* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download quantum cryptography - 123SeminarsOnly.com
Quantum decoherence wikipedia , lookup
Particle in a box wikipedia , lookup
Path integral formulation wikipedia , lookup
Topological quantum field theory wikipedia , lookup
Hydrogen atom wikipedia , lookup
Measurement in quantum mechanics wikipedia , lookup
Scalar field theory wikipedia , lookup
Probability amplitude wikipedia , lookup
Quantum dot wikipedia , lookup
Copenhagen interpretation wikipedia , lookup
Bell test experiments wikipedia , lookup
Renormalization wikipedia , lookup
Quantum field theory wikipedia , lookup
X-ray fluorescence wikipedia , lookup
Quantum fiction wikipedia , lookup
Symmetry in quantum mechanics wikipedia , lookup
Coherent states wikipedia , lookup
Density matrix wikipedia , lookup
Quantum entanglement wikipedia , lookup
Many-worlds interpretation wikipedia , lookup
Orchestrated objective reduction wikipedia , lookup
Wave–particle duality wikipedia , lookup
Quantum computing wikipedia , lookup
Bell's theorem wikipedia , lookup
Double-slit experiment wikipedia , lookup
Interpretations of quantum mechanics wikipedia , lookup
Quantum group wikipedia , lookup
Quantum machine learning wikipedia , lookup
Canonical quantization wikipedia , lookup
Quantum state wikipedia , lookup
EPR paradox wikipedia , lookup
Theoretical and experimental justification for the Schrödinger equation wikipedia , lookup
Wheeler's delayed choice experiment wikipedia , lookup
Quantum electrodynamics wikipedia , lookup
Bohr–Einstein debates wikipedia , lookup
History of quantum field theory wikipedia , lookup
Quantum teleportation wikipedia , lookup
Hidden variable theory wikipedia , lookup
QUANTUM CRYPTOGRAPHY GUNA GOBINDA BORUAH -080326 B-TECH CSE-Vth SEM PARAG JYOTI BARMAN -080512 B-TECH IT-Vth SEM 15/12/2010 Acknowledgement First of all we would like to thank all the people who are behind the successful completion of this project. We also like to thank the concerned teacher for their great support and encouragements in making this project a success. Lastly we would like to state that this project has been done with outmost care has all the minute information regarding the topic. 2 Contents 1. Abstract 4 2. Introduction 5-6 3. Symmetric key cryptography 7-8 4. The Development of Quantum Theory 9-10 5. The Advent of Quantum Cryptography 11-13 6. Heisenberg Uncertainty Principal 13 7. Photon Polarization 13-14 8. Eavesdropper Eve 15 9. Binary Information 16 10. Quantum Key Distribution 17 11. Security of Quantum Key Distribution 18 12. Conclusion 19 13. Bibliography 20 3 Abstract In October 1989 at 3 o’clock in the morning at IBM’s Thomas J. Watson Research Centre near New York, Dr. Charles Bennett and a research student named John Smolin witnessed the first ever quantum cryptographic exchange. Using polarised light photons, computers called Alice and Bob successfully negotiated a completely secure channel of communication over a distance of 32 centimetres. Quantum cryptography had now finally moved from the theoretical to the practical arena. In this report I intend to demonstrate why many scientists now view quantum cryptography as the first ever completely unbreakable cipher, which will allow people all over the world to communicate securely and privately. I shall also consider the implications which this will have on society as a whole, including potential problems for law enforcement organisations and the possible impact on civil liberties. 4 Introduction A Brief History of Cryptography Cryptography (derived from the Greek words kryptos and graphein meaning hidden writing) is the science of codes and ciphers. A cipher is essentially a cryptographic algorithm which is used to convert a message, known as the plaintext, into unreadable ciphertext. The message can then be safely transmitted without fear of letting sensitive information fall into the hands of the enemy. The first written evidence of cryptography dates back as far as 1900 BC, when an Egyptian scribe recorded information using a variation of standard hieroglyphics. The author made use of what is now known as a substitution cipher, meaning that certain hieroglyphs were substituted for others according to a set of rules. A modern equivalent of this would be if every letter in the plaintext represented another in the ciphertext, for instance swap every occurrence of the letter A in a message for B, and every B for C and so on. The first military application of cryptography came in the fifth century BC and was invented by the Spartans of Greece. Their system involved wrapping a strip of leather around a staff (known as a skytale), writing the message lengthways along the staff and then removing the leather. The markings on the leather were then unintelligible to anyone without a matching staff. In a sense the skytale could be said to be the first cryptographic key, as the only people who could read the message were those who possessed a staff of exactly the same diameter as the one used to encipher the message. Then, as now, the primary motivating factor behind cryptography development and research has been to keep military communications from the enemy. Julius Caesar used an early substitution cipher, which now bears his name, for communication with his generals. The Caesar cipher used a shift of three places along in the alphabet to convert a plaintext letter to a ciphertext one, so A enciphered to D, B to E and so on. Intruders can get the encrypted data, but cannot do anything with it. Encryption techniques are published, standardized and available to everyone. 