Quantum Cryptoanalysis and Quantum Cryptography (An introduction)

Slides:



Advertisements
Similar presentations
Quantum Computing MAS 725 Hartmut Klauck NTU
Advertisements

Quantum Communication, Teleportation, and Maxwell’s Demon
Quantum Mechanics 103 Quantum Implications for Computing.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile Fall 2008.
Quantum Packet Switching A. Yavuz Oruç Department of Electrical and Computer Engineering University of Maryland, College Park.
Lecture 4 - Feynmans thought experiments Things on a very small scale behave like nothing we have direct experience about. Even the experts do not uderstand.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Quantum Computation and Error Correction Ali Soleimani.
Quantum Entanglement David Badger Danah Albaum. Some thoughts on entanglement... “Spooky action at a distance.” -Albert Einstein “It is a problem that.
CSEP 590tv: Quantum Computing
Quantum Computing Joseph Stelmach.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Computing Marek Perkowski Part of Computational Intelligence Course 2007.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
By: Mike Neumiller & Brian Yarbrough
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Gagan Deep Singh GTBIT (IT) August 29,2009.
Quantum Error Correction Jian-Wei Pan Lecture Note 9.
Alice and Bob’s Excellent Adventure
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
In 1887,when Photoelectric Effect was first introduced by Heinrich Hertz, the experiment was not able to be explained using classical principles.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
From the previous discussion on the double slit experiment on electron we found that unlike a particle in classical mechanics we cannot describe the trajectory.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Lecture note 8: Quantum Algorithms
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
PRESENTED BY MIDHUN.T - EC 3 - S 61 TOPIC – QUANTUM TELEPORTATION Presented by - MIDHUN T EC 3, S 6 ROLL NO. 20 Reg no
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Blake Morell Daniel Bowser Trenton Wood. Contents Background Experimental Design & Outcome Implications Future Applications.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Computing by Mathew Ross Jared Davis - Group L -
1 entanglement-quantum teleportation entanglement-quantum teleportation entanglement (what is it?) quantum teleportation (intuitive & mathematical) ‘ quantum.
Nawaf M Albadia
CSEP 590tv: Quantum Computing Dave Bacon July 20, 2005 Today’s Menu n Qubit registers Begin Quantum Algorithms Administrivia Superdense Coding Finish Teleportation.
Introduction to Quantum Computing
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
Main Topics from : A Shortcut Through Time. Supercomputers.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
IPQI-2010-Anu Venugopalan 1 qubits, quantum registers and gates Anu Venugopalan Guru Gobind Singh Indraprastha Univeristy Delhi _______________________________________________.
Our Proposed Technique
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
Quantum Cryptography Quantum Computing
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Teleportation
Quantum Cryptography Alok.T.J EC 11.
Quantum Information with Continuous Variables
A Ridiculously Brief Overview
Double Slit Experiment
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
Quantum Computing Joseph Stelmach.
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Presentation transcript:

Quantum Cryptoanalysis and Quantum Cryptography (An introduction)

Quantum Computation From a physical point of view, a bit is a two-state system. –In a digital computer, a bit is represented by the level of voltage. Quantum mechanics tells us that if a bit can exist in either of two distinguishable states, it can also exist in coherent superpositions of them.

A half-silvered mirror reflects half the light that impinges on it. Now we lower the intensity of the light source, until a single photon is emitted at a time. –A single photon is the smallest unit. It doesn’t split. –The probability that the photon go to detector A is ½. –the probability that the photon go to detector B is also ½. Detector A Detector B Light Source Beam splitter

It does not mean that the photon leave the beam splitter in either horizontal or vertical direction. The photon takes both paths at once!! See the following experiment. If the lengths of the two paths are the same, interference will occur at the 2 nd beam splitter, all the light will go to detector A. Detector A Detector B Light Source Beam splitter mirror

Similarly, we can lower the intensity of the light source until a single photon is emitted at a time. –The probability that the photon go to detector A is 1. –The probability that the photon go to detector B is 0. If one of the paths is blocked, a photon will strike A and B with equal probability. Detector A Detector B Light Source Beam splitter

When the horizontal path is blocked by an photon absorber. –A photon will strike the absorber with probability of ½. –A photon will go the vertical path with probability of ½. –When the photon strike the 2 nd beam splitter. It will go to detector A with probability of ½ (overall: ¼) It will go to detector B with probability of ½ (overall: ¼). The inescapable conclusion is that the photon must, in some sense, have traveled both routes at once. –For if either of the paths is blocked by an absorbing screen, it immediately becomes equally probable that A or B is struck.

