IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

Quantum Cryptography Nick Papanikolaou Third Year CSE Student
Modern Physics 5/10/11 Spring 2011 Ben Miller, Alexander DeCarli, Kevin Shaw.
Ilja Gerhardt QUANTUM OPTICS CQT GROUP Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Entanglement-based Free.
QUANTUM CRYPTOGRAPHY ABHINAV GUPTA CSc Introduction [1,2]  Quantum cryptography is an emerging technology in which two parties can secure network.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Quantum Key Distribution (QKD) John A Clark Dept. of Computer Science University of York, UK
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Universal Optical Operations in Quantum Information Processing Wei-Min Zhang ( Physics Dept, NCKU )
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Quantum Key Distribution Yet another method of generating a key.
Introduction to Quantum Cryptography Dr. Janusz Kowalik IEEE talk Seattle, February 9,2005.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Rita Pizzi Department of Information Technology Università degli Studi di Milano.
Quantum Cryptography Marshall Roth March 9, 2007.
Quantum Entanglement David Badger Danah Albaum. Some thoughts on entanglement... “Spooky action at a distance.” -Albert Einstein “It is a problem that.
Future Challenges in Long-Distance Quantum Communication Jian-Wei Pan Hefei National Laboratory for Physical Sciences at Microscale, USTC and Physikalisches.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Cryptography December, 3 rd 2007 Philippe LABOUCHERE Annika BEHRENS.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Cryptography Instructor : Dr. Yanqing Zhang Presented by : Rajapaksage Jayampthi S.
Two vertical-cavity surface-emitting lasers (VCSEL’s) are used at Alice, as sources of the two encoded states. Both outputs are then attenuated to achieve.
Gagan Deep Singh GTBIT (IT) August 29,2009.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Purdue University Spring 2014 Prof. Yong P. Chen Lecture 5 (2/3/2014) Slide Introduction to Quantum Optics &
QUANTUM TELEPORTATION
April 12, 2006 Berk Akinci 1 Quantum Cryptography Berk Akinci.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Trondheim 2003 NTNU Vadim Makarov Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
Trondheim 2002 NTNU Quantum Cryptography FoU NTNU Vadim Makarov and Dag R. Hjelme Institutt for fysikalsk elektronikk NTNU Norsk kryptoseminar,
Quantum Key Distribution Chances and Restrictions Norbert Lütkenhaus Emmy Noether Research Group Institut für Theoretische Physik I Universität Erlangen-Nürnberg.
Introduction to Quantum Key Distribution
Quantum Cryptography Physics 43, SRJC.Spring 11 May 9, 2011 Chris Wenrich Homer Van Grinsimpson aka Seth Van Grinsven James Anderson.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography: Quantum Key Distribution CSE 825.
Copyright © 2006 Keio University Applications of an Entangled Quantum Internet Conference on Future Internet Technologies Seoul, Korea June 20, 2008 Rodney.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
1 Content IP-SECOQC – Consortium, Funding What is Quantum Cryptography? Project Goals / Project Structure Standard Related Issues: –In Quantum Key Distribution.
Nawaf M Albadia
Quantum Information Science The size of transistors decreases by half every eighteen months Intel’s 20 and 45 nm transistor Laser MRI Information Theory.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Applications of Quantum Cryptography – QKD CS551/851CRyptographyApplicationsBistro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
FMSO conducts unclassified research of foreign perspectives of defense and security issues that are understudied or unconsidered but that are important.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Optics II – Cozumel December 2004 Quantum key distribution with polarized coherent states Quantum Optics Group Instituto de Física “Gleb Wataghin”
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
A quantum leap: Researchers create super-secure computer network Seungjai Min Hansang Bae Hwanjo Heo.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Christopher Monroe Joint Quantum Institute and Department of Physics NIST and University of Maryland Quantum Computation and Simulation.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
QUANTUM CRYPTOGRAPHY.
Quantum Cryptography Quantum Computing
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
DEPARTMENT OF COMPUTER SCIENCE
Brandin L Claar CSE 597E 5 December 2001
Quantum Cryptography Scott Roberts CSE /01/2001.
Presentation transcript:

IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems th International conference on Information and Intelligent Systems IIS 2004, Varazdin, Croatia Quantum Experiments and the Foundations of Physics, Vienna 1 University of Zagreb, Faculty of Electrical Engineering and Computing 2

IIS 2004, CroatiaSeptember 22, 20042/13 Overview Problems in cryptography (key distribution, quantum algorithm for fast factorization) What is Quantum Cryptography (QC)? (quantum key distribution, protocols: BB84 and EPR) Technology and current status (quantum optics and fibers, first BB84 commercial product in 2002, first application outside laboratory - world first bank transfer in Vienna 2004, EPR QC) Future considerations (EU SECOQC project with 11.4 million EUR investment, long distance Quantum Cryptography, Quantum networks, space applications,...) Who is working? (Vienna group, Geneva, Munich, BBN Tech., NIST, MIT,…)

IIS 2004, CroatiaSeptember 22, 20043/13 Problems in cryptography Alice and Bob want to communicate. Alice encrypts the message (3DES, IDEA) with a key. How can Bob receive the key, over a public channel and Eve, which is needed for decryption of the message? Today, only two practical solutions: Public Key Cryptography (PKC) and Quantum Key Distribution (QKD) often known as Quantum Cryptography (QC); Also, one not so practical solution: face-to-face meeting. Problem: PKC relies on unproven mathematical assumption - prime factorization is hard! Is it? It’s not! Shor’s quantum algorithm for fast prime factorization, Soon, it could be implemented! Market and companies want perfect security which doesn’t depend on computational power (quantum or classical computers)! QKD is the solution!

