SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Downloaden Sie, um offline zu lesen
Quantum Cryptography
Fatemeh Ghezelbash
1
outline
➢Basic Ideas in Cryptography
➢Ideas from the Quantum World
➢Quantum Key Distribution (QKD)
➢BB84 without eavesdropping
➢BB84 with eavesdropping
➢Practical Implementation of QC
➢QKD source
2
•Introduction
• Quantum cryptography is the one of the
most successful application of Quantum
Computing/InformationTheory.
• For the first time in history, we can use
the forces of nature to implement perfectly secure
cryptosystems.
3
• Classical Cryptography(RSA) relies heavily
on the complexity of factoring integers.
• FutureQuantumComputers can use Shor’s
Algorithm to efficiently break today’s
cryptosystems.
• Quantum computers can solve factoring
problems in polynomial time.
What happens when that day arrives?
Encrypting is easy.
Codebreaking is hard.
4
Basic Ideas of Cryptography
• Cryptography: “the coding and
decoding of secret messages.”
•The basic idea is to modify a message so as to make it
unintelligible to anyone but the intended recipient.
5
Keys and key distribution
• The key is known only to sender and receiver.
• Anyone who knows the key can decrypt the
message.
• Key distribution is the problem of exchanging
the key between sender and receiver.
6
Perfect Secrecy and OTP
• There exist perfect cryptosystems.
• Example: One-Time Pad (OTP)
• The problem of distributing the keys in the first place
remains.
• Key length has to be same as message length!!
7
One-time Pad
message: Q U A N T U M
message: 17 (Q) 21 (U) 1 (A) 14 (N) 20 (T) 21 (U) 13 (M)
key: 24 (X) 22 (V) 2 (B) 10 (J) 3 (C) 8 (H) 12 (L)
message + key: 41 (O) 43 (Q) 3 (C) 24 (X) 23 (W) 29 (K) 25 (Y)
ciphertext: O Q C X W K Y
ciphertext – key: 17 (Q) 21 (U) 1 (A) 14 (N) 20 (T) 21 (U) 13 (M)
message: Q U A N T U M
8
Quantum Key Distribution
• Using the laws of quantum mechanics, we can distribute keys in
perfect secrecy!!
• The Result:The Perfect Cryptosystem.
QC = QKD + OTP
9
Quantum Physics Basics
• Physical Qubits
• Any subatomic particle can be used to
represent a qubit, e.g. an electron.
• A photon is a convenient choice.
• A photon is an electromagnetic wave.
10
Polarization
• A photon has a property called polarization, which is the plane in
which the electric field oscillates.
•We can use photons of different polarizations to represent quantum
states:
11
Ideas from Quantum World
Measurement
• Observing, or measuring, a quantum system will alter its state.
• Example: the Qubit
• When observed, the state of a qubit will collapse to unpredictable
random state 1 or 0.
12
Polarizers & Basics
• A device called a polarizer allows us to place a photon in a
particular polarization.
•The polarization basis is frame of reference for quantum
measurement.
13
Polarization of Photons
• Direction of oscillation of the electric field associated to a lightwave
• Polarization states
• What can we do with it ?
E