–In other words, blocking off either of the paths illuminates B; with both paths open, the photon somehow receives information that prevents it from reaching B. –If we don’t observe the photon, it takes both path simultaneously, and only A can receive the photon. –Once the path after the 1st beam splitter is observed, both A and B are possible to receive the photon. This property of quantum interference applies not only to photons but to all particles and all physical systems. Someone explain this phenomena by “parallel universes”.

Classical Probability –Toss two coins  4 outcomes Odd: TH HT Even: TT HH –Laplace’s rule of insufficient reason P(TT) =P(HH) = P(TH) = P(HT) = ¼. –Baye’s sum rule TH & HT are indistinguishable P(Odd) = P(TH) + P(HT) = ½

Is it like tossing a coin twice? We need a new mathematics to explain this phenomenon. Detector A Detector B Light Source Beam splitter mirror

Probability Amplitude –Probability is determined by a probability amplitude. Replaces Laplace’s rule Probability amplitudes are not necessary positive real number. –Probability is determined by ‘squaring’ the amplitude. –Bayes’s rule  Feynman’s sum rule When an event can occur in several alternative ways, the probability amplitude for the event is the sum of the probability amplitude for each way considered separately. Interference may occur.

If an experiment is performed which is capable of determined whether one or another alternative is actually taken, the probability of the event is the sum of the probability of each alternative. The interference is lost.

Probability amplitude can also be used to explain the double slits phenomenon. Source of the pictures:

Count at detector A –Two reflections (RR) and two transmission(TT), indistinguishable. Count at detector B –RT & TR, indistinguishable. Detector A Detector B Light Source Beam splitter mirror

How to assign the probabilities amplitudes? –Two cases for input. –Two cases for output. –Detection probabilities are equal.

Represent the direction by state –State 0 : vertical –State 1: horizontal After passing through a beam splitter, the state of a photon is a superposition of both 0 and 1.

Just as the photon can be in a coherent superposition of being on the path H and the path V, any quantum bit, or qubit, can be prepared in a superposition of its two logical states 0 and 1. That means a qubit can store both 0 and 1 simultaneously. In general a qubit can be written as a superposition

But note that just as the photon, if measured, will be detected on only one of the two paths, so if the qubit is measured, only one of the two numbers it holds will be detected, at random. The probability of the measured state is proportional to the magnitude of the state.

A classical 3-bit register can store eight different numbers: 000, 001,….., 111. A quantum register composed of three qubits can simultaneously store up to eight numbers in a quantum superposition. It can also be written as (ignoring the normalization constant). Or in deminal notation

In general, L qubits can store up to numbers at once. If a register is prepared in a superposition of many different numbers, we can perform mathematical operations on all of them at once. Quantum logic gate is a device which performs a fixed unitary operation on qubits.

The most common gate is Hadamard gate. –Correspond to the action of a beam splitter. –Prepare a qubit Two Hadamard gates form a Not gate. There are many other quantum logic gates. The computation is reversible. –Output state is entangled with the input state

Quantum Factoring Difficulty of factoring grows rapidly with the size (traditional method) –Take N with L digits. –dividing it by, and check the reminder. –Approximately divisions is required. –Suppose a computer is capable of performing division per second – it take about second to factor a 100 digit number.

Mathematics of factoring –Quantum factoring of an integer N is based on calculating the period of the function Choose a random number a between 0 and N, then raise it to the power x, divide by N and keep the reminder It turns out that for increasing powers of a, the remainders form a repeating sequence with a period r. Once r is known the factors of N are obtained by calculating the greatest common divisor of N and Greatest common divisors can be found effectively by Euclidean algorithm (known since 300BC)

–Example Suppose we want to factor 15. Chose a = 11. Increasing x the function forms a repeating sequence 1, 11, 1, 11, 1, 11…. The period r = 2. Then we take the greatest common divisor of –15 and = 5 –15 and = 3

Quantum computers can find r in time which grows only as quadratic function of number of digits in N. –Consider two quantum registers, each composed of a certain number of qubits. –Take the first registers and place it in a quantum superposition of all the possible integer numbers. Then we perform an arithmetical operation that takes advantage of quantum parallelism.

