1 candidate: Vadim Makarov Quantum cryptography and quantum cryptanalysis Defence for the degree doktor ingeniør at the Norwegian University of Science.

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Implementation of Practically Secure Quantum Bit Commitment Protocol Ariel Danan School of Physics Tel Aviv University September 2008.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Chromatic Dispersion Measurement methods  Pulse Delay Method (time-of-flight) ‏ IEC / ITU-T G650.1 EIA/TIA-455- FOTP-175-B  Phase Shift Method.
Trojan-horse attacks on practical continuous-variable quantum key distribution systems Imran Khan, Nitin Jain, Birgit Stiller, Paul Jouguet, Sébastien.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Economic Stimulus : Valorization of Single Photon Detectors and Quantum Key Distribution Systems Hugo Zbinden Group of Applied Physics (GAP), UNIGE NCCR.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Single Photon Quantum Encryption Rob Grove April 25, 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
CRYPTOGRAPHY Lecture 10 Quantum Cryptography. Quantum Computers for Cryptanalysis Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
GAP Optique Geneva University 1 Quantum Communications at telecom wavelengths Nicolas Gisin Hugo Zbinden Toni Acin, Claudio Bareiro, Sylvain Fasel, J.-D.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Analysis of Phase Noise in a fiber-optic link
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
Security of practical quantum cryptography with heralded single photon sources Mikołaj Lasota 1, Rafał Demkowicz-Dobrzański 2, Konrad Banaszek 2 1 Nicolaus.
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006.
Trondheim 2003 NTNU Vadim Makarov Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
Optical Receivers Theory and Operation
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Optics II – Cozumel December 2004 Quantum key distribution with polarized coherent states Quantum Optics Group Instituto de Física “Gleb Wataghin”
Quantum Cryptography Antonio Acín
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
SPL waveguide distribution system Components, configurations, potential problems D. Valuch, E. Ciapala, O. Brunner CERN AB/RF SPL collaboration meeting.
Lecture 11: Quantum Cryptography Wayne Patterson SYCS 654 Spring 2009.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
OptiSystem applications: Photodiode sensitivity modelling
Quantum Key Distribution in the GÉANT network
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
QUANTUM CRYPTOGRAPHY.
Weak Value Assisted Quantum Key Distribution
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
By Jeff Hinson CS691, Summer 2009
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Brandin L Claar CSE 597E 5 December 2001
Quantum Information with Continuous Variables
Lecture 14: Blocking and Catching Photons Background
Quantum Cryptography Scott Roberts CSE /01/2001.
Fiber Optic Transmission
Fibre Optic Transmission
Presentation transcript:

1 candidate: Vadim Makarov Quantum cryptography and quantum cryptanalysis Defence for the degree doktor ingeniør at the Norwegian University of Science and Technology, April 30, 2007 SPbSPU St. Petersburg State Polytechnic University

2 ca First commercial offers Concept (“money physically impossible to counterfeit”) Market? 1984Key distribution protocol (BB84) 1989Proof-of-the-principle experiment 1993Key transmission over fiber optic link Quantum cryptography timeline

3 Encoder Decoder Open (insecure) channel BobAlice Key Secure channel Message Encoded message  Secret key cryptography requires secure channel for key distribution.  Quantum cryptography distributes the key by transmitting quantum states in open channel. Key distribution

4 Retained bit sequence 1 – – – – 1 – 0 Bob’s measurement Bob’s detection basis Alice’s bit sequence Light source Alice Bob Diagonal detector basis Horizontal- vertical detector basis Diagonal polarization filters Horizontal-vertical polarization filters Image reprinted from article: W. Tittel, G. Ribordy, and N. Gisin, "Quantum cryptography," Physics World, March 1998 Quantum key distribution

5  A = – 45  or + 45  : 0 Detector bases:  B = – 45  : X  B = + 45  : Z  A = +135  or – 135  : 1  A Light source D 0  B AliceBob L A S A Transmission line S B L B D 1 Interferometric QKD channel

6 Quantum cryptography at NTNU Fiber optic QKD setup 1. Optimal tracking of phase drift 2. Single photon detector with afterpulse blocking Security against practical attacks 3. Large pulse attack: experiment 4. Faked states attack 5. Detector efficiency mismatch BOB

7 QKD setup

8 Photo 1. Alice (uncovered, no thermoisolation installed)

9 Photo 2. Bob (uncovered, no thermoisolation installed)

10 Tracking phase drift To get phase accuracy Δφ within ±10° (QBER opt   1%), no more than N a = ~ 200 detector counts per adjustment are required. Optimally counted at ±90° points from the extreme of the interference curves. Exact required number of counts where k is the number of standard deviations of not exceeding Δφ. J. Appl. Opt. 43, 4385 (2004)

11 Tracking phase drift ++ –– min Time J. Appl. Opt. 43, 4385 (2004) To get phase accuracy Δφ within ±10° (QBER opt   1%), no more than N a = ~ 200 detector counts per adjustment are required. Experiment: adjustment every 3 s, N a = 230:

12 Test of QKD in laboratory conditions Test run No. 2 QBER =. 5.7 % average QBER, % min Time Test run No. 1 best QBER ~ 4 % QBER, % min Time

