SlideShare a Scribd company logo
Applications of Quantum Cryptography – QKD CS551/851 CR yptography A pplications B istro Mike McNett  6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory Troxel.  “ Quantum Cryptography in Practice ”
Outline Basics of QKD History of QKD Protocols for QKD BB84 Protocol DARPA / BBN Implementation Other Implementations Pro’s & Con’s Conclusion
Quantum Cryptography Better Name –  Quantum Key Distribution  (QKD) – It’s NOT a new crypto algorithm! Two physically separated parties can create and share random secret keys.  Allows them to verify that the key has not been intercepted.
Basic Idea
History of QKD Stephen Wiesner – early 1970s wrote paper "Conjugate Coding” Paper by Charles Bennett and Gilles Brassard in 1984 is the basis for QKD protocol BB84. Prototype developed in 1991. Another QKD protocol was invented independently by Artur Ekert in 1991.
Two Protocols for QKD BB84 (and DARPA Project) – uses polarization of photons to encode the bits of information –  relies on “ uncertainty ” to keep Eve from learning the secret key.  Ekert – uses  entangled  photon states to encode the bits – relies on the fact that the information defining the key only "comes into being" after measurements performed by Alice and Bob.
BB84 Original Paper:  Bennett: “ Quantum cryptography using any two nonorthogonal states ”, Physical Review Letters, Vol. 68, No. 21, 25 May 1992, pp 3121-3124
BB84 Alice transmits a polarized beam in short bursts. The polarization in each burst is randomly modulated to one of four states (horizontal, vertical, left-circular, or right-circular). Bob measures photon polarizations in a random sequence of bases (rectilinear or circular).  Bob tells the sender publicly what sequence of bases were used.  Alice tells the receiver publicly which bases were correctly chosen.  Alice and Bob discard all observations not from these correctly-chosen bases.  The observations are interpreted using a binary scheme:  left-circular or horizontal is 0 , and  right-circular or vertical is 1 .
BB84 representing the types of photon measurements: + rectilinear  O circular  representing the polarizations themselves: < left-circular > right-circular | vertical −  horizontal Probability that Bob's detector fails to detect the photon at all = 0.5. Reference:  http://monet.mercersburg.edu/henle/bb84/demo.php
BB84 – No Eavesdropping A    B: |< − − −< < −−< >>−<> | |−−<   Bob randomly decides detector:  ++ + +O+O + O O +O+++ + +O+O For each measurement, P(failure to detect photon) = 0.5  The results of Bob's measurements are:      −   >−  − < <   || |   B    A:  types of detectors used and successfully made (but not the measurements themselves):      +  O+  + O O   ++ +   Alice tells Bob  which measurements were of the correct type:     .  . .   .   ( key =  0 0 0 1) Bob only makes the same kind of measurement as Alice about half the time. Given that the P(B detector fails) = 0.5, you would expect about 5 out of 20 usable shared digits to remain. In fact, this time there were 4 usable digits generated.
BB84 – With Eavesdropping A    B:   <|<−>−<<|<><−<|<−|−< Eavesdropping occurs. To detect eavesdropping: Bob only makes the same kind of measurement as Alice about half the time. Given that the P(B detector fails) = 0.5, you would expect about 5 out of 20 usable  shared digits  to remain.  A    B :  reveals 50% (randomly) of the shared digits. B    A : reveals his corresponding check digits. If > 25%  of the check digits are wrong, Alice and Bob know that somebody (Eve) was listening to their exchange. NOTE – 20 photons doesn’t provide good guarantees of detection.
DARPA Project
DARPA Project Overview Combined Effort – BBN, Harvard, Boston University DARPA Project Provides “high speed” QKD.  Keys are used by a VPN. Tests against eavesdropping attacks
DARPA Project Overview QKD Network – Requires a set of trusted network relays Uses Phase Shifting instead of Polarization Uses a VPN – Uses QKD to generate VPN keys Fully compatible with conventional hosts, routers, firewalls, etc. Quantum Channel also used for timing and framing Eve is very capable – just can’t violate Quantum Physics
QKD Attributes Key Confidentiality Authentication – Not directly provided by QKD – need alternative methods “Sufficiently” Rapid Key Delivery  Robustness Distance (and Location) Independence Resistant to Traffic Analysis
DARPA Quantum Network
Randomly selects Phase and Value Randomly chooses Phase Basis Measures Phase & Value Timing and Framing
1’s and 0’s Unbalanced Interferometers Provides different delays Must be “identical at Sender and Receiver
1’s and 0’s Photon follows both paths Long path lags behind short path Travels as two distinct pulses Bob receives  Pulses again take long & short paths
1’s and 0’s Waves are Summed Center Peak – Provides the Bases
1’s and 0’s 1’s and 0’s represented by adjusting the relative phases of the two waves (S A L B  and L A S B ).  This is the  Δ  value.
1’s and 0’s 1’s and 0’s represented by adjusting the phase  Δ  value. Encodes 1 or 0 value in either of two randomly selected nonorthogonal bases.  0 = phase shift of 0 (basis 0)  or  phase shift  π /2 (basis 1) 1 =  phase shift of  π  (basis 0)  or  phase shift 3 π /2 (basis 1) Randomly applies one of four phase shifts to encode four different (basis, value) pairs If  Δ  = 0 or  π , then compatible bases If  Δ  =  π /2 or 3 π /2 , then incompatible bases Heavily dependent on correct timing – Alice provides
QKD Protocols Sifting  –Unmatched Bases; “stray” or “lost” qubits Error Correction  – Noise & Eaves-dropping detected – Uses “cascade” protocol – Reveals information to Eve so need to track this. Privacy Amplification  – reduces Eve’s knowledge obtained by previous EC Authentication  – Continuous to avoid man-in-middle attacks – not required  to initiate using shared keys – Not  well explained in Paper.
IPSEC “Continually” uses new keys obtained from QKD Used in IPSEC Phase 2 hash to update AES keys about once / minute Can support: Rapid reseeding, or One-time pad Supports multiple tunnels, each uniquely configured
Key Lifetime and Key Size QKD Extensions Can support: Rapid reseeding, or One-time pad
Issues Time outs (due to insufficient bits available) Noise affects on key establishment.  This can’t be detected by IKE.
Other Implementations Two Other Implementations of Quantum Key Distribution: D Stucki, N Gisin, O Guinnard, G Ribordy, and H Zbinden.  Quantum key distribution over 67 km with a  plug&play  system .  New Journal of Physics  4 (2002) 41.1–41.8. ID Quantine:  http:// www.idquantique.com/files/introduction.pdf MagiQ. Whitepaper:  http://www.magiqtech.com/registration/MagiQWhitePaper.pdf Satellite-based QKD:  http://ej.iop.org/links/q68/BKUvFWVrm756,uxc76lU,Q/nj2182.pdf
Pros & Cons Nearly Impossible to steal Detect if someone is listening “Secure” Distance Limitations  Availability vulnerable to DOS keys can’t keep up with plaintext
Questions? Back to Richard!