5 Must be some bit of secret information (key) that prevent an intruder from decrypting . Symmetric key cryptography: encryption and decryption keys are identical. the key must be kept secret. The encryption and decryption functions used can be the same or different. Public key cryptography: different keys for encryption and decryption (one public, the other private). 6 Symmetric Key Cryptography Cryptographic algorithms involve substituting one thing for another, in many possible ways. Caesar cipher: Substitution with an offset of β for all letters Eg if β = 4 then a-> d b-> e there are only 25 possible keys available. Easy to break. monoalphabetic cipher: substitute one letter for another; now there are 26! possibilities. plaintext abcdefghijklmnopqrstuvwxyz ciphertext mnbvcxzasdfghjklpoiuytrewq Plaintext: bob. i love you. alice ciphertext: nkn. s gktc wky. mgsbc polyalphabetic cipher: 7 How to break simple encryption scheme • Brute force: attempt all possibilities. Simple with the Caesar cipher, but gets quite difficult with monoalphabetic or polyalphabetic ciphers. • Ciphertext-only attack: use statistics and other information to decrypt intercepted ciphertext. • Known-plaintext attack: if some of the plaintext is known, one could uncover some of the plaintext-ciphertext mappings, making decryption easier. • Chosen-plaintext attack: the intruder can choose the plaintext message and receive the ciphertext form.Can break the encryption scheme. Disadvantages of classical cryptography communicating parties need to share the keys protocols based on mathematical algorithms introduce security holes rarely on refresh their cryptography keys unproven computational assumptions Not efficient Can break Elements of the Quantum Theory • Light waves are propagated as discrete quanta called photons. • They are massless and have energy, momentum and angular momentum called spin. • Spin carries the polarization. • If on its way we put a polarization filter a photon may pass through it or may not. • We can use a detector to check of a photon has passed through a filter. 8 The Development of Quantum Theory A quantum theory of matter began to be developed around the beginning of the 20th century, in response to a series of unexpected experimental results which did not conform to the previously accepted Newtonian model of the universe. The essence of quantum theory is the realisation that elementary particles (electrons, protons, neutrons etc.) also have the ability to behave as waves. A test which neatly demonstrates this peculiar behavior, known as wave/particle duality, in light photons is the twin slit interference experiment. If light is directed at two slits in a screen the waves will radiate outwards as shown below in Fig.1: The light waves will interfere with each other in a very similar way to ripples in water. Where two peaks meet, an even greater peak (more light) is created, and where two troughs meet, an even lower trough (less light) is formed. When the light hits the back screen an ‘interference pattern’ is created: 9 So far this conforms to the accepted Newtonian universe model; but it was found that if the light was instead used to repeatedly emit just a single photon (a quantum of light) over a period of time, exactly the same interference pattern was formed on the screen. This was a startling result, and completely challenged conventional physics. When it is emitted the photon either goes through one slit, or the other. In order to produce an interference pattern the photon must have somehow affected itself. Even though it is not yet fully understood exactly how the results of the experiment occur, they cannot be disputed. Quantum theory has now found applications in many areas of electronics, such as computer processors and lower power consumption lasers in compact disc players. A particularly exciting application of quantum mechanics which is still currently in the theoretical stage is that of quantum computing. Conventional computers use binary digits (bits) set to either one or zero to perform calculations. Quantum computers, it has been proposed, could use electrons spinning either clockwise or anti-clockwise to represent ones and zeroes (qubits). If these are in a superposition of states, and not observed, all the possible states will be evaluated simultaneously and the correct answer to the calculation obtained in a fraction of the time it would have taken a standard computer. This promised leap in processing power is a real threat to the security of all currently existing ciphers. The current effectiveness of RSA could be eliminated at a stroke, so clearly there is a pressing need to preemptively develop a more resilient cipher. 