IIS 2004, CroatiaSeptember 22, 20044/13 What is Quantum Cryptography? Engineering Electronic circuits, digital electronics, FPGA, detectors. Physics Quantum mechanics, Quantum optics, photon sources, fibers, lasers. Computer Science and Mathematics Communication complexity, Computer networks, Cryptography, Quantum Information Theory. Method of simultaneous generation of a random key for secure data communication at two different locations, by measuring the appropriate properties of quantum particles, e.g. the polarisation of single or entangled photons. Today, in general, two main protocols: BB84 and EPR (Einstein Podolsky Rosen).

IIS 2004, CroatiaSeptember 22, 20045/13 A view on BB84 protocol (1/2) Proposed in 1984 by Charles H. Bennet (IBM) and Gilles Brassard (Montreal). Implemented in 1990, authors of BB84. Based on polarizations of single photons! First shown over 32 cm of free-space distance with LED. Today, many implementations, some over 50 km through free-space and fiber optics. Two channels: public channel (Internet or telephone) and quantum channel (optical fiber or a free-space optical link). Pulses of polarized light with single photon, only in theory. In experiments, one pulse - a few photons (not good). Photon is either vertically (90  ) or horizontally (0  ) polarized (base  ). In another base , we have diagonal polarization: photon is polarised either 45  or 135 . 4 possible states in which a photon could be prepared! Security is reached due to no-cloning theorem and Heisenberg’s uncertainty principle!

IIS 2004, CroatiaSeptember 22, 20046/13 A view on BB84 protocol (2/3)

IIS 2004, CroatiaSeptember 22, 20047/13 A view on BB84 protocol (3/3)

IIS 2004, CroatiaSeptember 22, 20048/13 A view on EPR protocol Proposed by Arthur Ekert (Oxford, now Cambridge UK) in 1991; implemented in 1999 by group of Prof. Zeilinger (Vienna). Using polarization of pairs of entangled photons (quantum mechanical property, EPR paradox: “do-on-photon1-and-get-on- photon2”, no one knows why it works, but it works! Also used in quantum teleportation experiments) Problems: on pairs of photons/s entangled pairs + low efficiency of fiber optics (-0.2db/km) gives on 100km only ~ 500 pairs/s. Key rate after error correction ~ 1 kb/s. Needed more, close to ~ 1Mb/s! Limited distances ~ up to 23 km (for now). Advantages: single photons, inherent randomness, much secure than BB84, future technology for long distances. Jennewein et al. Quantum cryptography with entangled photons, 1999, Vienna.

IIS 2004, CroatiaSeptember 22, 20049/13 Technology and current status (1/2) BB84 is easy to implement by using weak laser pulses. Problems in generation of single photons - pulses often contain a few photons (weakness, all carry same information - bit, can be used by eavesdropper in beam splitting attack). Quantum channel information can be lost due to decoherence - error rate is increased, final key rate is decreased due to error correction methods. Problems in both BB84 and EPR protocol: key bit rate is ~ 1 kb/s. Needed more ~ 1 Mb/s! Current max. distance achieved with fibers is ~ 50 km (BB84). Free-space quantum channel: problems with photon detection due to atmospheric perturbations and ambient light. Current applications: ~ 2 km, can go up to 23 km (EPR QC). Experiments in progress. Work on quantum memories, quantum teleportation and quantum swapping - technology for long distance quantum communication; also for EPR Quantum Cryptography (both fiber and free-space).

IIS 2004, CroatiaSeptember 22, /13 Technology and current status (2/2) First commercial product in 2002, ID Quantique - BB84 QC system over 67 km, weak laser pulses through optical fiber. World first bank transfer using EPR QC, Quantum Experiments and the Foundations of Physics group, Vienna, Word first quantum network based on BB84 QC system, BBN Technologies, Network connects Boston University and Harvard.

IIS 2004, CroatiaSeptember 22, /13 Future considerations (1/2) Development of global secure network based on Quantum Cryptography - SECOQC project (11.4 million EUR), Sixth Framework Programme, Priority (2) of the EU (April ), Countries involved: Republic of Austria, Belgium, UK, Canada, the Chez Republic, the Kingdom of Denmark, the French Republic, the Federal Republic of Germany, the Italian Republic, the Russian Federation, the Kingdom of Sweden, and the Swiss Confederation. QSpace project: Quantum communication in space (hard but feasible), ESA project, important for applications of Quantum Cryptography on long distances ~ 1000 km. Development of Quantum networks and needed infrastructure: quantum memories, error correction algorithms and privacy amplification methods,… Work on enhancement of optical devices - detectors and sources of photons. Free Space II - free-space EPR QC in Vienna over 8 km

IIS 2004, CroatiaSeptember 22, /13 Future considerations (2/2)8km FreeSpace II - The Next Generation EPR QC via free-space 7,2km 8km Kufner - Sternwarte Twintowers Millenniumstower

IIS 2004, CroatiaSeptember 22, /13 Who is working? Quantum Cryptography in Vienna in Quantum Experiments and Foundations of Physics group - World first experimental quantum teleportation (1997), world first EPR QC (1999), world first bank transfer with EPR QC (2004, Vienna). Geneva group - Swiss Munich group - Germany NIST Companies: ID Quantique (in 2002, first commercial QC system, BB84 type ) and MagiQ BBN Technologies Recently connected two campuses (Boston University and Harvard, US) with QC - BB84 type, also developing quantum network infrastructure, Sponsored by DARPA. Many other groups in Europe (UK, Germany, Norway,…) and US (MIT, Stanford, BU, Harvard …)