13 t gate down to 1ns Gate pulse rate = 20 MHz VEVE V bias VBVB t T=1/ (Gate pulse rate) t gate –V APD Single photon detector: avalanche photodiode in Geiger mode APD: Ge FD312L T=77K, QE=16%, DC=5·10 –5 APD inside cryostatC = C APD Differential amplifier 50  coaxial cables Gate pulse generator Bias

14 Afterpulse blocking  In QKD systems, probability of detecting a photon per pulse is always much lower than 1 (e.g., ~ 1/1000). This makes afterpulse blocking efficient, allowing without much loss in detection probability:  In our QKD system: 20 MHz gate pulse rate  In principle: a few orders of magnitude faster gate pulse rate –V APD Detector output Hold-off time: N pulses are blocked after detecting avalanche t VBVB t

15 Hardware implementation of afterpulse blocking APD Differential amplifier Gate pulse generator Bias RF switch  = Set Reset Trigger ComparatorIntegrator Digital output 00 N set by switch CLK Load Counter Overflow

16 Test of afterpulse blocking APD: Ge FD312L Gate pulse rate = 12 MHz QE = 7% T = 77K N

17 1. Conventional security; trusted equipment manufacturer 2. Security against quantum attacks – security proofs for idealized model of equipment 3. Loopholes in optical scheme – imperfections not yet accounted in the proof Quantum key distribution: components of security AliceBob

18 Large pulse attack Alice Line Attenuator Alice’s PC Eve’s equipment Phase modulator – interrogating Alice’s phase modulator with powerful external pulses (can give Eve bit values directly)

19 Large pulse attack: experiment Laser 4% reflection V mod OTDR Out In Fine length adjustment to get L 1 = L 2 L2L2 L1L1 Received OTDR pulse V mod, V Variable attenuator Alice Phase modulator Eve J. Mod. Opt. 48, 2023 (2001)

20 Photo 3. Artem Vakhitov tunes up Eve’s setup

21 Conventional intercept -resend: Faked states attack: BA FSB EVE A B BA ALARM!!! (no alarm) Faked states attack J. Mod. Opt. 52, 691 (2005)

22 BOB Exploiting common imperfection: detector gate misalignment Phys. Rev. A 74, (2006)

23 BOB Laser pulse from Alice Detector gate misalignment Phys. Rev. A 74, (2006)

24 BOB Detector gate misalignment Phys. Rev. A 74, (2006)

25 BOB Detector gate misalignment Phys. Rev. A 74, (2006)

26 Example: Eve measured with basis Z (90°), obtained bit 1 0°0° BOB Detector gate misalignment (Eve resends the opposite bit 0 in the opposite basis X, shifted in time)

27 (Eve resends the opposite bit 0 in the opposite basis X, shifted in time) Example: Eve measured with basis Z (90°), obtained bit 1 90° BOB Eve’s attack is not detected Eve’s attack is not detected Eve obtains 100% information of the key Eve obtains 100% information of the key Detector gate misalignment

28 Detector efficiency t 0 t0t0 t1t1  0 (t 0 )  1 (t 0 )  0 (t 1 )  1 (t 1 ) Partial efficiency mismatch

29 Partial efficiency mismatch  In the symmetric case (when  1 (t 0 )/  0 (t 0 ) =  0 (t 1 )/  1 (t 1 ) ), Eve causes less than 11% QBER if mismatch is larger than 1:15 A. Practical faked states attack: B. General security bound (incomplete): where

30 Detector model 1. Sensitivity curves

31 Detector model 2. Sensitivity curves at low photon number µ=0.5

32 Detector efficiency mismatch  Detector efficiency mismatch is a problem for many protocols and encodings: BB84 (considered above), SARG04, phase-time, DPSK and Ekert protocols.  Control parameter t that changes detector efficiencies shall not be necessarily timing; it can be, e.g., wavelength or polarization.  The worst-case mismatch, no matter how small, must be characterized and accounted for during privacy amplification. [quant-ph/ ]

33 Conclusion  A phase tracking technique and detector with afterpulse blocking were successfully developed. (QKD was demonstrated with a very limited success.)  Our group has built unique expertise in quantum cryptanalysis of attacks via optical loopholes. Several attacks have been proposed, studied in detail, and protection measures suggested.

34 Possible future research  Continuing security studies beyond those presented in the thesis; we have experimented with passively-quenched Si APD; we are trying to incorporate detector efficiency mismatch into general proof... With sufficient financing, a study of high-power damage can be attempted.  Improving the QKD experiment, demonstrating it over at least ~ 20 km distance. Performance of detector and phase tracking can be more accurately characterized.  The QKD field is abound with novel ideas that can be tried...

35 Optional slides

36 Handling errors in raw key R = 1 – 2 h(QBER)

37  MagiQ Tecnologies USA  id Quantique Switzerland Standard VPN router + QKD equipment for frequent key changes Several other companies also have the QKD technology, but are not selling yet Commercial offers (as of late 2006)

38 Photo 4. Bob (left) and Alice (right), thermoisolation partially installed

39 Typical values of reflection coefficients for different fiber-optic components (courtesy Opto-Electronics, Inc.)

40 ( Eve’s basis = Bob’s basis ) is sufficient for eavesdropping Alice Eve’s basis det. result Bob Incompatible basis – discarded by Alice and Bob during sifting

41 Security state of QKD system ( reduced rate at QBER=0 line, too )

42 Trondheim St. Petersburg