10 The Advent of Quantum Cryptography Shortly before British physicist David Deutsch published the first paper proposing quantum computers in 1985, cryptologists had united quantum theory with codemaking. In the early 1980s two computer scientists, Charles Bennett a researcher for IBM, and Gilles Brassard from the University of Montreal, realised that the application of quantum theory in the field of cryptography could have the potential to create a cipher giving absolute security for eternity. Initial work was hampered by the ubiquitous problem of key distribution; if a conventional key-exchange system was used, such as RSA, any security would be quickly lost to a brute-force attack using a quantum computer. The cryptosystem developed by Bennett and Brassard uses polarised light photons to transfer data between two points. As a photon travels through space it vibrates perpendicularly to its plane of movement, the direction of vibration is known as its polarisation. For the sake of simplicity I have restricted the depicted directions of vibration to horizontal and vertical, although in actuality the photons will also move in all angles in between those shown: Polarising filters can be created from plastic polymers which will only allow light of a certain polarisation through. These filters, or Polaroids, will block photons of a diametrically opposite polarisation, but will allow those with the same polarisation through. If a light photon has up to a 45˚ difference in polarisation then the photon 11 faces a quantum decision, and approximately half of the photons will make it through and half will be blocked. Bennett and Brassard’s proposed scheme takes advantage of the fact that an observer will have no idea which angle of polarising filter should be used for a certain photon to pass successfully through. Supposing that the binary ones and zeroes of digital communication are represented respectively by, in one scheme vertically (↕) and horizontally (↔) (rectilinearly) polarised photons, and in the other left-diagonally ( ) and right-diagonally ( ) polarised photons. The sender of the message will randomly swap between the rectilinear (+) and diagonal (×) schemes, known in quantum cryptography as bases, during transmission. An eavesdropper attempting to intercept the photons will have no idea whether to use a rectilinear or diagonal filter. Around half of the time a totally inaccurate measurement will be made when a photon will change its polarisation in order to pass through an incorrect filter. The cryptosystem neatly takes advantage of one of the fundamental features of quantum theory, a manifestation of Heisenberg’s uncertainty principle 3 , that the act of observing will change the system itself. In this way it is impossible for an attacker to make an accurate measurement of the data without knowledge of which scheme is being used, essentially the cryptographic key. 12 Quantum Cryptography: Apply the phenomena of quantum physics Relies on o The Heisenberg Uncertainty principle o The principle of photon polarization Heisenberg Uncertainty Principle • Certain pairs of physical properties are related in such a way that measuring one property prevents the observer from knowing the value of the other. When measuring the polarization of a photon, the choice of what direction to measure affects all subsequent measurements. • If a photon passes through a vertical filter it will have the vertical orientation regardless of its initial direction of polarization. Photon Polarization Vertical filter 13 Tilted filter at the angle θ The probability of a photon appearing after the second filter depends on the angle θ and becomes 0 at θ = 90 degrees. The first filter randomizes the measurements of the second filter. Polarization by a filter • A pair of orthogonal filters such as vertical/horizontal is called a basis. • A pair of bases is conjugate if the measurement in the first basis completely randomizes the measurements in the second basis. • As in the previous slide example for θ = 45deg. Sender-receiver of photons • Suppose Alice uses 0-deg/90-deg polarizer sending photons to Bob. But she does not reveal which. • Bob can determine photons by using filter aligned to the same basis. • But if he uses 45deg/135 deg polarizer to measure the photon he will not be able to determine any information about the initial polarization of the photon. • The result of his measurement will be completely random 14 Eavesdropper Eve • If Eve uses the filter aligned with Alice’s she can recover the original polarization of the photon. • If she uses the misaligned filter she will receive no information about the photon. • Also she will influence the original photon and be unable to retransmit it with the original polarization. • Bob will be able to deduce Eve’s presence. 