Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Efficient Lattice (H)IBE in the standard model Shweta Agrawal, Dan Boneh, Xavier Boyen.
Slide 1 Insert your own content. Slide 2 Insert your own content.
Symmetric Encryption Prof. Ravi Sandhu.
0 - 0.
Addition Facts
Cryptography encryption authentication digital signatures
RSA.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
1 Pretty Good Privacy (PGP) Security for Electronic .
Public Key Cryptosystem
Quantum Cryptography Nick Papanikolaou Third Year CSE Student
1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Use of Time as a Quantum Key By Caleb Parks and Dr. Khalil Dajani.
Addition 1’s to 20.
1 Complexity ©D.Moshkovitz Cryptography Where Complexity Finally Comes In Handy…
Intro to Quantum Cryptography Algorithms Andrew Hamel EECS 598 Quantum Computing FALL 2001.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
BY : Darshana Chaturvedi.  INTRODUCTION  RSA ALGORITHM  EXAMPLES  RSA IS EFFECTIVE  FERMAT’S LITTLE THEOREM  EUCLID’S ALGORITHM  REFERENCES.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
Quantum Cryptography Marshall Roth March 9, 2007.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CSE331: Introduction to Networks and Security Lecture 20 Fall 2002.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
CS4600/5600 Biometrics and Cryptography UTC/CSE
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Cryptography By, Anthony Lonigro & Valentine Mbah.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Quantum cryptography CS415 Biometrics and Cryptography UTC/CSE.
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Introduction to Quantum Key Distribution
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Computers by Ran Li.
Nawaf M Albadia
ENCRYPTION TAKE 2: PRACTICAL DETAILS David Kauchak CS52 – Spring 2015.
Cryptography Lecture 2 Arpita Patra. Recall >> Crypto: Past and Present (aka Classical vs. Modern Cryto) o Scope o Scientific Basis (Formal Def. + Precise.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Encryption and Integrity
J. Miranda University of Ottawa 21 November 2003
COMPSCI 290.2: Computer Security
Quantum Cryptography Quantum Computing
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
B504/I538: Introduction to Cryptography
Quantum Cryptography Alok.T.J EC 11.
Quantum Cryptography Scott Roberts CSE /01/2001.
Cryptography and Cryptanalysis
Presentation transcript:

Slide 1 Introduction to Quantum Cryptography Nick Papanikolaou

Slide 2 The Art of Concealment To exchange sensitive information, encryption is used To exchange sensitive information, encryption is used Encryption schemes in use today are under serious threat by quantum computers Encryption schemes in use today are under serious threat by quantum computers The study of Quantum Computing and Quantum Information has yielded: The study of Quantum Computing and Quantum Information has yielded: –ways of breaking codes –ways of making better codes

Slide 3 This Talk About Cryptography About Cryptography Making Quantum Codes Making Quantum Codes Breaking Classical Codes Breaking Classical Codes Announcement: Nicks office hours (Rm 327): Tuesdays 3-4pm Thursdays 2-3pm

Slide 4 Cryptography Cryptography is the science of encoding and decoding secret messages. Cryptography is the science of encoding and decoding secret messages. Most common form: Symmetric Cryptography Most common form: Symmetric Cryptography Message M, Key K Message M, Key K Encryption: enc(M,K) = c Encryption: enc(M,K) = c Decryption: M = dec(c,K) Decryption: M = dec(c,K)

Slide 5 Classical Cryptography [2] We assume that the key has been already secretly shared between sender/receiver. We assume that the key has been already secretly shared between sender/receiver. Sender enc(M,K) = c Receiver M = dec(c,K) Eavesdropper dec(c,???)

Slide 6 Perfect Cryptosystems In order to decipher the message M, the eavesdropper needs to know the key K. In order to decipher the message M, the eavesdropper needs to know the key K. Assuming K is completely secret, a perfect cryptosystem can be used. Assuming K is completely secret, a perfect cryptosystem can be used. –Perfect cryptosystem: H(C|K)=H(C) Example: One-Time Pad Example: One-Time Pad –Use a different key each time, equal in length to the message

Slide 7 Key Distribution How do you exchange the key securely in the first place? How do you exchange the key securely in the first place? SenderK ReceiverK Eavesdropper K

Slide 8 QKD Quantum mechanics gives us a way of ensuring that an eavesdropper, if present, is always detected. Quantum mechanics gives us a way of ensuring that an eavesdropper, if present, is always detected. This is called Quantum Key Distribution. This is called Quantum Key Distribution. Main Idea: Main Idea: –Encode each bit of the key as a qubit.

Slide 9 Photons as Qubits A qubit holds a single quantum state. A qubit holds a single quantum state. –Can be in any mixture of basis states. –The polarization of a single photon can be used as a qubit. Rectilinear Basis or

Slide 10 The Diagonal Basis We can also encode a qubit as a photon in the diagonal basis: We can also encode a qubit as a photon in the diagonal basis: Diagonal Basis or

Slide 11 Quantum Measurement Observing a photon changes its state. Observing a photon changes its state. Calcite Crystal

Slide 12 Measurement [2] If a photon is measured using the wrong polarization angle for the crystal, then the result will be If a photon is measured using the wrong polarization angle for the crystal, then the result will be –Correct with probability 50% –Incorrect with probability 50% Therefore, if an eavesdropper made a measurement in the wrong basis, his result would be random and he would be detected. Therefore, if an eavesdropper made a measurement in the wrong basis, his result would be random and he would be detected.

Slide 13 Review of QKD The basic idea is that each bit in the key is mapped to a photon with a specific polarization. The basic idea is that each bit in the key is mapped to a photon with a specific polarization. e.g.: e.g.: Bases: Bases: Photons: Photons:

Slide 14 Eavesdropping An eavesdropper can choose a basis for decoding at random. For previous example: An eavesdropper can choose a basis for decoding at random. For previous example: Photons received: Photons received: Bases chosen: Bases chosen: Result: ? ? 0 1 ? ? ? Result: ? ? 0 1 ? ? ? To get all of n bits correctly, probability is only 0.5 n To get all of n bits correctly, probability is only 0.5 n So for 64 bits, eavesdropper only has chance of getting the right answer. So for 64 bits, eavesdropper only has chance of getting the right answer.

Slide 15 Breaking Classical Codes Invented a quantum algorithm for efficiently finding the prime factors of large numbers. Classical factoring algorithms: O((log N) k ) Shors algorithm: O(log N) Peter Shor, ATT Labs If computers that you build are quantum, Then spies of all factions will want 'em. Our codes will all fail, And they'll read our , Till we've crypto that's quantum, and daunt 'em.

Slide 16 Afterword Einstein was a giant. Einstein was a giant. His head was in the clouds, But his feet were on the ground. But for those of us who are not that tall, We have to choose somewhere inbetween. - Richard Feynman, on quantum mechanics