More Related Content

PDF
Quantum Cryptography - Seminar report
PDF
Quantum Cryptography and Possible Attacks-slide
PPTX
Quantum Cryptography
PPTX
Cryptopresentationfinal
PPTX
Quantam cryptogrphy ppt (1)
PPT
quantum cryptography
PPTX
Quantum
PDF
The security of quantum cryptography
Quantum Cryptography - Seminar report
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography
Cryptopresentationfinal
Quantam cryptogrphy ppt (1)
quantum cryptography
Quantum
The security of quantum cryptography

What's hot (14)

PPTX
Quantum cryptography
PPTX
Quantum Cryptography
PPTX
Quantum Cryptography
PPTX
Quantum cryptography
PPT
Quantum cryptography data
PPTX
quantumcrypto
PDF
Hacking Quantum Cryptography
PPT
Ieeep By Quantum Abbasi
PPT
Quantum cryptography
PDF
PPTX
Quantum Cryptography presentation
PPT
Introduction to quantum cryptography
PPTX
Quantum cryptography
PPTX
Advances In Cryptography
Quantum cryptography
Quantum Cryptography
Quantum Cryptography
Quantum cryptography
Quantum cryptography data
quantumcrypto
Hacking Quantum Cryptography
Ieeep By Quantum Abbasi
Quantum cryptography
Quantum Cryptography presentation
Introduction to quantum cryptography
Quantum cryptography
Advances In Cryptography
Ad

Viewers also liked (9)

PPTX
Quantum cryptography
PDF
Postselection technique for quantum channels and applications for qkd
PDF
Quantum Key Distribution
PPTX
Dark matter &amp; dark energy
PDF
Experimental demonstration of continuous variable quantum key distribution ov...
PDF
Quantum Cryptography 101
PPT
Quantum Cryptography
PPT
The Many Worlds of Quantum Mechanics
PPT
SSD - Solid State Drive PPT by Shyam jos
Quantum cryptography
Postselection technique for quantum channels and applications for qkd
Quantum Key Distribution
Dark matter &amp; dark energy
Experimental demonstration of continuous variable quantum key distribution ov...
Quantum Cryptography 101
Quantum Cryptography
The Many Worlds of Quantum Mechanics
SSD - Solid State Drive PPT by Shyam jos
Ad