15 Binary information • Each photon carries one qubit of information • Polarization can be used to represent a 0 or 1. • In quantum computation this is called qubit. To determine photon’s polarization the recipient must measure the polarization by, for example, passing it through a filter . • A user can suggest a key by sending a stream of randomly polarized photons. • This sequence can be converted to a binary key. • If the key was intercepted it could be discarded and a new stream of randomly polarized photons sent. What is qubits? both in state 0 and state 1 can exists In classical register composed of three bits can store in a given moment of time only one out of eight different numbers Register composed of three qubits can store in a given moment of time all eight numbers in a quantum superposition 16 Quantum key distribution • Alice communicates with Bob via a quantum channel sending him photons. • Then they discuss results using a public channel. • After getting an encryption key Bob can encrypt his messages and send them by any public channel. • Both Alice and Bob have two polarizers each. • One with the 0-90 degree basis (+) and one with 45-135 degree basis ( × ) • Alice uses her polarizers to send randomly photons to Bob in one of the four possible polarizations 0, 45, 90, 135 degree. • Bob uses his polarizers to measure each • Polarization of photons he receives. • He can use the ( + )basis or the ( × ) but not both simultaneously. 17 Security of quantum key distribution • Quantum cryptography obtains its fundamental security from the fact that each qubit is carried by a single photon, and each photon will be altered as soon as it is read. • This makes impossible to intercept message without being detected. Noise • The presence of noise can impact detecting attacks. • Eavesdropper and noise on the quantum channel are indistinguishable. • (1) Malicious eavesdropper can prevent communication. • (2) Detecting eavesdropper in the presence of noise is hard. State of the Quantum Cryptography technology (1) Single photon gun (2) Being able to measure single photons. (3) Efforts are being made to use Pulsed Laser Beam with low intensity for firing single photons. (4) Detecting and measuring photons is hard. (5) The most common method is exploiting Avalanche Photodiodes in the Geiger mode where single photon triggers a detectable electron avalanche. (6) Key transmissions can be achieved for about 80 km distance ( Univ of Geneva 2001). (7) For longer distances we can use repeaters. But practical repeaters are a long way in the future. (8) Another option is using satellites. 18 Conclusion A public and practical implementation of quantum cryptography would render multi-billion dollar departments of security agencies redundant. Existing or future legislation on key escrow or mandatory key disclosure would be completely ineffective. The only way in which these agencies could continue to harvest information regarded as essential to national security would be to limit civilian access to the new technology in the same way that crypto-software’s export key lengths were restricted. The most likely implementation of quantum cryptography which resolves the hardware issue will be on a local exchange level, similar to the current telephone network. The consumers of hardware encryption solutions at the current time are restricted to governments are large corporations where speed is of great importance. The vast majority of home users are unlikely to be persuaded of the benefits of total quantum security offset against the cost of the required optical hardware. If the quantum encryption itself is performed at a local exchange, this gives security agencies the opportunity to place taps to record information before it is unbreakably encrypted. Only time will tell how cryptography will evolve in the future, the catalyst for development will be practical quantum computers which currently still lie in the realm of science fiction. The public may become more sympathetic to law enforcement and allow stringent laws limiting or prohibiting the use of unbreakable cryptography, or the reverse may occur leading to universal access to strong crypto and forcing law enforcement agencies back to more conventional and personal surveillance techniques. For the first time in the four thousand year history of the science of cryptography absolute security has been achieved, but is this state too dangerous for a modern society to tolerate? 19 Bibliography Cryptography Timeline – Carl Ellison http://world.std.com/~cme/html/timeline.html The Codebreakers – David Kahn Simon and Schuster, 1997, ISBN 0-68483-130-9 The Code Book – Simon Singh Fourth Estate, 1999, ISBN 1-85702-879-1 Cryptographic Timeline – Thinkquest.org http://library.thinkquest.org/28005/flashed/timemachine/timeline.shtml Quantum Mechanics History – J. J. O’Conner & E. F. Robertson http://www-groups.dcs.st and.ac.uk/~history/HistTopics/The_Quantum_age_begins.html Quantum Theory and Wave/Particle Duality – John K. N. Murphy http://www.hotquanta.com/wpd.html Introducing Quantum Theory – J. P. McEvoy & Oscar Zarate Icon Books, 1999, ISBN 1-84046-057-1 20