Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Network Security – Part 2 V.T. Raja, Ph.D., Oregon State University.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
CHAPTER 15: Quantum cryptography
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
Chaos, Communication and Consciousness Module PH19510 Lecture 13 Encryption in the Computer Age.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Antonio Acín
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Lecture 11: Quantum Cryptography Wayne Patterson SYCS 654 Spring 2009.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Le avventure di Alice, Bob & Eve nel mondo dei quanti Stefano Mancini Dipartimento di Fisica Università di Camerino.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
QUANTUM CRYPTOGRAPHY.
Quantum Cryptography Quantum Computing
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Brandin L Claar CSE 597E 5 December 2001
Lecture 14: Blocking and Catching Photons Background
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Quantum Cryptography Quantum Computing
Presentation transcript:

Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE

Introduction Light waves are propagated as discrete particles known as photons. Light waves are propagated as discrete particles known as photons. Polarization of the light is carried by the direction of the angular momentum, or spin of the photons. Polarization of the light is carried by the direction of the angular momentum, or spin of the photons.

Polarized photons Polarization can be modeled as a linear combination of basis vectors vertical (  ) and horizontal (  ) Polarization can be modeled as a linear combination of basis vectors vertical (  ) and horizontal (  ) A quantum state of a photon is described as a vector quantum cryptography often uses photons in 1 of 4 polarizations (in degrees): 0, 45, 90, 135   ψ b a

Properties of Quantum Information Heisenberg Uncertainty Principle (HUP) If there is a particle, such as an electron, moving through space, it is impossibly to measure both its position and momentum precisely.

A polarization filter A polarization filter is a material that allows only light of a specified polarizatio direction to pass. A polarization filter is a material that allows only light of a specified polarizatio direction to pass. A photon will either pass or not pass through a polorization filter, but if it emerges it will be aligned with the filter regardless of its initial state. There are no partial photons. A photon will either pass or not pass through a polorization filter, but if it emerges it will be aligned with the filter regardless of its initial state. There are no partial photons.

Polarization by a Filter Unpolarized light Vertical aligned filter Vertically polarized light Filter tilted at angle q Unpolarized light enters a vertically aligned filter, some light is absorbed and the remainder is polarized in the vertical direction. A second filter tilted at some angle q absorbs some of the polarized light and transmits the rest, giving it a new polarization.

Polarization by a Filter Unpolarized light Vertical aligned filter Vertically polarized light Filter tilted at angle q If the first one is the generator from Alice, a vertical polarized light is generated. There is a certain probability that the photon will pass through the second filter. The probability depends on the angle q. The angle increases from 0 to 90 degree, and the probability decreases from 1 to 0. When q is 45 degree, the probability is precisely 50%.

Polarization by a Filter Transmitting light polarization and measurements determine the polarization of the outgoing light. TransmittingMeasurementOutgoing Alice transmits 1 (+45 degree) Bob Measures with -45 degree filter Photos are always blocked Bob Measures with 90 degree filter 45% photons blocked 45% photons pass Bob transmit 0 (0 degree) Bob Measures with -45 degree filter 45% photons blocked 45% photons pass Bob Measures with 90 degree filter Photos are always blocked Perpendicular  blocked; Otherwise  some pass

More examples        

Quantum Cryptography

Better Name – Quantum Key Distribution (QKD) – It’s NOT a new crypto algorithm! Better Name – Quantum Key Distribution (QKD) – It’s NOT a new crypto algorithm! Two physically separated parties can create and share random secret keys. Two physically separated parties can create and share random secret keys. Allows them to verify that the key has not been intercepted. Allows them to verify that the key has not been intercepted.

Quantum Key Distribution Requires two channels one quantum channel (subject to adversary and/or noises) one public channel (authentic, unjammable, subject to eavesdropping)

BB84 QKD protocol uses polarization of photons to encode the bits of information – relies on “uncertainty” to keep Eve from learning the secret key. uses polarization of photons to encode the bits of information – relies on “uncertainty” to keep Eve from learning the secret key. Bennett: “Quantum cryptography using any two nonorthogonal states”, Physical Review Letters, Vol. 68, No. 21, 25 May 1992, pp Bennett: “Quantum cryptography using any two nonorthogonal states”, Physical Review Letters, Vol. 68, No. 21, 25 May 1992, pp Charles H. Bennett an IBM Fellow at IBM Research Gilles Brassard Canada Research Chair in Quantum Information processing

Properties of Quantum Information Quantum “no-cloning” theorem: an unknown quantum state cannot be cloned. Measurement generally disturbs a quantum state one can set up a rectilinear measurement or a circular (diagonal) measurement a circular (diagonal) measurement disturbs the states of those diagonal photons having 0/90