Similar to Quantum crypto (20)

PPTX
Quantum Key Distribution Meetup Slides (Updated)
PPTX
Quantum Key Distribution Meetup Slides
PPTX
Quantum cryptography
PPT
crypto.ppt
PPT
crypto ppt, Seminar Report on Crypto graphy
PPT
crypto.ppt
PPT
quantum cryptography introduction for understanding
PDF
Cryptography from Quantum Mechanical Viewpoint
PDF
Cryptography from quantum mechanical
ODP
Quantum Cryptography - Quantum Coin Tossing
PDF
quantumcryptography-180425230158.pdf
PPTX
Quantum cryptography
PPT
ambainishhm666bbbnnvcddffghnmjkkm2002-1.ppt
PPT
ambainis2002-1 akldsjflak;fla f;lkadjf;lakkl;a
PDF
IRJET- Quantum Key Distribution
PPTX
Shahzad quantum cryptography
PDF
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
PDF
Quantum Cryptography/QKD
PDF
Quantum Cryptography and Possible Attacks
PPTX
Cryptography - Assignment III - Quantum.pptx
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides
Quantum cryptography
crypto.ppt
crypto ppt, Seminar Report on Crypto graphy
crypto.ppt
quantum cryptography introduction for understanding
Cryptography from Quantum Mechanical Viewpoint
Cryptography from quantum mechanical
Quantum Cryptography - Quantum Coin Tossing
quantumcryptography-180425230158.pdf
Quantum cryptography
ambainishhm666bbbnnvcddffghnmjkkm2002-1.ppt
ambainis2002-1 akldsjflak;fla f;lkadjf;lakkl;a
IRJET- Quantum Key Distribution
Shahzad quantum cryptography
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Quantum Cryptography/QKD
Quantum Cryptography and Possible Attacks
Cryptography - Assignment III - Quantum.pptx

