Quantum Cryptography Scott Roberts CSE 599 03/01/2001.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Cryptography Marshall Roth March 9, 2007.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Public Key Model 8. Cryptography part 2.
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Cryptography, Authentication and Digital Signatures
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Nawaf M Albadia
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
INCS 741: Cryptography Overview and Basic Concepts.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Lesson 2-18 AP Computer Science Principles
Encryption and Integrity
J. Miranda University of Ottawa 21 November 2003
Lesson 7: Public Key Cryptography Lesson 8: Rapid Research - Cybercrime Day 37.
Cryptography Much of computer security is about keeping secrets
Computer Communication & Networks
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
Public-Key Cryptography and RSA
Public Key Encryption and the RSA Algorithm
QUANTUM CRYPTOGRAPHY.
Quantum Cryptography Quantum Computing
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki * *Perimeter Institute for.
Cryptography, part 2.
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
NET 311 Information Security
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Public Key Cryptography Diffie-Hellman, Discrete Log, RSA
Brandin L Claar CSE 597E 5 December 2001
Cryptography: Basics (2)
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 22 (2009) Richard.
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Public-Key, Digital Signatures, Management, Security
CSCI284 Spring 2009 GWU Sections 5.1, 5.2.2, 5.3
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Secure Diffie-Hellman Algorithm
Presentation transcript:

Quantum Cryptography Scott Roberts CSE 599 03/01/2001

Overview Classical Cryptography Quantum Cryptography BB84 Quantum Key Distribution Scheme Demo Here is an overview of what I will talk be talking about today. First, I will talk about classical cryptography and the problems inherent in the two most common cryptosystems. Then, I will discuss quantum cryptography and how it solves the problems of classical cryptography. Then, I will talk about the BB84 quantum key distribution scheme which is the most popular quantum cryptography algorithm. Finally, I will demonstrate a BB84 simulation application that I created.

Classical Cryptography Private-key cryptography Based on secrecy of the key Problem: key distribution Public-key cryptography Based on one-way functions Problem: Based on unproven mathematical assumptions In danger due to recent advances in quantum computing – namely Shor’s algorithm. In private-key cryptosystems, the sender, who we typically refer to as Alice, and the receiver, who we refer to as Bob, share a common key that is kept private from all untrusted parties. This key is used both for encryption and decryption. The main problem with private-key cryptography is key distribution. Alice needs to transmit the key to Bob without revealing the key to an eavesdropper, who we call Eve. It’s impossible to completely prevent eavesdropping from occurring when transmitting the key over classical delivery channels, such as the Internet. If Alice chooses to send the key to Bob via a courier, how do Alice and Bob know that the courier can be trusted. With public-key cryptography, the encryption and decryption key are different. The encryption key is public and the decryption key is private. Therefore, anybody can encrypt a msg using the encryption key but only the person with the decryption key can decrypt the msg. PKC is based on the concept of one-way functions. These are functons that are easier to compute in one direction than the other. i.e., given x you can easily compute f(x) but given f(x) you cannot easily compute x. (At least there is not a known polynomial time algorithm to do so.) An example is the factoring of large integers. The problem is that PKC is based on unproven math assumptions.

Quantum Cryptography (a.k.a. Quantum Key Distribution) Enables Alice to send a key to Bob and detect eavesdropping. Really about key distribution (QKD). QKD based on an unchangeable law of physics: the Heisenberg Uncertainty Principle. For any two incompatible observables, A and B, reducing the uncertainty of A forces the uncertainty of B to increase, and vice versa. i.e., measuring one of the observables interferes with the measurement of the other This is key to QKD

QKD (cont’d) QKD uses photons to transmit key data If Eve attempts to measure a photon that is in transit from Alice to Bob, and Eve uses a measurement (rectilinear or diagonal) that is incompatible with the polarity of the photon, that measurement will randomly change the polarity of that photon. Eve cannot measure the photon both rectilinearly and diagonally due to Heisenberg Therefore, eavesdropping is easy to detect.

BB84 Scheme for QKD Created by Bennett and Brassard in 1984. Uses a quantum channel for transmitting the key Uses a public channel for key reconciliation. In the real world, Alice and Bob share a small secret key that is used for authentication in public channel.

BB84 Steps Alice sends Bob photons with polarizations chosen at random. For each photon, Bob chooses at random the type of measurement – rectilinear or diagonal. Bob records the results of his measurements but keeps them a secret.

BB84 Steps (cont’d) Bob publicly announces the type of measurements (not polarities) he made and Alice tells him which measurements were of the correct type. Alice and Bob keep all cases in which Bob measured the correct type. Should have same photon polarities. These are translated into bits (0º and 45º = 0, 90º and 135º = 1.

BB84 Steps (cont’d) Bob and Alice test for eavesdropping by publicly comparing and discarding a randomly selected subset of their polarization data. Problem: can result in a small key As an alternative Alice and Bob could test the parity of a randomly chosen subset of the key data. This allows for a much larger key.

BB84 Demo Demonstrates the BB84 QKD scheme. Allows user to see the effects that eavesdropping has on BB84. Can test both standard technique and parity modification.

Conclusion Classical Cryptography has served us well thus far but is inherently flawed. Private-key: keys must be private Public-key: based on unproven mathematical assumptions In danger due to Shor’s algorithm for factoring large integers Quantum Cryptography is totally secure Based on unbreakable laws of physics Easily able to detect eavesdropping