Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Quantum Information
Quantum Key Distribution
Aeysha Khalique
SNS-NUST
March 31, 2020
Aeysha Khalique, NUST Pakistan Quantum information 2020 1/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Table of contents
1 Cryptography
2 Perfect Secrecy
3 Quantum Bits
4 Quantum Key Distribution
Aeysha Khalique, NUST Pakistan Quantum information 2020 2/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Cryptography
Aeysha Khalique, NUST Pakistan Quantum information 2020 3/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Classical Cryptography
Aeysha Khalique, NUST Pakistan Quantum information 2020 4/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Secure communication: Cryptography
Aeysha Khalique, NUST Pakistan Quantum information 2020 5/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Perfect Secracy
One Time Pad: The Vernam Cipher (1926)
Aeysha Khalique, NUST Pakistan Quantum information 2020 6/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Solution to Cryptography
Aeysha Khalique, NUST Pakistan Quantum information 2020 7/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Quantum bits
Aeysha Khalique, NUST Pakistan Quantum information 2020 8/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Measuring a quantum bit
Aeysha Khalique, NUST Pakistan Quantum information 2020 9/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Polarization as quantum bit
Aeysha Khalique, NUST Pakistan Quantum information 2020 10/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Polarization as quantum bit: Non-orthogonal basis
Aeysha Khalique, NUST Pakistan Quantum information 2020 11/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Complementary Measurements
Aeysha Khalique, NUST Pakistan Quantum information 2020 12/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
The Idea Behind: Characteristic Quantum Features
Aeysha Khalique, NUST Pakistan Quantum information 2020 13/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Quantum Key Distribution (QKD)
- C. H. Bennett and G. Brassard, in the proceedings of IEEE international conference on computers, India (1984).
Aeysha Khalique, NUST Pakistan Quantum information 2020 14/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Where is Eve
Aeysha Khalique, NUST Pakistan Quantum information 2020 15/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Eve’s Attack
Aeysha Khalique, NUST Pakistan Quantum information 2020 16/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Next in QKD Protocol
EC: Error Correction CC: Classical Communication
PA: Privacy Amplification
Aeysha Khalique, NUST Pakistan Quantum information 2020 17/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Error Correction
Alice and Bob randomly permute their bits
Alice and Bob pair up their pairs and share which bits they
have paired up
They compute the XOR value of their pairs, each on its own
side
They announce their XOR value
If the value is same both discard one bit of each and keep the
other
They do many rounds of above process
See how it reduces error and increases Eve’s information
Aeysha Khalique, NUST Pakistan Quantum information 2020 18/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution
Privacy Amplification
Alice and Bob randomly permute their bits
Alice and Bob pair up their pairs and share which bits they
have paired up
They compute the XOR value of their pairs, each on its own
side
They do not announce the XOR value but keep the XOR
value and through away the bits
They do many rounds of above
See how it reduces Eve’s information? If Eve’s information
before the first round was 60%, what will be her information
after first round?
Aeysha Khalique, NUST Pakistan Quantum information 2020 19/19