Properties of Quantum Information

BB84 Alice transmits short bursts. The polarization in each burst is randomly modulated to one of four states (horizontal, vertical, left-circular, or right-circular). Alice transmits short bursts. The polarization in each burst is randomly modulated to one of four states (horizontal, vertical, left-circular, or right-circular). Bob measures photon polarizations in a random sequence of bases (rectilinear or diagonal). Bob measures photon polarizations in a random sequence of bases (rectilinear or diagonal). Bob tells the sender publicly what sequence of bases were used. Bob tells the sender publicly what sequence of bases were used. Alice tells the receiver publicly which bases were correctly chosen. Alice tells the receiver publicly which bases were correctly chosen. Alice and Bob discard all observations not from these correctly-chosen bases. Alice and Bob discard all observations not from these correctly-chosen bases. The observations are interpreted using a binary scheme: left-circular or horizontal is 0, and right- circular or vertical is 1. The observations are interpreted using a binary scheme: left-circular or horizontal is 0, and right- circular or vertical is 1.

BB84 representing the types of photon measurements: representing the types of photon measurements: + rectilinear O circular representing the polarizations themselves: representing the polarizations themselves: < left-circular > right-circular | vertical − horizontal Probability that Bob's detector fails to detect the photon at all = 0.5. Probability that Bob's detector fails to detect the photon at all = 0.5. Reference:

BB84 – No Eavesdropping A  B: | >−<>||−− >−<>||−−< Bob randomly decides detector: Bob randomly decides detector: ++++O+O+OO+O+++++O+O ++++O+O+OO+O+++++O+O For each measurement, P(failure to detect photon) = 0.5 For each measurement, P(failure to detect photon) = 0.5 The results of Bob's measurements are: The results of Bob's measurements are: − >− − − −<< ||| B  A: types of detectors used and successfully made (but not the measurements themselves): B  A: types of detectors used and successfully made (but not the measurements themselves): + O+ +OO O+ +OO +++ Alice tells Bob which measurements were of the correct type: Alice tells Bob which measurements were of the correct type: − − < | ( key = ) − − < | ( key = ) Bob only makes the same kind of measurement as Alice about half the time. Given that the P(B detector fails) = 0.5, you would expect about 5 out of 20 usable shared digits to remain. In fact, this time there were 4 usable digits generated. Bob only makes the same kind of measurement as Alice about half the time. Given that the P(B detector fails) = 0.5, you would expect about 5 out of 20 usable shared digits to remain. In fact, this time there were 4 usable digits generated.

BB84 – With Eavesdropping A  B: − − <−<|<−|−< Eavesdropping occurs. Eavesdropping occurs. To detect eavesdropping: Bob only makes the same kind of measurement as Alice about half the time. Given that the P(B detector fails) = 0.5, you would expect about 5 out of 20 usable shared digits to remain. Bob only makes the same kind of measurement as Alice about half the time. Given that the P(B detector fails) = 0.5, you would expect about 5 out of 20 usable shared digits to remain. A  B: reveals 50% (randomly) of the shared digits. A  B: reveals 50% (randomly) of the shared digits. B  A: reveals his corresponding check digits. B  A: reveals his corresponding check digits. If > 25% of the check digits are wrong, Alice and Bob know that somebody (Eve) was listening to their exchange. If > 25% of the check digits are wrong, Alice and Bob know that somebody (Eve) was listening to their exchange. NOTE – 20 photons doesn’t provide good guarantees of detection. NOTE – 20 photons doesn’t provide good guarantees of detection.

DARPA Quantum Network

Pros & Cons Nearly Impossible to steal Nearly Impossible to steal Detect if someone is listening Detect if someone is listening “Secure” “Secure” Distance Limitations Distance Limitations Availability Availability vulnerable to DOS vulnerable to DOS keys can’t keep up with plaintext keys can’t keep up with plaintext

Quantum cryptology

Key distribution Alice and Bob first agree on two representations for ones and zeroes Alice and Bob first agree on two representations for ones and zeroes One for each basis used, { ,  } and { ,  }. One for each basis used, { ,  } and { ,  }. This agreement can be done in public This agreement can be done in public Define 1 =  0 =  1 =  0 =  Define 1 =  0 =  1 =  0 = 

Key distribution - BB84 1. Alice sends a sequence of photons to Bob. Each photon in a state with polarization corresponding to 1 or 0, but with randomly chosen basis. 2. Bob measures the state of the photons he receives, with each state measured with respect to randomly chosen basis. 3. Alice and Bob communicates via an open channel. For each photon, they reveal which basis was used for encoding and decoding respectively. All photons which has been encoded and decoded with the same basis are kept, while all those where the basis don't agree are discarded.

