Presentation is loading. Please wait.

Presentation is loading. Please wait.

Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.

Similar presentations


Presentation on theme: "Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam."— Presentation transcript:

1 Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica 32C3 Chaos Computer Congress Hamburg Monday, 28 December 2015

2 2 1969: Man on the Moon NASA The Great Moon-Landing Hoax? How can you prove that you are at a specific location? http://www.unmuseum.org/moonhoax.htm

3 3 What will you learn from this Talk? Introduction to Quantum Mechanics Quantum Key Distribution Position-Based Cryptography

4 4 Quantum Bit: Polarization of a Photon qu b i t asun i t vec t or i n C 2

5 5 Qubit: Rectilinear/Computational Basis

6 6 Detecting a Qubit Bob No photons: 0 Alice

7 7 Measuring a Qubit Bob No photons: 0 Photons: 1 with prob. 1 yields 1 Measurement: 0/1 Alice

8 8 Diagonal/Hadamard Basis with prob. ½ yields 0 with prob. ½ yields 1 Measurement: 0/1 =

9 9 Measuring Collapses the State with prob. ½ yields 0 with prob. ½ yields 1 Measurement: 0/1 =

10 10 Measuring Collapses the State = =

11 11 Quantum Mechanics with prob. 1 yields 1 Measurements: + basis £ basis with prob. ½ yields 0 with prob. ½ yields 1 0/1

12 Wonderland of Quantum Mechanics

13 13 Demonstration of Quantum Technology 13 generation of random numbers (diagram from idQuantique white paper)idQuantique no quantum computation, only quantum communication required 50%

14 14 What will you Learn from this Talk? Introduction to Quantum Mechanics Quantum Key Distribution Position-Based Cryptography

15 15 No-Cloning Theorem Quantum operations: U Proof: copying is a non-linear operation

16 Quantum Key Distribution (QKD) Alice Bob Eve Offers an quantum solution to the key-exchange problem which does not rely on computational assumptions (such as factoring, discrete logarithms, security of AES, SHA-3 etc.) Puts the players into the starting position to use symmetric-key cryptography (encryption, authentication etc.). [Bennett Brassard 84] 16 k = 0101 1011 k = ?

17 Quantum Cryptography Landscape 17 attackers systems efficient classical attacks efficient quantum attacks everlasting security (store and break later) AESconfidentlonger keysbrute force SHAconfidentlonger outputsbrute force RSA, DiscLogsconfidentShorbrute force Hash-Based Signprobably brute force McElieceprobably brute force Lattice-basedprobably brute force QKD physical security Post Quantum Crypto technical difficulty (€)

18 Quantum Key Distribution (QKD) [Bennett Brassard 84] 18 0 1 1 1 0 0 0 1 1 0 k = 110

19 Quantum Key Distribution (QKD) [Bennett Brassard 84] 19 0 1 1 1 0 0 0 1 1 0 k = 10 Quantum states are unknown to Eve, she cannot copy them. Honest players can test whether Eve interfered. k = ?

20 Quantum Key Distribution (QKD) Alice Bob Eve technically feasible: no quantum computer required, only quantum communication [Bennett Brassard 84] 20

21 Quantum Key Distribution (QKD) Alice Bob Eve technically feasible: no quantum computer required, only quantum communication [Bennett Brassard 84] 21

22 22 Quantum Hacking e.g. by the group of Vadim Makarov (University of Waterloo, Canada)Vadim Makarov

23 23 What will you Learn from this Talk? Introduction to Quantum Mechanics Quantum Key Distribution Position-Based Cryptography

24 24 Position-Based Cryptography Typically, cryptographic players use credentials such as secret information (e.g. password or secret key) authenticated information biometric features Can the geographical location of a player be used as cryptographic credential ?

25 25 Position-Based Cryptography Possible Applications: Launching-missile command comes from within your military headquarters Talking to the correct assembly Pizza-delivery problem / avoid fake calls to emergency services … Can the geographical location of a player be used as sole cryptographic credential ?

26 26 Basic task: Position Verification Prover wants to convince verifiers that she is at a particular position no coalition of (fake) provers, i.e. not at the claimed position, can convince verifiers (over)simplifying assumptions: communication at speed of light instantaneous computation verifiers can coordinate Verifier1 Verifier2 Prover

27 27 Position Verification: First Try Verifier1 Verifier2 Prover time distance bounding [Brands Chaum ‘93][Brands Chaum ‘93]

28 28 Position Verification: Second Try Verifier1 Verifier2 Prover position verification is classically impossible ! [Chandran Goyal Moriarty Ostrovsky 09]

29 29 The Attack copying classical information this is impossible quantumly

30 30 Position Verification: Quantum Try [Kent Munro Spiller 03/10] Can we brake the scheme now?

31 31 Attacking Game Impossible to cheat due to no-cloning theorem Or not? ? ?

32 32 EPR Pairs prob. ½ : 0prob. ½ : 1 prob. 1 : 0 [Einstein Podolsky Rosen 1935] “spukhafte Fernwirkung” (spooky action at a distance) EPR pairs do not allow to communicate (no contradiction to relativity theory) can provide a shared random bit EPR magic!

33 33 Quantum Teleportation [Bennett Brassard Crépeau Jozsa Peres Wootters 1993] does not contradict relativity theory Bob can only recover the teleported qubit after receiving the classical information ¾ [Bell]

34 34 Teleportation Attack It is possible to cheat with entanglement !!entanglement Quantum teleportation allows to break the protocol perfectly. Quantum teleportation [Bell]

35 35 No-Go Theorem Any position-verification protocol can be broken using an exponential number of entangled qubits. Question: Are so many quantum resources really necessary? Does there exist a protocol such that: honest prover and verifiers are efficient, but any attack requires lots of entanglement [Buhrman, Chandran, Fehr, Gelles, Goyal, Ostrovsky, Schaffner 2010][Buhrman, Chandran, Fehr, Gelles, Goyal, Ostrovsky, Schaffner 2010] [Beigi Koenig 2011][Beigi Koenig 2011] see http://homepages.cwi.nl/~schaffne/positionbasedqcrypto.php for recent developmentshttp://homepages.cwi.nl/~schaffne/positionbasedqcrypto.php

36 36 What Have You Learned from this Talk? Quantum Mechanics Qubits No-cloning Entanglement Quantum Teleportation

37 37 What Have You Learned from this Talk? Position-Based Cryptography Quantum Key Distribution (QKD)QKD

38 Thank you for your attention! Questions


Download ppt "Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam."

Similar presentations


Ads by Google