14
Irreversibility of Measurements
Incoming photon polarized at 90°
Incoming photon polarized at 45°
Rotation of polarizer
15
Measuring Photons
• A calcite crystal can be used to recover the bits encoded into a
stream of photons.
16
Uncertainty Principle
• What if the crystal has the wrong orientation?
17
History of QKD
• StephenWiesner – early 1970s wrote paper "Conjugate
Coding”
• Paper by Charles Bennett and Gilles Brassard in 1984 is
the basis for QKD protocol BB84. Prototype developed in
1991.
• Another QKD protocol was invented independently by
Artur Ekert in 1991.
18
Two Protocols for QKD
• BB84– uses polarization of photons to encode the bits of
information – relies on “uncertainty” to keep Eve from
learning the secret key.
• Ekert – uses entangled photon states to encode the bits
19
Quantum Key Distribution
• Quantum Key Distribution exploits the effects discussed in order to
thwart eavesdropping.
• If an eavesdropper uses the wrong polarization basis to measure the
channel, the result of the measurement will be random.
20
QKD systems
• A QKD system consists of two units which are physically separated at
opposite ends of a pair of communication channels.
21
BB84
• BB84 was the first security protocol implementingQuantum Key
Distribution.
• It uses the idea of photon polarization.
• The key consists of bits that will be transmitted as photons.
• Each bit is encoded with a random polarization basis!
22
BB84With no Eavesdropping
• Alice is going to send Bob a key.
• She begins with a random sequence of bits.
• Bits are encoded with a random basis, and then sent to Bob:
23
BB84With no Eavesdropping
• Some of his measurements are correct.
24
BB84With no eavesdropper
• Alice and Bob talk on the public encrypted channel:
• Alice chooses a subset of the bits (the test bits) and reveals which
basis she used to encode them to Bob.
• Bob tellsAlice which basis he used to decode the same bits.
25
Comparing measurements
The test bits allow Alice and Bob to test whether the channel is secure.
26
• As long as no errors and/or eavesdropping have occurred, the test
bits should agree.
• Alice and Bob have now made sure that the channel is secure . The
test bits are removed.
• Alice tells Bob the basis she used for the other bits, and they both
have a common set of bits: the final key!
27
Deriving the final key
Test bits
discarded
Final Key = 01 28
In the presence of eavesdropper
• If an eavesdropper tries to tap the channel, this will automatically
show up in Bob’s measurements.
• In those cases where Alice and Bob have used the same basis, Bob
is likely to obtain an incorrect measurement: Eve’s measurements
are bound to affect the states of the photons.
29
Eavesdropper Effect
30
In the presence of Eavesdropper
• As Eve interceptsAlice’s photons, she has to measure them with a
random basis and send new photons to Bob.
• The photon states cannot be cloned (noncloneability).
• Eve’s presence is always detected: measuring a quantum system
irreparably alters its state.
31
QKD - Review
32
Entanglement-basedQKD Implementations
• The source at Alice emits an entangled photon pair, with one
photon at 810 nm and the other at 1550 nm.
• The 810 nm photon is measured in four possible polarisation states
(0°, 45°, 90° and 135°) at Alice, using Si APDs.)si avalanche
potodiodes(
• The 1 550 nm photon is sent over the quantum channel (standard
telecom fibro) to Bob, where its polarisation is also analysed along
the four directions using InGaAs APDs(Indium gallium arsenide).
33
34
35
Quantum No-cloningTheorem
• An unknown quantum state CANNOT be cloned.
Therefore, eavesdropper, Eve, cannot have the same
information as Bob.
• Single-photon signals are secure.
a a a
IMPOSSIBLE
36
Photon-number splitting attack against multi-photons
A multi-photon signal CAN be split. (Therefore, insecure.)
a
a
Bob
Eve
Splitting attack
aa
Alice
Summary: Single-photon good.
Multi-photon bad.
QKD Source
Single-photon source
• A QKD source emits light pulses upon which quantum information is
encoded.
• A source suitable for QKD should possess a property such that the
encoded quantum information can be recovered faithfully through
quantum measurement only when the measurement and encoding
basis are compatible.
• Quantum information can be encoded upon polarisation, phase and
angular momentum. 37
• An ideal QKD system would have a perfect single-photon sources
that always emits exactly one photon in response to an applied
trigger.
• Experimental systems that have demonstrated single-photon
emission include single atoms, single ions,and single quantum dots.
38
• A QKD light source should maintain indistinguishability for qubits in
all degrees of freedom except that of the encoding. In other words, it
should not be possible to discriminate between qubits through
measurement of parameters other than the encoded freedom.
• For example, in the polarisation-encoding BB84 protocol, qubits in
all four states should have exactly the same wavelength, temporal
profile and arrival time, etc. Discrimination of these polarization
encoded qubits can be made possible only through polarisation
measurement. Indistinguishability is a necessary requirement to
prevent information leakage through auxiliary measurements by an
eavesdropper.
39
Weak Pulses
Weak Laser
• An intensity monitor which integrates the 'single-photon' signals
over time, possessing the necessary sensitivity to determine the
average optical power, can be incorporated after the attenuator.
• Indistinguishability is automatically fulfilled by an attenuated laser
source, since all qubits are prepared by the same emitter and
attenuator.
40
41
Entangled-photon sources
• An entanglement-basedQKD system requires the generation and
distribution of entangled photon pairs.
• In this source, photon pair production is achieved by optically
pumping a nonlinear media.The optical excitation can be provided by
a pulsed or continuous-wave laser.
42
43
Thank you!!
44

Weitere ähnliche Inhalte

Was ist angesagt?

Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu427
 

Was ist angesagt? (20)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides
 
Quantum programming
Quantum programmingQuantum programming
Quantum programming
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum Computing Lecture 1: Basic Concepts
Quantum Computing Lecture 1: Basic ConceptsQuantum Computing Lecture 1: Basic Concepts
Quantum Computing Lecture 1: Basic Concepts
 
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili SaghafiQuantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
Quantum Computers New Generation of Computers PART1 by Prof Lili Saghafi
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 

Ähnlich wie Quantum Cryptography/QKD

quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
Anand Kairamkonda
 

Ähnlich wie Quantum Cryptography/QKD (20)

quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Quantum crypto system
Quantum crypto systemQuantum crypto system
Quantum crypto system
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdf
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Computation For AI
Quantum Computation For AIQuantum Computation For AI
Quantum Computation For AI
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible Attacks
 
Quantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev ChauhanQuantum Computing by Rajeev Chauhan
Quantum Computing by Rajeev Chauhan
 
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiQuantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Quantum router
Quantum routerQuantum router
Quantum router
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
The future is quantum
The future is quantumThe future is quantum
The future is quantum
 

Kürzlich hochgeladen

development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
NazaninKarimi6
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
PirithiRaju
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
levieagacer
 

Kürzlich hochgeladen (20)

PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Introduction to Viruses
Introduction to VirusesIntroduction to Viruses
Introduction to Viruses
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 
chemical bonding Essentials of Physical Chemistry2.pdf
chemical bonding Essentials of Physical Chemistry2.pdfchemical bonding Essentials of Physical Chemistry2.pdf
chemical bonding Essentials of Physical Chemistry2.pdf
 
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts ServiceJustdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
Justdial Call Girls In Indirapuram, Ghaziabad, 8800357707 Escorts Service
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
High Profile 🔝 8250077686 📞 Call Girls Service in GTB Nagar🍑
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate ProfessorThyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 

Quantum Cryptography/QKD

  • 2. outline ➢Basic Ideas in Cryptography ➢Ideas from the Quantum World ➢Quantum Key Distribution (QKD) ➢BB84 without eavesdropping ➢BB84 with eavesdropping ➢Practical Implementation of QC ➢QKD source 2
  • 3. •Introduction • Quantum cryptography is the one of the most successful application of Quantum Computing/InformationTheory. • For the first time in history, we can use the forces of nature to implement perfectly secure cryptosystems. 3
  • 4. • Classical Cryptography(RSA) relies heavily on the complexity of factoring integers. • FutureQuantumComputers can use Shor’s Algorithm to efficiently break today’s cryptosystems. • Quantum computers can solve factoring problems in polynomial time. What happens when that day arrives? Encrypting is easy. Codebreaking is hard. 4
  • 5. Basic Ideas of Cryptography • Cryptography: “the coding and decoding of secret messages.” •The basic idea is to modify a message so as to make it unintelligible to anyone but the intended recipient. 5
  • 6. Keys and key distribution • The key is known only to sender and receiver. • Anyone who knows the key can decrypt the message. • Key distribution is the problem of exchanging the key between sender and receiver. 6
  • 7. Perfect Secrecy and OTP • There exist perfect cryptosystems. • Example: One-Time Pad (OTP) • The problem of distributing the keys in the first place remains. • Key length has to be same as message length!! 7
  • 8. One-time Pad message: Q U A N T U M message: 17 (Q) 21 (U) 1 (A) 14 (N) 20 (T) 21 (U) 13 (M) key: 24 (X) 22 (V) 2 (B) 10 (J) 3 (C) 8 (H) 12 (L) message + key: 41 (O) 43 (Q) 3 (C) 24 (X) 23 (W) 29 (K) 25 (Y) ciphertext: O Q C X W K Y ciphertext – key: 17 (Q) 21 (U) 1 (A) 14 (N) 20 (T) 21 (U) 13 (M) message: Q U A N T U M 8
  • 9. Quantum Key Distribution • Using the laws of quantum mechanics, we can distribute keys in perfect secrecy!! • The Result:The Perfect Cryptosystem. QC = QKD + OTP 9
  • 10. Quantum Physics Basics • Physical Qubits • Any subatomic particle can be used to represent a qubit, e.g. an electron. • A photon is a convenient choice. • A photon is an electromagnetic wave. 10
  • 11. Polarization • A photon has a property called polarization, which is the plane in which the electric field oscillates. •We can use photons of different polarizations to represent quantum states: 11
  • 12. Ideas from Quantum World Measurement • Observing, or measuring, a quantum system will alter its state. • Example: the Qubit • When observed, the state of a qubit will collapse to unpredictable random state 1 or 0. 12
  • 13. Polarizers & Basics • A device called a polarizer allows us to place a photon in a particular polarization. •The polarization basis is frame of reference for quantum measurement. 13
  • 14. Polarization of Photons • Direction of oscillation of the electric field associated to a lightwave • Polarization states • What can we do with it ? E   14
  • 15. Irreversibility of Measurements Incoming photon polarized at 90° Incoming photon polarized at 45° Rotation of polarizer 15
  • 16. Measuring Photons • A calcite crystal can be used to recover the bits encoded into a stream of photons. 16
  • 17. Uncertainty Principle • What if the crystal has the wrong orientation? 17
  • 18. History of QKD • StephenWiesner – early 1970s wrote paper "Conjugate Coding” • Paper by Charles Bennett and Gilles Brassard in 1984 is the basis for QKD protocol BB84. Prototype developed in 1991. • Another QKD protocol was invented independently by Artur Ekert in 1991. 18
  • 19. Two Protocols for QKD • BB84– uses polarization of photons to encode the bits of information – relies on “uncertainty” to keep Eve from learning the secret key. • Ekert – uses entangled photon states to encode the bits 19