Eavesdropping Eve has to randomly select basis for her measurement Eve has to randomly select basis for her measurement Her basis will be wrong in 50% of the time. Her basis will be wrong in 50% of the time. Whatever basis Eve chose she will measure 1 or 0 Whatever basis Eve chose she will measure 1 or 0 When Eve picks the wrong basis, there is 50% chance that she'll measure the right value of the bit When Eve picks the wrong basis, there is 50% chance that she'll measure the right value of the bit E.g. Alice sends a photon with state corresponding to 1 in the { ,  } basis. Eve picks the { ,  } basis for her measurement which this time happens to give a 1 as result, which is correct. E.g. Alice sends a photon with state corresponding to 1 in the { ,  } basis. Eve picks the { ,  } basis for her measurement which this time happens to give a 1 as result, which is correct.

Eavesdropping Alice’s basis Alice’s bit Alice’s photon Eve’s basis Correct Eve’s photon Eve’s bit Correct {,}{,}{,}{,}1 {,}{,}{,}{,}Yes1Yes { ,  } No1Yes 0No 0 {,}{,}{,}{,}Yes0Yes No1No 0Yes 1 {,}{,}{,}{,}No1Yes 0No Yes1Yes 0 {,}{,}{,}{,}No1No 0Yes yes0Yes

Eves problem Eve has to re-send all the photons to Bob Eve has to re-send all the photons to Bob Will introduce an error, since Eve don't know the correct basis used by Alice Will introduce an error, since Eve don't know the correct basis used by Alice Bob will detect an increased error rate Bob will detect an increased error rate Still possible for Eve to eavesdrop just a few photons, and hope that this will not increase the error to an alarming rate. If so, Eve would have at least partial knowledge of the key. Still possible for Eve to eavesdrop just a few photons, and hope that this will not increase the error to an alarming rate. If so, Eve would have at least partial knowledge of the key.

Detecting eavesdropping When Alice and Bob need to test for eavesdropping When Alice and Bob need to test for eavesdropping By randomly selecting a number of bits from the key and compute its error rate By randomly selecting a number of bits from the key and compute its error rate Error rate < E max  assume no eavesdropping Error rate < E max  assume no eavesdropping Error rate > E max  assume eavesdropping (or the channel is unexpectedly noisy) Alice and Bob should then discard the whole key and start over Error rate > E max  assume eavesdropping (or the channel is unexpectedly noisy) Alice and Bob should then discard the whole key and start over

Noise Noise might introduce errors Noise might introduce errors A detector might detect a photon even though there are no photons A detector might detect a photon even though there are no photons Solution: Solution: send the photons according to a time schedule. send the photons according to a time schedule. then Bob knows when to expect a photon, and can discard those that doesn't fit into the scheme's time window. then Bob knows when to expect a photon, and can discard those that doesn't fit into the scheme's time window. There also has to be some kind of error correction in the over all process. There also has to be some kind of error correction in the over all process.

Error correction Suggested by Hoi-Kwong Lo. (Shortened version) Suggested by Hoi-Kwong Lo. (Shortened version) 1. Alice and Bob agree on a random permutation of the bits in the key 2. They split the key into blocks of length k 3. Compare the parity of each block. If they compute the same parity, the block is considered correct. If their parity is different, they look for the erroneous bit, using a binary search in the block. Alice and Bob discard the last bit of each block whose parity has been announced 4. This is repeated with different permutations and block size, until Alice and Bob fail to find any disagreement in many subsequent comparisons

Privacy amplification Eve might have partial knowledge of the key. Eve might have partial knowledge of the key. Transform the key into a shorter but secure key Transform the key into a shorter but secure key Suppose there are n bits in the key and Eve has knowledge of m bits. Suppose there are n bits in the key and Eve has knowledge of m bits. Randomly chose a hash function where h(x): {0,1\} n  {0,1\} n-m-s Randomly chose a hash function where h(x): {0,1\} n  {0,1\} n-m-s Reduces Eve's knowledge of the key to 2 –s / ln2 bits Reduces Eve's knowledge of the key to 2 –s / ln2 bits

Encryption Key of same size as the plaintext Key of same size as the plaintext Used as a one-time-pad Used as a one-time-pad Ensures the crypto text to be absolutely unbreakable Ensures the crypto text to be absolutely unbreakable

What to come Theory for quantum cryptography already well developed Theory for quantum cryptography already well developed Problems: Problems: quantum cryptography machine vulnerable to noise quantum cryptography machine vulnerable to noise photons cannot travel long distances without being absorbed photons cannot travel long distances without being absorbed

Summary The ability to detect eavesdropping ensures secure exchange of the key The ability to detect eavesdropping ensures secure exchange of the key The use of one-time-pads ensures security The use of one-time-pads ensures security Equipment can only be used over short distances Equipment can only be used over short distances Equipment is complex and expensive Equipment is complex and expensive