Quantum crypto

  • 1. Applications of Quantum Cryptography – QKD CS551/851 CR yptography A pplications B istro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory Troxel. “ Quantum Cryptography in Practice ”
  • 2. Outline Basics of QKD History of QKD Protocols for QKD BB84 Protocol DARPA / BBN Implementation Other Implementations Pro’s & Con’s Conclusion
  • 3. Quantum Cryptography Better Name – Quantum Key Distribution (QKD) – It’s NOT a new crypto algorithm! Two physically separated parties can create and share random secret keys. Allows them to verify that the key has not been intercepted.
  • 5. History of QKD Stephen Wiesner – early 1970s wrote paper &quot;Conjugate Coding” Paper by Charles Bennett and Gilles Brassard in 1984 is the basis for QKD protocol BB84. Prototype developed in 1991. Another QKD protocol was invented independently by Artur Ekert in 1991.
  • 6. Two Protocols for QKD BB84 (and DARPA Project) – uses polarization of photons to encode the bits of information – relies on “ uncertainty ” to keep Eve from learning the secret key. Ekert – uses entangled photon states to encode the bits – relies on the fact that the information defining the key only &quot;comes into being&quot; after measurements performed by Alice and Bob.
  • 7. BB84 Original Paper: Bennett: “ Quantum cryptography using any two nonorthogonal states ”, Physical Review Letters, Vol. 68, No. 21, 25 May 1992, pp 3121-3124
  • 8. BB84 Alice transmits a polarized beam in short bursts. The polarization in each burst is randomly modulated to one of four states (horizontal, vertical, left-circular, or right-circular). Bob measures photon polarizations in a random sequence of bases (rectilinear or circular). Bob tells the sender publicly what sequence of bases were used. Alice tells the receiver publicly which bases were correctly chosen. Alice and Bob discard all observations not from these correctly-chosen bases. The observations are interpreted using a binary scheme: left-circular or horizontal is 0 , and right-circular or vertical is 1 .
  • 9. BB84 representing the types of photon measurements: + rectilinear O circular representing the polarizations themselves: < left-circular > right-circular | vertical − horizontal Probability that Bob's detector fails to detect the photon at all = 0.5. Reference: http://monet.mercersburg.edu/henle/bb84/demo.php
  • 10. BB84 – No Eavesdropping A  B: |< − − −< < −−< >>−<> | |−−< Bob randomly decides detector: ++ + +O+O + O O +O+++ + +O+O For each measurement, P(failure to detect photon) = 0.5 The results of Bob's measurements are: − >− − < < || | B  A: types of detectors used and successfully made (but not the measurements themselves): + O+ + O O ++ + Alice tells Bob which measurements were of the correct type: . . . . ( key = 0 0 0 1) Bob only makes the same kind of measurement as Alice about half the time. Given that the P(B detector fails) = 0.5, you would expect about 5 out of 20 usable shared digits to remain. In fact, this time there were 4 usable digits generated.
  • 11. BB84 – With Eavesdropping A  B: <|<−>−<<|<><−<|<−|−< Eavesdropping occurs. To detect eavesdropping: Bob only makes the same kind of measurement as Alice about half the time. Given that the P(B detector fails) = 0.5, you would expect about 5 out of 20 usable shared digits to remain. A  B : reveals 50% (randomly) of the shared digits. B  A : reveals his corresponding check digits. If > 25% of the check digits are wrong, Alice and Bob know that somebody (Eve) was listening to their exchange. NOTE – 20 photons doesn’t provide good guarantees of detection.
  • 13. DARPA Project Overview Combined Effort – BBN, Harvard, Boston University DARPA Project Provides “high speed” QKD. Keys are used by a VPN. Tests against eavesdropping attacks
  • 14. DARPA Project Overview QKD Network – Requires a set of trusted network relays Uses Phase Shifting instead of Polarization Uses a VPN – Uses QKD to generate VPN keys Fully compatible with conventional hosts, routers, firewalls, etc. Quantum Channel also used for timing and framing Eve is very capable – just can’t violate Quantum Physics
  • 15. QKD Attributes Key Confidentiality Authentication – Not directly provided by QKD – need alternative methods “Sufficiently” Rapid Key Delivery Robustness Distance (and Location) Independence Resistant to Traffic Analysis
  • 17. Randomly selects Phase and Value Randomly chooses Phase Basis Measures Phase & Value Timing and Framing
  • 18. 1’s and 0’s Unbalanced Interferometers Provides different delays Must be “identical at Sender and Receiver
  • 19. 1’s and 0’s Photon follows both paths Long path lags behind short path Travels as two distinct pulses Bob receives Pulses again take long & short paths
  • 20. 1’s and 0’s Waves are Summed Center Peak – Provides the Bases
  • 21. 1’s and 0’s 1’s and 0’s represented by adjusting the relative phases of the two waves (S A L B and L A S B ). This is the Δ value.
  • 22. 1’s and 0’s 1’s and 0’s represented by adjusting the phase Δ value. Encodes 1 or 0 value in either of two randomly selected nonorthogonal bases. 0 = phase shift of 0 (basis 0) or phase shift π /2 (basis 1) 1 = phase shift of π (basis 0) or phase shift 3 π /2 (basis 1) Randomly applies one of four phase shifts to encode four different (basis, value) pairs If Δ = 0 or π , then compatible bases If Δ = π /2 or 3 π /2 , then incompatible bases Heavily dependent on correct timing – Alice provides
  • 23. QKD Protocols Sifting –Unmatched Bases; “stray” or “lost” qubits Error Correction – Noise & Eaves-dropping detected – Uses “cascade” protocol – Reveals information to Eve so need to track this. Privacy Amplification – reduces Eve’s knowledge obtained by previous EC Authentication – Continuous to avoid man-in-middle attacks – not required to initiate using shared keys – Not well explained in Paper.
  • 24. IPSEC “Continually” uses new keys obtained from QKD Used in IPSEC Phase 2 hash to update AES keys about once / minute Can support: Rapid reseeding, or One-time pad Supports multiple tunnels, each uniquely configured
  • 25. Key Lifetime and Key Size QKD Extensions Can support: Rapid reseeding, or One-time pad
  • 26. Issues Time outs (due to insufficient bits available) Noise affects on key establishment. This can’t be detected by IKE.
  • 27. Other Implementations Two Other Implementations of Quantum Key Distribution: D Stucki, N Gisin, O Guinnard, G Ribordy, and H Zbinden. Quantum key distribution over 67 km with a plug&play system .  New Journal of Physics 4 (2002) 41.1–41.8. ID Quantine: http:// www.idquantique.com/files/introduction.pdf MagiQ. Whitepaper: http://www.magiqtech.com/registration/MagiQWhitePaper.pdf Satellite-based QKD: http://ej.iop.org/links/q68/BKUvFWVrm756,uxc76lU,Q/nj2182.pdf
  • 28. Pros & Cons Nearly Impossible to steal Detect if someone is listening “Secure” Distance Limitations Availability vulnerable to DOS keys can’t keep up with plaintext
  • 29. Questions? Back to Richard!