KEMBAR78
Quantum Information Quantum Key Distribution: Aeysha Khalique Sns-Nust | PDF | Cryptography | Security Technology
0% found this document useful (0 votes)
75 views19 pages

Quantum Information Quantum Key Distribution: Aeysha Khalique Sns-Nust

The document discusses cryptography, quantum key distribution, and related topics. It introduces cryptography, perfect secrecy, quantum bits, and quantum key distribution. It describes how quantum key distribution uses quantum bits and the principles of complementarity and the no-cloning theorem to generate and distribute encryption keys with perfect secrecy. The document outlines the basic protocol for quantum key distribution, including how Alice and Bob can detect eavesdropping and perform error correction and privacy amplification.

Uploaded by

Ms Physics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views19 pages

Quantum Information Quantum Key Distribution: Aeysha Khalique Sns-Nust

The document discusses cryptography, quantum key distribution, and related topics. It introduces cryptography, perfect secrecy, quantum bits, and quantum key distribution. It describes how quantum key distribution uses quantum bits and the principles of complementarity and the no-cloning theorem to generate and distribute encryption keys with perfect secrecy. The document outlines the basic protocol for quantum key distribution, including how Alice and Bob can detect eavesdropping and perform error correction and privacy amplification.

Uploaded by

Ms Physics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Quantum Information
Quantum Key Distribution

Aeysha Khalique
SNS-NUST

March 31, 2020

Aeysha Khalique, NUST Pakistan Quantum information 2020 1/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Table of contents

1 Cryptography

2 Perfect Secrecy

3 Quantum Bits

4 Quantum Key Distribution

Aeysha Khalique, NUST Pakistan Quantum information 2020 2/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Cryptography

Aeysha Khalique, NUST Pakistan Quantum information 2020 3/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Classical Cryptography

Aeysha Khalique, NUST Pakistan Quantum information 2020 4/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Secure communication: Cryptography

Aeysha Khalique, NUST Pakistan Quantum information 2020 5/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Perfect Secracy

One Time Pad: The Vernam Cipher (1926)

Aeysha Khalique, NUST Pakistan Quantum information 2020 6/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Solution to Cryptography

Aeysha Khalique, NUST Pakistan Quantum information 2020 7/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Quantum bits

Aeysha Khalique, NUST Pakistan Quantum information 2020 8/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Measuring a quantum bit

Aeysha Khalique, NUST Pakistan Quantum information 2020 9/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Polarization as quantum bit

Aeysha Khalique, NUST Pakistan Quantum information 2020 10/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Polarization as quantum bit: Non-orthogonal basis

Aeysha Khalique, NUST Pakistan Quantum information 2020 11/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Complementary Measurements

Aeysha Khalique, NUST Pakistan Quantum information 2020 12/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

The Idea Behind: Characteristic Quantum Features

Aeysha Khalique, NUST Pakistan Quantum information 2020 13/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Quantum Key Distribution (QKD)

- C. H. Bennett and G. Brassard, in the proceedings of IEEE international conference on computers, India (1984).

Aeysha Khalique, NUST Pakistan Quantum information 2020 14/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Where is Eve

Aeysha Khalique, NUST Pakistan Quantum information 2020 15/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Eve’s Attack

Aeysha Khalique, NUST Pakistan Quantum information 2020 16/19


Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Next in QKD Protocol

EC: Error Correction CC: Classical Communication


PA: Privacy Amplification
Aeysha Khalique, NUST Pakistan Quantum information 2020 17/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Error Correction
Alice and Bob randomly permute their bits
Alice and Bob pair up their pairs and share which bits they
have paired up
They compute the XOR value of their pairs, each on its own
side
They announce their XOR value
If the value is same both discard one bit of each and keep the
other
They do many rounds of above process

See how it reduces error and increases Eve’s information


Aeysha Khalique, NUST Pakistan Quantum information 2020 18/19
Cryptography Perfect Secrecy Quantum Bits Quantum Key Distribution

Privacy Amplification

Alice and Bob randomly permute their bits


Alice and Bob pair up their pairs and share which bits they
have paired up
They compute the XOR value of their pairs, each on its own
side
They do not announce the XOR value but keep the XOR
value and through away the bits
They do many rounds of above
See how it reduces Eve’s information? If Eve’s information
before the first round was 60%, what will be her information
after first round?

Aeysha Khalique, NUST Pakistan Quantum information 2020 19/19

You might also like