Quantum Key Distribution in the GÉANT network

Slides:



Advertisements
Similar presentations
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Advertisements

Optical sources Lecture 5.
Experimental demonstration of the coexistence of continuous-variable quantum key distribution with an intense DWDM classical channel Rupesh Kumar Joint.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Key Distribution Yet another method of generating a key.
Quantum Cryptography Marshall Roth March 9, 2007.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Page 2 Small confidentiality text on every page, Arial 10pt, white – Change on MASTER PAGE ONLY Understanding DWDM.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
1 Razali Ngah, and Zabih Ghassemlooy Optical Communication Research Group School of Engineering & Technology Northumbria University, United Kingdom http:
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Presented by, G.RajMohan I Year M-Tech. WHY WDM? Capacity upgrade of existing fiber networks (without adding fibers) Transparency: Each optical channel.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Coherent Alien Waves over a DCM-compensated DWDM network WHY – WHAT – HOW – WHEN … of … a study of performances and possible limitations of the coherent.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
OptiSystem applications: Photodiode sensitivity modelling
Seminar on 4G wireless technology
Attacks on Public Key Encryption Algorithms
A System View of Optical Fiber Communication
FCC DIGITAL 2ch VIDEO & 1ch AUDIO / 1ch DATA LINK
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Cryptographic Hash Function
FCC DIGITAL DATA + ETHERNET LINK PRODUCT SPECIFICATION
Information and Network Security
Design of Optical Digital Transmission Systems
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Making Networks Light March 29, 2018 Charleston, South Carolina.
Group 7 Justin Jones Ashley Robinett Jonathan Bull
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
A System View of Optical Fiber Communication prt.2
Seung Hwan An University of Washington October 18, 2016 PHYS 494
Quantum Cryptography Alok.T.J EC 11.
Quantum Information with Continuous Variables
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Quantum Cryptography Scott Roberts CSE /01/2001.
Switching Techniques.
Quantum Technology programme
Back End & LO PDR April 2002 FIBRE-OPTIC LINKS -An Introduction Ralph Spencer Jodrell Bank Observatory University of Manchester UK --The use of.
Design of Optical Digital Transmission Systems
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Fiber Optic Transmission
Performance Specifications
Presentation transcript:

Quantum Key Distribution in the GÉANT network Guy Roberts Linz 31 May 2017

The Challenge The security in current encryption algorithms typically relies on hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. These hard math problems are expected to be overcome once quantum computers become available. Network providers need to start thinking now about ways building quantum-proof encryption. Quantum Key Distribution (QKD) is one solution

Page title Page text

Can GÉANT deliver on the Quantum Manifesto goal? The Challenge: Can GÉANT deliver this Quantum Manifesto goal? How far have can we go based on the current generation of technology? What still needs to be do be done? Action plan: Lab testing has been carried out with Toshiba on the GÉANT transmission equipment to understand what we can do with the current generation equipment Find applications for current generation technology Plan for the future

Types of QKD Single photon QKD In quantum mechanics, the principle of quantum indeterminacy means that measuring an unknown quantum state changes that state in some way. Indeterminacy is used to detect any eavesdropping on single photon based information. Entanglement based QKD Entanglement occurs when the quantum states of two objects become linked together in such a way that they must be described by a combined quantum state. Entanglement means that, performing a measurement on one object affects the other. If an entangled pair of objects is shared between two parties, anyone intercepting either object alters the overall system, revealing the presence of the third party (and the amount of information they have gained).

Implementing QKD Data Data for transmission is encrypted using one-time pad method. This allows a large volume of data to be sent with one short key that can be refreshed rapidly. Keys are distributed between Alice and Bob using a quantum channel. A quantum key protocol such as BB84 is used for key transmission. AES256 AES256 QKD Alice BB84 QKD Bob

Key exchange protocol: BB84 BB84 is a quantum cryptography protocol that is ‘provably’ secure Relies on the quantum property that information gain is only possible at the expense of disturbing the signal (single photon method). However, in QKD protocols, such as BB84, a single photon source is assumed to be used by the sender, Alice. In reality, a perfect single photon source will slow down key distribution over high-loss links. Need to increase key rate – solution: Decoy State.

Decoy state for BB84 Real-world QKD optical sources are multi-photon. A potential security loophole exists when Alice uses multi-photon states. To minimize the effects of multi-photon states, Alice would have to use a low-power source, which results in a relatively low speed of QKD. To solve this, ‘Decoy State’ QKD varies the photon intensity. States are transmitted by Alice using randomly chosen intensity levels (one signal state and several decoy states), resulting in varying photon number statistics throughout the channel. The resulting key transmission rate is higher, but the risk of attack remains very low <10-10

Toshiba Quantum Encryption System Proprietary Technology: Active status tracking for stable operation Self-differencing semiconductor detectors – room-temperature operation for improved reliability and reduced power consumption BB84 protocol with decoy states - failure probability < 10-10 Toshiba Quantum Encryption System Prototype Key exchange protocol Efficient BB84 protocol with decoy states – superior one-way quantum key exchange – stable encoding onto phase of <50ps optical pulses Transmission speed and distance Secure key rate over 1 Mb/s for 10 dB loss Max supported transmission loss > 20dB (equivalent to 100km of fibre) Photon Detection technology Proprietary self-differencing InGaAs detectors – room temperature operation for improved reliability and power saving Multiplexing compatibility Coarse wavelength-division multiplexing (CWDM) / dense wavelength-division multiplexing (DWDM) Security parameter Key failure probability < 10-10, corresponding to less than once in 30.000 years – protection against Trojan horse attacks – protection against blinding attacks Interfaces Single fibre channel – dual fibre channel for highest transmission speed Dimensions Standard 19’’ rack mount, 3U height Features: World’s leading 1Mbit/s secure key rate Quantum Key Distribution (QKD) Highest level of verifiable security with theoretically rigorous proof Operation over normal fibre networks

Quantum Key distribution technology

Add/drop of quantum channel into Infinera Infinera DTN-X: 500Gbps super- channel with 10 waves on photonic Integrated Circuit (PIC) QKD operates at 1GHz with quantum channel at 1550nm Multiplexed QKD and DTN-X traffic in the forward direction

Combing Toshiba QKD with Infinera DTN-X Optical spectrum shows the Infinera OCG data channels and amplified spontaneous emission (ASE) from DTN-X dominates quantum signal Designed filtering system to remove ASE at quantum wavelength Filtering also removes effect of Raman scattering in the fibre Mux also used to insert quantum channel

In the Lab QKD Mux testing in GÉANT lab in May James Dynes Toshiba researcher adjusts quantum mux

Multiplexing Results – Infinera DTN-X Pre FEC Bit Error Rate (BER) depends on receiver power. Obtain minimum receiver power of just over -30dBm for both 50km and 100km More sensitive receiver card would give a further 4dB improvement

Multiplexing Results – Infinera DTN-X Used minimum receiver power to model QKD secure bit rate. Obtain > 1Mbps @ 50km of fibre. With a narrow 15GHz filter in the quantum channel, reach > 90km. More sensitive receiver card further extends QKD reach > 100km note: multiple OCGs will reduce reach

Limitations and next steps We have demonstrated distribution Quantum keys over 100km of with Infinera Excellent key transmission rate of >1Mbps at 50km Currently technology will not work over optical amplifiers, so limited to single optical spans. Trusted nodes are needed to create new keys for each span In the future QKD-friendly amplifiers need to be developed to allow QKD channel to bypass amplifiers.

guy.roberts@geant.org