Quantum data locking, enigma machines and entropic uncertainty relations Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro,

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
Fixing the lower limit of uncertainty in the presence of quantum memory Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators:
Quantum information as high-dimensional geometry Patrick Hayden McGill University Perspectives in High Dimensions, Cleveland, August 2010.
Short course on quantum computing Andris Ambainis University of Latvia.
Session 4 Asymmetric ciphers.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Block Ciphers: Workhorses of Cryptography COMP 1721 A Winter 2004.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Quantum Key Distribution Yet another method of generating a key.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Quantum Cryptography Marshall Roth March 9, 2007.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Computer Security CS 426 Lecture 3
CS4600/5600 Biometrics and Cryptography UTC/CSE
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Cryptanalysis. The Speaker  Chuck Easttom  
CS526Topic 3: One-time Pad and Perfect Secrecy 1 Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream.
EE5552 Network Security and Encryption block 4 Dr. T.J. Owens CEng MIET Dr T. Itagaki MIET, MIEEE, MAES.
Lecture 2 Overview.
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Channel Capacity.
Symmetric-Key Cryptography
CSCI 5857: Encoding and Encryption
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Lecture 2: Introduction to Cryptography
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Overview of Cryptography & Its Applications
Coherent Communication of Classical Messages Aram Harrow (MIT) quant-ph/
The Classically Enhanced Father Protocol
Nawaf M Albadia
Quantum Coding with Entanglement Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering, University of Southern.
Quantum Convolutional Coding Techniques Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering, University of.
Optimal Trading of Classical Communication, Quantum Communication, and Entanglement Mark M. Wilde arXiv: ERATO-SORST Min-Hsiu Hsieh 4 th Workshop.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
CS555Spring 2012/Topic 31 Cryptography CS 555 Topic 3: One-time Pad and Perfect Secrecy.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Quantum Cryptography Antonio Acín
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Osamu Hirota Quantum ICT Research Institute Tamagawa University, Tokyo
Unconstrained distillation capacities of
Cryptography.
Quantum Cryptography Alok.T.J EC 11.
Quantum Information Theory Introduction
Information-Theoretic Security
Presentation transcript:

Quantum data locking, enigma machines and entropic uncertainty relations Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro, Masahiro Takeoka, Mark M. Wilde Phys. Rev. X 4, (2014) QUANTUM KRISPY KREME SEMINAR --- Louisiana State University --- FEB 17

A few words on classical cryptography Quantum Data Locking Cryptographic applications Symmetric-key cryptography (from the Caesar cipher to the enigma machine) One time pad (information theoretical security) Uncertainty relations Quantum enigma machines Composability and robustness Locking noisy channels Coherent state quantum data locking QUANTUM KRISPY KREME SEMINAR --- Louisiana State University --- FEB 17

Encryption Decription THERE IS A HOUSE IN NEW ORLEANS Physical medium Alice (the sender) Bob (the receiver) THERE IS A HOUSE IN NEW ORLEANS Eve (the eavesdropper)

THERE IS A HOUSE IN NEW ORLEANS VJGTGKUCJQWUGKPPGYQTNGCPU Caesar’s cipher The secret key is the relative angle between the two discs T V H J G I VJGTGKUCJQWUGKPPGYQTNGCPU THERE IS A HOUSE IN NEW ORLEANS One letter is enough to uncover all the message! Frequency analysis

The secret key is a word Alberti’s cipher Vigenère’s cipher Plaintext Key THEREISAHOUSEINNEWORLEANS KEYKEYKEYKEYKEYKEYKEYKEYK + DLCBIGCEFYYQOMLXIUYVIOELC Frequency analysis on each sub-text A 0 B 1 C 2 …. Z 25 Summation modulo 26

The secret key is a word Alberti’s cipher Vigenère’s cipher Plaintext Key Summation modulo 2

The secret key is the initial configuration of the rotors Enigma machine Side information (espionage) AND Good algorithms (Alan Turing) AND Computational power (Bomba) = Enigma machine was cracked Long pseudo-random key from a short random key

Increasing computational power to crack

We need a secret key which is truly random --- and of same length of the plaintext. += += One time pad Secret key is truly random Encrypt by XOR operation (sum modulo 2) … … = … Plaintext Secret key Ciphertext Plaintext Secret key Ciphertext

….. Label each message with a new variable Ecryption with random secret key …. Eve try to crack the message using the best algorithm and the most powerful computer She then guess a value of the label of the message

Shannon entropy Quantify randomness and information Example: binary variable

we want it as uniform as possible Shannon entropy: Conditional entropy: Mutual information: Max number of bits of information that Eve gets about the message Equals zero if the key is truly random and has same lenght of the message += Conditional probability distr.

