Awesome PowerPoint Background Template
Download
Report
Transcript Awesome PowerPoint Background Template
Slide 1
Introduction to
Quantum Cryptography
Nick Papanikolaou
[email protected]
Slide 2
The Art of Concealment
To exchange sensitive information, encryption
is used
Encryption schemes in use today are under
serious threat by quantum computers
The study of Quantum Computing and Quantum
Information has yielded:
– ways of breaking codes
– ways of making better codes
Slide 3
This Talk
1.
About Cryptography
2.
Making Quantum Codes
3.
Breaking Classical Codes
Announcement:
Nick’s office hours (Rm 327):
Tuesdays 3-4pm
Thursdays 2-3pm
Slide 4
Cryptography
Cryptography is the science of encoding
and decoding secret messages.
Most common form: Symmetric
Cryptography
Message M, Key K
Encryption: enc(M,K) = c
Decryption: M = dec(c,K)
Slide 5
Classical Cryptography [2]
We assume that the key has been already
secretly shared between sender/receiver.
Sender
Receiver
enc(M,K) = c
M = dec(c,K)
Eavesdropper
dec(c,???)
Slide 6
Perfect Cryptosystems
In order to decipher the message M, the
eavesdropper needs to know the key K.
Assuming K is completely secret, a
perfect cryptosystem can be used.
– Perfect cryptosystem: H(C|K)=H(C)
Example: One-Time Pad
– Use a different key each time, equal in length
to the message
Slide 7
Key Distribution
How do you exchange the key securely in
the first place?
Sender
Receiver
K
K
Eavesdropper
K
Slide 8
QKD
Quantum mechanics gives us a way of
ensuring that an eavesdropper, if present,
is always detected.
This is called Quantum Key Distribution.
Main Idea:
– Encode each bit of the key as a qubit.
Slide 9
Photons as Qubits
A qubit holds a single quantum state.
– Can be in any mixture of basis states.
– The polarization of a single photon can be
used as a qubit.
Rectilinear Basis
0
or
cos
sin
1
0
where , C and | |2 | |2 1
1
or
Slide 10
The Diagonal Basis
We can also encode a qubit as a
photon in the diagonal basis:
Diagonal Basis
0
1
or
or
cos
sin
1
0
where , C and | |2 | |2 1
Slide 11
Quantum Measurement
Observing a photon changes its state.
with probability cos2
Calcite Crystal
with probability sin2
0 1
0, with probability | |2
2
1
,
with
probabilit
y
|
|
Slide 12
Measurement [2]
If a photon is measured using the wrong
polarization angle for the crystal, then the
result will be
– Correct with probability 50%
– Incorrect with probability 50%
Therefore, if an eavesdropper made a
measurement in the wrong basis, his result
would be random and he would be detected.
Slide 13
Review of QKD
The basic idea is that each bit in the key is
mapped to a photon with a specific
polarization.
e.g.:
0 1 0 1 0 1 1
Bases:
Photons:
Slide 14
Eavesdropping
An eavesdropper can choose a basis for
decoding at random. For previous example:
Photons received:
Bases chosen:
Result:
? ? 0 1 ? ? ?
To get all of n bits correctly, probability is only
n
0.5
So for 64 bits, eavesdropper only has chance
5.410-20 of getting the right answer.
Slide 15
Breaking Classical Codes
Peter Shor, ATT Labs
If computers that you build are quantum,
Then spies of all factions will want 'em.
Our codes will all fail,
And they'll read our email,
Till we've crypto that's quantum, and daunt 'em.
Invented a quantum algorithm for efficiently finding
the prime factors of large numbers.
Classical factoring algorithms: O((log N) )
Shor’s algorithm: O(log N)
k
Slide 16
Afterword
Einstein was a giant.
“
His
head
But his
was in the
feet
clouds,
were on the
ground.
But for those of us who are not that tall,
We have to choose somewhere inbetween.”
- Richard Feynman, on
quantum mechanics