Computing the function for each number x in the superposition. The values of are placed in the second register so that after the computation the two registers become entangled: Now we perform a measurement on the second register. The measurement yields a randomly selected value for some k.

Due to the periodicity of, the state of the 1 st register right after the measurement is a coherent superposition of all states The state of the first register is subsequently transformed via a unitary operation, referred to as quantum Fourier transform. The first register is then for the final measurement which yields a multiple of 1/r.

From this result r and subsequently factors of N can be easily calculated. An open question has been whether it would ever be practical to build physical devices to perform such computations. Recently, some experimental results have been announced. –The number 15 was successfully factorized by using quantum computing.

Quantum Cryptography Classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages. In quantum mechanics the information is protected by the laws of physics. The Heisenberg uncertainty principle and quantum entanglement can be exploited in a system of secure communication. –Often referred to as quantum cryptography.

There are at least three main types of quantum cryptosystems for the key distribution. A.Cryptosystems with encoding based on two non-commuting observables proposed by S.Wiesner (1970), and by C.H.Bennett and G.Brassard (1984). B.Cryptosystems with encoding built upon quantum entanglement and the Bell theorem proposed by A.K.Ekert (1990). C.Cryptosystems with encoding based on two non-orthogonal state vectors proposed by C.H.Bennett (1992). We will give a brief overview of types A and B

Quantum cryptosystem (A) –The system includes a transmitter and a receiver. –A sender may use the transmitter to send photons in one of four polarizations: 0, 45, 90, 135. –A recipient at the other end uses the receiver to measure the polarization. –According to the laws of quantum mechanics, the receiver can distinguish between rectilinear polarization (0 and 90), or it can quickly be reconfigured to discriminate between diagonal polarizations (45 and 135).

–The sender sends photons with one of the four polarizations which are chosen at random. –For each incoming photon, the receiver chooses at random the type of measurement. Either the rectilinear type or the diagonal type. –The receiver records the results of the measurements (whether the photon passes through the filter), but keeps them secret. –Subsequently the receiver publicly announces the type of measurement (not the results). –The sender tells the receiver which measurements were the correct type.

–Both parties keep all cases in which the receiver measurements were of the correct type. –These results are then translated into bits (1’s and 0’s) and thereby become the key. –An eavesdropper is bound to introduce errors to this transmission He/she cannot reproduce the proton with the same state as quantum mechanics does not allow him/her to acquire sharp values of two non-commuting observables (rectilinear and diagonal). –The two legitimate users can test for eavesdropping by revealing a random subset of the key bits and checking the error rate. –They cannot prevent the eavesdropping, but it can be detected.

Quantum Cryptosystem B –In quantum theory, a combined system can be said to be entangled. –Entangled states were first investigated in the famous paper of Einstein, Podolsky and Rosen (EPR). –The receiver first prepares two photons, or two spin-half particles (spin up or down), jointly in an entangled state. –He store one particle and sends the other to the sender.

–The sender performs one of our special operation on her stored particle For the spin-half particle, the operations are: –Do nothing –Rotating the spin by 180 degree along x,y,or z. For Photon –The operation correspond to polarization rotations. –These operations, although performed only on one particle, affect the joint (entangled) quantum state of the two particle.

–This cannot be verified by measurements on the two particles separately. –The sender than send back the particle to the receiver, whose can measure both of them jointly and determine which of the four operations the sender performed. –Thus the technique effectively doubles the peak capacity of an information channel. M U EPR source 2-bit message in 2-bit message out Time receiversender

–An eavesdropper on this communication would have to detect a particle to read the signal, and retransmit it in order for his presence to remain unknown. –However, the act of detection of one particle of a pair destroys its quantum correlation with the other, and the two parties can easily verify whether eavesdropping has been done.