CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Bob can sign a message using a digital signature generation algorithm
Gagan Deep Singh GTBIT (IT) August 29,2009.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Cyrtographic Security Identity-based Encryption 1Dennis Kafura – CS5204 – Operating Systems.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Cryptography and Network Security (CS435) Part Eight (Key Management)
CHAPTER 15: Quantum cryptography
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Introduction to Quantum Key Distribution
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Key Management Network Systems Security Mort Anvari.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Antonio Acín
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Encryption and Integrity
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
Quantum Cryptography Quantum Computing
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Presentation transcript:

CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography

CS555Topic 252 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings:

Identity Based Encryption Idea: Allow an arbitrary string (e.g., an address) to be used as a public key Benefit: Easy to obtain authentic public key. Catch: Needs a Trusted Third Party (TTP). TTP publishes public parameters, and has master secret. A user can register with the TTP to obtain private key corresponding to an identity string. A sender can encrypt a message with public parameter and receiver’s identity string. Exist constructions using parings (elliptic curves). TTP generates everyone’s private key, and can decrypt anything. CS555Topic 253

CS555Topic 254 Quantum Cryptography –based on a survey by Hoi-Kwong Lo html html –And on

CS555Topic 255 Quantum Mechanics & Cryptography Quantum communication –Protect communication using principles of physics Quantum computing –Can efficiently solve some problems that are computationally infeasible for traditional computers to solve e.g., Shor’s efficient algorithm for factoring –Exploits quantum superposition and entanglement N bits in classical computers can only be in one of 2 N states N qubits can be in an arbitrary superposition of up to 2 N different states simultaneously –When measured, it collapse into one state with some probability Quantum computers can compute with all states simultaneously

CS555Topic 256 Properties of Quantum Information Wave function collapse –A superposition when measured by an observer, collapse to a specific state –Measurement of a signal changes it A quantum state is described as a vector –e.g., a photon has a quantum state, –quantum cryptography often uses photons in 1 of 4 polarizations (in degrees): 0, 45, 90, 135 Basis01  (rectilinear)   (diagonal)  Encoding 0 and 1 under two basis

CS555Topic 257 Properties of Quantum Information No way to distinguish which of  a photon is Quantum “no-cloning” theorem: an unknown quantum state cannot be cloned. Measurement generally disturbs a quantum state –one can set up a rectilinear measurement or a diagonal measurement a rectilinear measurement disturbs the states of those diagonal photons having 45/135 Effect of measuring Basis     or    or  

CS555Topic 258 Quantum Key Agreement Requires two channels –one quantum channel (subject to adversary and/or noises) –one public channel (authentic, unjammable, subject to eavesdropping) Protocol does not work without such a channel

CS555Topic 259 The Protocol [Bennet & Brassard’84] 1.Alice sends to Bob a sequence of photons, each of which is chosen randomly and independently to be in one of the four polarizations –Alice knows their states 2.For each photon, Bob randomly chooses either the rectilinear based or the diagonal base to measure Bob record the bases he used as well as the measurement

CS555Topic 2510 The Protocol [Bennet & Brassard’84] 3.Bob publicly announces his basis of measurements 4.Alice publicly tells Bob which measurement basis are correct and which ones are not For the photons that Bob uses the correct measurement, Alice and Bob share the same results See the following page for an example:

CS555Topic 2511 The Protocol [Bennet & Brassard’84] 5.Alice and Bob reveal certain measurement results to see whether they agree to detect whether an adversary is involved or the channel is too noisy Why attackers fail –Any measurement & resending will disturb the results with 50% probability

Additional Steps Information reconciliation –Figure out which bits are different between Alice and Bob –Conducted over a public channel Privacy amplification –Reducing/eliminating Eve’s partial knowledge of a key CS555Topic 2512

CS555Topic 2513 Coming Attractions … Review of some HW/Quiz questions