Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Gagan Deep Singh GTBIT (IT) August 29,2009.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
1 candidate: Vadim Makarov Quantum cryptography and quantum cryptanalysis Defence for the degree doktor ingeniør at the Norwegian University of Science.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Trondheim 2003 NTNU Vadim Makarov Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
Chaos, Communication and Consciousness Module PH19510 Lecture 13 Encryption in the Computer Age.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Optics II – Cozumel December 2004 Quantum key distribution with polarized coherent states Quantum Optics Group Instituto de Física “Gleb Wataghin”
Quantum Cryptography Antonio Acín
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Quantum Key Distribution in the GÉANT network
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
QUANTUM CRYPTOGRAPHY.
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Brandin L Claar CSE 597E 5 December 2001
Quantum Cryptography Scott Roberts CSE /01/2001.
Quantum Technology programme
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Presentation transcript:

Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory Troxel. “Quantum Cryptography in Practice”Quantum Cryptography in Practice

Outline Basics of QKD History of QKD Protocols for QKD BB84 Protocol DARPA / BBN Implementation Other Implementations Pro’s & Con’s Conclusion

Quantum Cryptography Better Name – Quantum Key Distribution (QKD) – It’s NOT a new crypto algorithm! Two physically separated parties can create and share random secret keys. Allows them to verify that the key has not been intercepted.

Basic Idea

History of QKD Stephen Wiesner – early 1970s wrote paper "Conjugate Coding” Paper by Charles Bennett and Gilles Brassard in 1984 is the basis for QKD protocol BB84. Prototype developed in Another QKD protocol was invented independently by Artur Ekert in 1991.

Two Protocols for QKD BB84 (and DARPA Project) – uses polarization of photons to encode the bits of information – relies on “uncertainty” to keep Eve from learning the secret key. Ekert – uses entangled photon states to encode the bits – relies on the fact that the information defining the key only "comes into being" after measurements performed by Alice and Bob.

BB84 Original Paper: Bennett: “Quantum cryptography using any two nonorthogonal states”, Physical Review Letters, Vol. 68, No. 21, 25 May 1992, pp

BB84 Alice transmits a polarized beam in short bursts. The polarization in each burst is randomly modulated to one of four states (horizontal, vertical, left-circular, or right-circular). Bob measures photon polarizations in a random sequence of bases (rectilinear or circular). Bob tells the sender publicly what sequence of bases were used. Alice tells the receiver publicly which bases were correctly chosen. Alice and Bob discard all observations not from these correctly-chosen bases. The observations are interpreted using a binary scheme: left- circular or horizontal is 0, and right-circular or vertical is 1.

BB84 representing the types of photon measurements: + rectilinear O circular representing the polarizations themselves: < left-circular > right-circular | vertical − horizontal Probability that Bob's detector fails to detect the photon at all = 0.5. Reference:

BB84 – No Eavesdropping A  B: | >−<>||−−< Bob randomly decides detector: ++++O+O+OO+O+++++O+O For each measurement, P(failure to detect photon) = 0.5 The results of Bob's measurements are: − >− −<< ||| B  A: types of detectors used and successfully made (but not the measurements themselves): + O+ +OO +++ Alice tells Bob which measurements were of the correct type:.... ( key = ) Bob only makes the same kind of measurement as Alice about half the time. Given that the P(B detector fails) = 0.5, you would expect about 5 out of 20 usable shared digits to remain. In fact, this time there were 4 usable digits generated.

BB84 – With Eavesdropping A  B: − <−<|<−|−< Eavesdropping occurs. To detect eavesdropping: Bob only makes the same kind of measurement as Alice about half the time. Given that the P(B detector fails) = 0.5, you would expect about 5 out of 20 usable shared digits to remain. A  B: reveals 50% (randomly) of the shared digits. B  A: reveals his corresponding check digits. If > 25% of the check digits are wrong, Alice and Bob know that somebody (Eve) was listening to their exchange. NOTE – 20 photons doesn’t provide good guarantees of detection.

DARPA Project

DARPA Project Overview Combined Effort – BBN, Harvard, Boston University DARPA Project Provides “high speed” QKD. Keys are used by a VPN. Tests against eavesdropping attacks

DARPA Project Overview QKD Network – Requires a set of trusted network relays Uses Phase Shifting instead of Polarization Uses a VPN – Uses QKD to generate VPN keys Fully compatible with conventional hosts, routers, firewalls, etc. Quantum Channel also used for timing and framing Eve is very capable – just can’t violate Quantum Physics

QKD Attributes Key Confidentiality Authentication – Not directly provided by QKD – need alternative methods “Sufficiently” Rapid Key Delivery Robustness Distance (and Location) Independence Resistant to Traffic Analysis

DARPA Quantum Network

Randomly selects Phase and Value Randomly chooses Phase Basis Measures Phase & Value Timing and Framing

1’s and 0’s Unbalanced Interferometers Provides different delays Must be “identical at Sender and Receiver

1’s and 0’s Photon follows both paths Long path lags behind short path Travels as two distinct pulses Bob receives Pulses again take long & short paths

1’s and 0’s Waves are Summed Center Peak – Provides the Bases

1’s and 0’s 1’s and 0’s represented by adjusting the relative phases of the two waves (S A L B and L A S B ). This is the Δ value.

1’s and 0’s 1’s and 0’s represented by adjusting the phase Δ value. Encodes 1 or 0 value in either of two randomly selected nonorthogonal bases. 0 = phase shift of 0 (basis 0) or phase shift π/2 (basis 1) 1 = phase shift of π (basis 0) or phase shift 3π/2 (basis 1) Randomly applies one of four phase shifts to encode four different (basis, value) pairs If Δ = 0 or π, then compatible bases If Δ = π/2 or 3π/2, then incompatible bases Heavily dependent on correct timing – Alice provides

QKD Protocols Sifting –Unmatched Bases; “stray” or “lost” qubits Error Correction – Noise & Eaves- dropping detected – Uses “cascade” protocol – Reveals information to Eve so need to track this. Privacy Amplification – reduces Eve’s knowledge obtained by previous EC Authentication – Continuous to avoid man-in-middle attacks – not required to initiate using shared keys – Not well explained in Paper.

IPSEC “Continually” uses new keys obtained from QKD Used in IPSEC Phase 2 hash to update AES keys about once / minute Can support: –Rapid reseeding, or –One-time pad Supports multiple tunnels, each uniquely configured

Key Lifetime and Key Size QKD Extensions Can support: -Rapid reseeding, or -One-time pad

Issues Time outs (due to insufficient bits available) Noise affects on key establishment. This can’t be detected by IKE.

Other Implementations Two Other Implementations of Quantum Key Distribution: –D Stucki, N Gisin, O Guinnard, G Ribordy, and H Zbinden. Quantum key distribution over 67 km with a plug&play system. New Journal of Physics 4 (2002) 41.1–41.8. Quantum key distribution over 67 km with a plug&play system –ID Quantine: MagiQ. Whitepaper: r.pdf r.pdf Satellite-based QKD: pdf pdf

Pros & Cons Nearly Impossible to steal Detect if someone is listening “Secure” Distance Limitations Availability –vulnerable to DOS –keys can’t keep up with plaintext

Questions? Back to Richard!