Quantum Cryptography Christian Schaffner

Slides:



Advertisements
Similar presentations
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Advertisements

CQCT Feb 07 Griffith University 1 Joan Vaccaro Joe Spring Anthony Chefles Quantum Polling HP Labs, Bristol Griffith University Uni of Hertfordshire QUantum.
Christian Schaffner CWI Amsterdam, Netherlands Position-Based Quantum Cryptography: Impossibility and Constructions Seminar Eindhoven, Netherlands Wednesday,
Position-Based Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic Tea, ILLC Tuesday, 14/02/2012.
Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security.
Quantum data locking, enigma machines and entropic uncertainty relations Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro,
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum Public Key Cryptography with Information- Theoretic Security Daniel Gottesman Perimeter Institute.
Public Key Model 8. Cryptography part 2.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Security By Design Scott A. Vanstone V.P. Cryptographic Research Research in Motion Distinguished Professor Emeritus University of Waterloo.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Position-Based Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Advances in Quantum Cryptography Workshop.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Bachelor.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Workshop on Post-Quantum Security Models Paris, France Tuesday,
Lec. 5 : History of Cryptologic Research II
Quantum Homomorphic Encryption
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Amsterdam.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
Christian Schaffner, PhD student NF-årsfest 2005 A A R H U S U N I V E R S I T E T DAIMI – Department of Computer Science BRICS – Basic Research in Computer.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Christian Schaffner ILLC, University of Amsterdam Centrum Wiskunde & Informatica Logic, Language and Computation Monday, 21 September.
Nawaf M Albadia
Christian Schaffner CWI Amsterdam, Netherlands Quantum Cryptography beyond Key Distribution Tropical QKD Waterloo, ON, Canada Wednesday, 16 June 2010.
CSE 311 Foundations of Computing I Lecture 10 Set Theory Autumn 2012 Autumn 2012CSE
Cryptography In the Bounded Quantum-Storage Model
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Cryptography in the Bounded-Quantum-Storage Model Christian Schaffner BRICS, University of Aarhus PhD Defense Friday, April 27 th 2007.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Homomorphic encryption of quantum data
Quantum Cryptography Christian Schaffner ICT OPEN 2017
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Q Jeff Kinne.
Quantum Cryptography Christian Schaffner
Quantum Cryptography Alok.T.J EC 11.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
Quantum Cryptography Scott Roberts CSE /01/2001.
The Security of Quantum Cryptography
Appendix 5: Cryptography p
Presentation transcript:

Quantum Cryptography Christian Schaffner Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica BSc IW visit to ILLC Monday, 2 November 2015

Classical Cryptography 3000 years of fascinating history Until 1970: private communication was the only goal Scytale Enigma

Modern Cryptography is everywhere! is concerned with all settings where people do not trust each other

Secure Encryption Alice Bob Eve k = ? m = 0000 1111 m = “I love you” Alice Eve Bob k = ? k = 0101 1011 k = 0101 1011 Goal: Eve does not learn the message Setting: Alice and Bob share a secret key k

Perfectly Secure Encryption: One-Time Pad 5 m = 0000 1111 c = m © k = 0101 0100 m = c © k = 0000 1111 Alice Eve Bob k = 0101 1011 k = ? Goal: Eve does not learn the message Setting: Alice and Bob share a key k Recipe: It is perfectly secure! x y x © y 1 m = 0000 1111 c = 0101 0100 k = 0101 1011 k = 0101 1011 c = m © k = 0101 0100 c © k = 0000 1111 c © k = m © k © k = m © 0 = m

Problems With One-Time Pad 6 m = 0000 1111 c = m © k = 0101 0100 m = c © k = 0000 1111 Alice Eve Bob k = ? k = 0101 1011 k = 0101 1011 BSc Informatica course: Information & Communication The key has to be as long as the message. The key can only be used once. In practice, other encryption schemes (such as AES) are used which allow to encrypt long messages with short keys. Master of Logic course: Information Theory for encrypting internet traffic Master of Logic course: Modern Cryptography Master of Logic course: Computational Complexity

Quantum Mechanics + basis £ basis Measurements: with prob. 1 yields 1 0/1

Wonderland of Quantum Mechanics

Can We Build Quantum Computers? Possible to build in theory, no fundamental theoretical obstacles have been found yet. Canadian company “D-Wave” claims to have build a quantum computer with 1024 qubits. Did they? 2014: Martinis group “acquired” by Google 2014/15: 135+50 Mio € investment in QuTech centre in Delft 2015: QuSoft center in Amsterdam Martinis group (UCSB) 9 qubits Master of Logic course: Quantum Computing

Quantum Key Distribution (QKD) [Bennett Brassard 84] 10 Alice Bob k = ? k = 0101 1011 k = 0101 1011 Eve Offers a quantum solution to the key-exchange problem Puts the players into the starting position to use symmetric-key cryptography (such as the one-time pad)

Quantum Key Distribution (QKD) [Bennett Brassard 84] 11 Alice Bob Eve technically feasible: no quantum computer required, only quantum communication

Quantum Key Distribution (QKD) [Bennett Brassard 84] 12 Alice Bob Eve technically feasible: no quantum computer required, only quantum communication

Summary One-Time Pad Quantum Key Distribution Master of Logic course: Modern Cryptography BSc Informatica course: Information & Communication Master of Logic course: Quantum Computing Master of Logic course: Information Theory Master of Logic course: Computational Complexity

Perfect Security Alice Bob Eve k = ? Given that c = 0101 0100, 14 m = ? c = m © k = 0101 0100 m = c © k = ? Alice Eve Bob k = ? k = ? k = ? Given that c = 0101 0100, is it possible that m = 0000 0000 ? Yes, if k = 0101 0100. is it possible that m = 1111 1111 ? Yes, if k = 1010 1011. it is possible that m = 0101 0101 ? Yes, if k = 0000 0001 In fact, every m is possible. Hence, the one-time pad is perfectly secure! x y x © y 1