  • 20. Quantum Key Distribution • Quantum Key Distribution exploits the effects discussed in order to thwart eavesdropping. • If an eavesdropper uses the wrong polarization basis to measure the channel, the result of the measurement will be random. 20
  • 21. QKD systems • A QKD system consists of two units which are physically separated at opposite ends of a pair of communication channels. 21
  • 22. BB84 • BB84 was the first security protocol implementingQuantum Key Distribution. • It uses the idea of photon polarization. • The key consists of bits that will be transmitted as photons. • Each bit is encoded with a random polarization basis! 22
  • 23. BB84With no Eavesdropping • Alice is going to send Bob a key. • She begins with a random sequence of bits. • Bits are encoded with a random basis, and then sent to Bob: 23
  • 24. BB84With no Eavesdropping • Some of his measurements are correct. 24
  • 25. BB84With no eavesdropper • Alice and Bob talk on the public encrypted channel: • Alice chooses a subset of the bits (the test bits) and reveals which basis she used to encode them to Bob. • Bob tellsAlice which basis he used to decode the same bits. 25
  • 26. Comparing measurements The test bits allow Alice and Bob to test whether the channel is secure. 26
  • 27. • As long as no errors and/or eavesdropping have occurred, the test bits should agree. • Alice and Bob have now made sure that the channel is secure . The test bits are removed. • Alice tells Bob the basis she used for the other bits, and they both have a common set of bits: the final key! 27
  • 28. Deriving the final key Test bits discarded Final Key = 01 28
  • 29. In the presence of eavesdropper • If an eavesdropper tries to tap the channel, this will automatically show up in Bob’s measurements. • In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect measurement: Eve’s measurements are bound to affect the states of the photons. 29
  • 31. In the presence of Eavesdropper • As Eve interceptsAlice’s photons, she has to measure them with a random basis and send new photons to Bob. • The photon states cannot be cloned (noncloneability). • Eve’s presence is always detected: measuring a quantum system irreparably alters its state. 31
  • 33. Entanglement-basedQKD Implementations • The source at Alice emits an entangled photon pair, with one photon at 810 nm and the other at 1550 nm. • The 810 nm photon is measured in four possible polarisation states (0°, 45°, 90° and 135°) at Alice, using Si APDs.)si avalanche potodiodes( • The 1 550 nm photon is sent over the quantum channel (standard telecom fibro) to Bob, where its polarisation is also analysed along the four directions using InGaAs APDs(Indium gallium arsenide). 33
  • 34. 34
  • 35. 35 Quantum No-cloningTheorem • An unknown quantum state CANNOT be cloned. Therefore, eavesdropper, Eve, cannot have the same information as Bob. • Single-photon signals are secure. a a a IMPOSSIBLE
  • 36. 36 Photon-number splitting attack against multi-photons A multi-photon signal CAN be split. (Therefore, insecure.) a a Bob Eve Splitting attack aa Alice Summary: Single-photon good. Multi-photon bad.
  • 37. QKD Source Single-photon source • A QKD source emits light pulses upon which quantum information is encoded. • A source suitable for QKD should possess a property such that the encoded quantum information can be recovered faithfully through quantum measurement only when the measurement and encoding basis are compatible. • Quantum information can be encoded upon polarisation, phase and angular momentum. 37
  • 38. • An ideal QKD system would have a perfect single-photon sources that always emits exactly one photon in response to an applied trigger. • Experimental systems that have demonstrated single-photon emission include single atoms, single ions,and single quantum dots. 38
  • 39. • A QKD light source should maintain indistinguishability for qubits in all degrees of freedom except that of the encoding. In other words, it should not be possible to discriminate between qubits through measurement of parameters other than the encoded freedom. • For example, in the polarisation-encoding BB84 protocol, qubits in all four states should have exactly the same wavelength, temporal profile and arrival time, etc. Discrimination of these polarization encoded qubits can be made possible only through polarisation measurement. Indistinguishability is a necessary requirement to prevent information leakage through auxiliary measurements by an eavesdropper. 39
  • 40. Weak Pulses Weak Laser • An intensity monitor which integrates the 'single-photon' signals over time, possessing the necessary sensitivity to determine the average optical power, can be incorporated after the attenuator. • Indistinguishability is automatically fulfilled by an attenuated laser source, since all qubits are prepared by the same emitter and attenuator. 40
  • 41. 41
  • 42. Entangled-photon sources • An entanglement-basedQKD system requires the generation and distribution of entangled photon pairs. • In this source, photon pair production is achieved by optically pumping a nonlinear media.The optical excitation can be provided by a pulsed or continuous-wave laser. 42
  • 43. 43