QUANTUM KRISPY KREME SEMINAR --- Louisiana State University --- FEB 17 Shor algorithm (asymmetric cryptography) Quantum key distribution (no cloning theorem) Quantum data locking Information theoretical security with an exponentially shorter secret key Quantum physics comes into play

Canonically conjugate variables Entropy of a Gaussian distribution Apply the log Entropic uncertainty relations For any Gaussian state

Entropic uncertainty relations Qubit example For any qubit state Basis of eigenvalues Maassen and Uffink PRL 60, 1103 (1988)

DiVincenzo et al. PRL 92, (2004) Encryption Decription Physical medium Secret key is of 1 bit If 0 If 1 use basis n-bit message

DiVincenzo et al. PRL 92, (2004) Encryption How much bits of information Eve can get at max? “Accessible Information” n-bit message Secret key is of 1 bit If 0 If 1 use basis

secret bit allows us to encrypt bits. Chose one of 2 bases secret bits allow us to encrypt bits, with K bases “Accessible Information” forwith Strong uncertainty relations for K observables Hayden et al. CMP 250, 371 (2004) Fawzi et al. J. ACM (2013) Lupo et al. arXiv:

Encryption m Physical medium The key corresponds to unitary transformation

Encryption Decription m Physical medium m The key corresponds to unitary transformation To decrypt, apply inverse unitary and measure in standard basis basis vectors

Encryption Decription m Physical medium m Single photon over d modes. Random phase-shifts generates strong data locking properties The secret key is the combination of phase shifts Lloyd, arXiv: Lupo et al. arXiv:

QUANTUM KRISPY KREME SEMINAR --- Louisiana State University --- FEB 17 Composability Robustness Locking of noisy channels Towards cryptographic applications?

Composable security: The output of the protocol is still secure if used as input of another protocol Standard security criterion in quantum cryptography. Holevo information. Guarantee composability. Accessible information criterion is not composable in general Quantum Data Locking Some other protocol Secure Secure?? Solved by a physical assumption: time-life of Eve’s quantum memory Secure

The strenght of quantum data locking is also its Achilles’ heel Example: If 1 bit can lock half of the message, then if Eve correctly guess only 1 bit she could get half of the message. Work in progress: design data locking protocol which are robust under information leakage!

All communication systems suffer from physical-layer noise Error correction should be applied to achieve reliable (enigmatized) communication Encryption Decription m m

All communication systems suffer from physical-layer noise Error correction should be applied to achieve reliable (enigmatized) communication Encryption Decription m m Noisy channel can always be complemented to a unitary transformation Eve has access to the complement of Bob output.

Thre notions of capacities: Name Symbol Requirements The price of error correction is to reduce the communication rate The capacity of the channel is the max communication rate (with zero error for asymptotically long messages) Guha et al. PRX 4, (2014) Private capacity Reliable communication from A to B. Holevo inf. secrecy. Classical capacity Reliable communication from Alice to Bob. No secrecy. Locking capacity Reliable communication from A to B. Accessible inf. secrecy.

How big is the gap between the locking capacity and the private capacity? Guha et al. PRX 4, (2014) Private capacity: 1.Composable security Locking capacity: 1.Non-composable Quantum discord (at the output of the channel) This gap can be very large (example by A. Winter) Ollivier and Zurek PRL 88, (2001)

We don’t expect strong quantum properties from semi-classical coherent-states.. Yet they are most robust and easy to prepare with current technologies. A fundamental question is if and how coherent states can be used for data locking protocols Encode information in multi-mode coherent states Mean photon number per mode bits per mode Guha et al. PRX 4, (2014) (vacuum flucutations)

Alternative to QKD. Quantum Enigma Machines may allow direct secret communication at higher rates. Locking Capacity is greater than private capacity. (Indications that the gap can be big!) Weaker security criterion. Physical assumption on Eve. Robustness problem to be solved. Explicit data locking protocol with coherent states? Lloyd, arXiv: Guha et al. PRX 4, (2014) Lupo et al. arXiv: DiVincenzo et al. PRL 92, (2004) Hayden et al. CMP 250, 371 (2004) Fawzi et al. J. ACM (2013) QUANTUM KRISPY KREME SEMINAR --- Louisiana State University --- FEB 17

Eve can measure her state and then recover Bob state This implies that Eve’s accessible information cannot be lower than Bob’s one (data processing inequality) Locking Capacity is zero for Entanglement Breaking Channels! What channels have zero locking capacity? Guha et al. PRX 4, (2014) Entanglement breaking channels have 0 locking capacity Entanglement