C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat...

28
C191: Quantum Cryptography Umesh V. Vazirani

Transcript of C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat...

Page 1: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

C191: Quantum Cryptography

Umesh V. Vazirani

Page 2: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

2

How to agree on a secret key?

Page 3: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

3

Quantum Crypto Setup

Page 4: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

4

RSA: Public-key Cryptography

Alice Bob

• Alice publishes public key = (N, e).

• N = PQ, with P, Q primes known only to Alice.Her private key is d: de = 1 mod (P-1)(Q-1)

• Ed = mde = m (mod N)

• Eavesdropper Eve doesn’t know d, and cannot decrypt.

message mE= me mod N

Decrypts: m = Ed

Page 5: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

• Unconditional security

• Quantum factoring breaks RSA!

• Has been implemented using today’s technology

• Measurement disturbs the system

- detect eavesdropper

Why Quantum Cryptography?

Page 6: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

6

Page 7: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

7

Photon Polarization

• The polarization of a photon is a direction in the plane normal to the direction of propagation.

• The polarization of a photon is a qubit.

• A polarizing filter blocks photons whose polarization is perpendicular to the orientation of the filter and transmits photons whose polarization is aligned with the orientation of the filter.

Page 8: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

8

Page 9: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

9

Page 10: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

10

Page 11: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

11

Page 12: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

12

Page 13: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

13

Page 14: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

14

Page 15: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

15

Page 16: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

16

Page 17: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

17

Page 18: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

18

Page 19: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

19

Page 20: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

20

Page 21: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

21

Page 22: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

22

Page 23: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

23

Page 24: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

24

Page 25: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

25

Page 26: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

26

Page 27: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

27

Page 28: C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat 4N times: Alice picks a random bit b. Bennett & Brassard 1984 She transmits it

28