if the crystal has the wrong orientation? ??? 50% chance of getting right answer. CaCO3 RECTILINEAR axis

Alan J. Learner, Quantum Cryptographer Meet Alice and Bob We have to prevent Eve from eavesdropping on communications between Alice and Bob. Alan J. Learner, Quantum Cryptographer Alice Bob Eve

Quantum Key Distribution Quantum Key Distribution exploits the effects discussed in order to thwart eavesdropping. If an eavesdropper uses the wrong polarization basis to measure the channel, the result of the measurement will be random.

QKD Protocols A protocol is a set of rules governing the exchange of messages over a channel. A security protocol is a special protocol designed to ensure security properties are met during communications. There are three main security protocols for QKD: BB84, B92, and Entanglement-Based QKD. We will only discuss BB84 here.

BB84 … BB84 was the first security protocol implementing Quantum Key Distribution. It uses the idea of photon polarization. The key consists of bits that will be transmitted as photons. Each bit is encoded with a random polarization basis!

BB84 with no eavesdropping Alice is going to send Bob a key. She begins with a random sequence of bits. Bits are encoded with a random basis, and then sent to Bob: Bit 1 Basis + × Photon

BB84 with no eavesdropping (2) Bob receives the photons and must decode them using a random basis. Some of his measurements are correct. Photon Basis? + × Bit? 1

BB84 with no eavesdropping (3) Alice and Bob talk on the telephone: Alice chooses a subset of the bits (the test bits) and reveals which basis she used to encode them to Bob. Bob tells Alice which basis he used to decode the same bits. Where the same basis was used, Alice tells Bob what bits he ought to have got.

Comparing measurements Alice’s Bit 1 Alice’s Basis + × Photon Bob’s Basis Bob’s Bit The test bits allow Alice and Bob to test whether the channel is secure. Test bits

The Trick As long as no errors and/or eavesdropping have occurred, the test bits should agree. Alice and Bob have now made sure that the channel is secure. The test bits are removed. Alice tells Bob the basis she used for the other bits, and they both have a common set of bits: the final key!

Getting the Final Key Final Key = 01 1 + × Photon Test bits discarded Alice’s Bit 1 Alice’s Basis + × Photon Bob’s Basis Bob’s Bit Test bits discarded Final Key = 01

In the presence of eavesdropping If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bob’s measurements. In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect measurement: Eve’s measurements are bound to affect the states of the photons.

In the presence of eavesdropping (2) As Eve intercepts Alice’s photons, she has to measure them with a random basis and send new photons to Bob. The photon states cannot be cloned (non-cloneability). Eve’s presence is always detected: measuring a quantum system irreparably alters its state.

Working Prototypes Quantum cryptography has been tried experimentally over fibre-optic cables and, more recently, open air (23km). Left: The first prototype implementation of quantum cryptography (IBM, 1989) Photons emitted from green LED, Pockels cells polarize the light, and calcites for detection Say more about open-air crypto, over 23km (Qinetiq)

Research at Warwick RN and NP are working on Specification and Verification of Quantum Protocols. Specifying a system formally removes ambiguities from descriptions. Verification allows us to prove that a protocol is indeed secure and operates correctly under certain input conditions.

Conclusion Quantum cryptography is a major achievement in security engineering. As it gets implemented, it will allow perfectly secure bank transactions, secret discussions for government officials, and well-guarded trade secrets for industry!