The quantum cryptography protocols will provide Alice and

Quantum Key Distribution
1. INTRODUCTION
1.1 Cryptography:
Cryptography is the art of rendering information exchanged between two parties
unintelligible to any unauthorized person. The purpose of cryptography is to transmit
information in such a way that access to it is restricted entirely to the intended recipient,
even if the transmission itself is received by others. This science is of increasing
importance with the advent of broadcast and network communication, such as electronic
transactions, the Internet, e-mail, and cell phones, where sensitive monetary, business,
political, and personal communications are transmitted over public channels.
.
Principle of cryptography
The sender combines the plain text with a secret key, using some encryption algorithm, to
obtain the cipher text. This scrambled message is then sent to the recipient who reverses
the process to recover the plain text by combining the cipher text with the secret key
using the decryption algorithm. An eavesdropper cannot deduce the plain message from
the scrambled one without knowing the key.
1
Quantum Key Distribution
In classical cryptography the encrypting and decrypting algorithms are publicly
announced; the security of the cryptogram depends entirely on the secrecy of the key and
same key used for both encryption and decryption. To prevent this being discovered by
accident or systematic search, the key is chosen as a very large number. This means first,
that the key generation process must be appropriate, in the sense that it must not be
possible for a third party to guess or deduce it. Truly random numbers must thus be used
for the key. Second, it must not be possible for a third party to intercept the key during its
exchange between the sender and the recipient. This so-called “key distribution problem”
is very central in cryptography.
Classical cryptography
Cryptographers have tried hard to solve this key distribution problem. The 1970s brought
a clever mathematical discovery in the form of public key cryptography (PKC). PKC
systems exploit the fact that certain mathematical operations are easier to do in one
direction than the other.
• Public key cryptography: Two keys used
– Public key known to everybody. Used for encryption.
– Private key known only to owner. Used for decryption.
2
Quantum Key Distribution
Public key cryptography
Public key cryptography works if…
• Private key remains secret
– Never leaves the owner’s computer.
– Typically encrypted and password-protected.
• Difficult to guess private key from knowledge of public key
– Boils down to trying all different key combinations.
– Difficulty of breaking the code rises exponentially with the bit length of the key
– 1024b keys require more time than the life of the universe in order to be broken.
• Reliable public key distributed
– This is the most difficult problem!
The systems avoid the key distribution problem, but unfortunately their security depends
on unproven mathematical assumptions about the intrinsic difficulty of certain
operations. The most popular public key cryptosystem, RSA (Rivest-Shamin-Adleman),
gets its security from the difficulty of factoring large numbers.
RSA Algorithm:
-
Pick two large prime numbers p and q and calculate the product N = pq, f = (p –
1)(q – 1)
-
Choose a number that is co-prime with f, c
3
Quantum Key Distribution
-
Find a number d to satisfy cd = 1 mod f, using a method such as Euclid’s
algorithm
-
Using your plaintext, a, the ciphertext is encoded as b = ac mod N
-
To retrieve the plaintext, a = bd mod N
-
The numbers N and c are made public, so anyone can encrypt information, but
only someone with d can retrieve the plaintext
Example for RSA:
-
Plaintext a = 123
-
p = 61 and q = 53
-
N = pq = 3233
-
f = (p – 1)(q – 1) = 3120
-
Pick a coprime of f, c=17
-
Find d such that cd = 1 mod f, d=2753
-
Encode with ac mod N, in this case 12317 mod 3233 = 855
-
Decode message by evaluating bd mod N, in this case 8552753 mod 3233 = 123
This means that if ever mathematicians or computer scientists come up with fast and
clever procedures for factoring large numbers, then the whole privacy and discretion of
widespread cryptosystems could vanish overnight. As public key cryptography
algorithms require complex calculations, they are slow.
But quantum technology promises to revolutionize secure communication at an even
more fundamental level. While classical cryptography relies on the limitations of various
mathematical techniques or computing technology to restrict eavesdroppers from learning
the contents of encrypted messages, in quantum cryptography the information is
protected by the laws of physics.
4
Quantum Key Distribution
1.2 Overview of QKD:
Quantum cryptography is based on the usage of individual particles/waves of light
(photon) and their intrinsic quantum properties to develop an unbreakable cryptosystem essentially because it is impossible to measure the quantum state of any system without
disturbing that system. It is theoretically possible that other particles could be used, but
photons offer all the necessary qualities needed, their behavior is comparatively wellunderstood, and they are the information carriers in optical fiber cables, the most
promising medium for extremely high-bandwidth communications.
Alice and Bob will represent two people who want to communicate securely and
the malicious Eve will try to listen in on the communication.
Quantum Key Distribution
5
Quantum Key Distribution
The quantum channel will only be used to send information from Alice to Bob,
not in the other direction. This is secure channel (e.g.: optical fiber) to transmit a polarize
photon which then will create the secret key. This secret key generated from a form of a
random string of bits. These bits then will be used as a secret key in a conventional
cryptography scheme. The public channel could be the internet.
The Heisenberg uncertainty principle and quantum entanglement can be exploited
in a system of secure communication, often referred to as "quantum cryptography".
Quantum cryptography provides means for two parties to exchange an enciphering key
over a private channel with complete security of communication.
6
Quantum Key Distribution
1.3 Principle:
Quantum cryptography solves the key distribution problem by allowing the exchange of a
cryptographic key between two remote parties with absolute security, guaranteed by the
laws of physics. This key can then be used with conventional cryptographic algorithms.
One may thus claim, with some merit, that “quantum key distribution” may be a better
name for quantum cryptography.
It exploits the fact that according to quantum physics, the mere fact of observing a
quantum object perturbs it in an irreparable way. When you read this article for example,
the sheet of paper must be lighted. The impact of the light particles will slightly heat it up
and hence change it. This effect is very small on a piece of paper, which is a macroscopic
object. However, the situation is radically different with a microscopic object. If one
encodes the value of a digital bit on a single quantum object, its interception will
necessarily translate into a perturbation, because the eavesdropper is forced to observe it.
This perturbation causes errors in the sequence of bits exchanged by the sender and
recipient.
Eavesdropping on a quantum channel. Eve extracts information from the quantum
channel between Alice and Bob at the cost of introducing noise into that channel.
7
Quantum Key Distribution
By checking for the presence of such errors, the two parties can verify whether
their key was intercepted or not. It is important to stress that since this verification takes
place after the exchange of bits, one finds out a posteriori whether the communication
was eavesdropped or not. That is why this technology is used to exchange key and not
valuable information. Once the key is validated, it can be used to encrypt data.
There are two main types of quantum cryptosystems for the key distribution, these are:
 Cryptosystems with encoding based on two non-commuting observables proposed
by S.Wiesner (1970), and by C.H.Bennett and G.Brassard (1984)
 Cryptosystems with encoding built upon quantum entanglement and the Bell
Theorem proposed by A.K.Ekert (1990).
8
Quantum Key Distribution
2 QUNTUM MECHANICS IN QKD
Quantum mechanics is the fundamental physical theory of matter. Quantum
communication involves encoding information in quantum states, or qubits, as opposed to
classical communications use of bits. Usually, photons are used for these quantum states.
Quantum cryptography exploits certain properties of these quantum states to ensure its
security. There are several different approaches to quantum key distribution, but they can
be divided into two main categories depending on which property they exploit. Of these,
the most relevant for cryptography are Heisenberg's uncertainty principle and quantum
entanglement.
2.1 Uncertainty:
In contrast to classical physics, the act of measurement is an integral part of quantum
mechanics. In general, measuring an unknown quantum state will change that state in
some way. This is known as quantum indeterminacy, and underlies results such as the
Heisenberg uncertainty principle, information-disturbance theorem and no
cloning theorem. This can be exploited in order to detect any eavesdropping on
communication (which necessarily involves measurement) and, more importantly, to
calculate the amount of information that has been intercepted.
Heisenberg's Uncertainty principle:

It is impossible to measure simultaneously both position and velocity of a
microscopic particle with any degree of accuracy or certainty.

The more precisely the position is determined, the less precisely the momentum is
known in this instant, and vice versa.

The uncertainty principle is certainly one of the most famous and important
aspects of quantum mechanics. It has often been regarded as the most distinctive
feature in which quantum mechanics differs from classical theories of the physical
world

Attempting to measure an elementary particle’s position to the highest degree of
accuracy, for example, leads to an increasing uncertainty in being able to measure
9
Quantum Key Distribution
the particle’s momentum to an equally high degree of accuracy. Heisenberg’s
Principle is typically written mathematically in either of two forms:
E t  h / 4 
x p  h / 4 
In essence, the uncertainty in the energy (E) times the uncertainty in the time (t) -- or
alternatively, the uncertainty in the position (x) multiplied times the uncertainty in the
momentum (p) -- is greater or equal to a constant (h/4). The constant, h, is called
Planck’s Constant (where h/4 = 0.527 x 10-34 Joule-second).
Information-disturbance theorem:

It has been shown that Information-Disturbance theorem can play an important
role in security proof of quantum cryptography.

The theorem is can be regarded as an information theoretic version of uncertainty
principle.

In this, the restriction on the source is abandoned, and a general informationdisturbance theorem is obtained. The theorem relates information gain by Eve
with information gain by Bob.

The information gain by Eve inevitably makes the outcomes by Bob in the
Conjugate basis not only erroneous but random
No cloning theorem:

The no cloning theorem is a result of quantum mechanics which forbids the
creation of identical copies of an arbitrary unknown quantum state.

The no cloning theorem prevents us from using classical error correction
techniques on quantum states. For example, we cannot create backup copies of a
state in the middle of a quantum computation, and use them to correct subsequent
errors. Error correction is vital for practical quantum computing, and for some
time this was thought to be a fatal limitation.
10
Quantum Key Distribution
2.2 Entanglement:
The quantum states of two (or more) separate objects can become linked together in such
a way that they must be described by a combined quantum state, not as individual
objects. This is known as entanglement and means that, performing a measurement on
one object will affect the other. If an entangled pair of objects is shared between two
parties, anyone intercepting either object will alter the overall system, allowing the
presence of the third party (and the amount of information they have gained) to be
determined.
Quantum entanglement is a quantum mechanical phenomenon in which the
quantum states of two or more objects have to be described with reference to each other,
even though the individual objects may be spatially separated. This leads to correlations
between observable physical properties of the systems that are stronger than any classical
correlations. As a result, measurements performed on one system may be interpreted as
"influencing" other systems entangled with it. However, no information can be
transmitted through entanglement.
Entanglement obeys the letter if not the spirit of relativity. Although two
entangled systems can interact across large spatial separations, no useful information can
be transmitted in this way, so causality cannot be violated through entanglement. This
occurs for two subtle reasons:
(i)
Quantum mechanical measurements yield probabilistic results
(ii)
The no cloning theorem forbids the statistical inspection of entangled
quantum states.
Although no information can be transmitted through entanglement alone, it is
possible to transmit information using a set of entangled states used in conjunction with a
classical information channel. This process is known as quantum teleportation. Despite
its name, quantum teleportation cannot be used to transmit information faster than light,
because a classical information channel is involved.
11
Quantum Key Distribution
2.3 Fundamentals:
•
Light waves are propagated as discrete quanta called photons.
•
They are measles and have energy, momentum and angular momentum called
spin.
•
Spin carries the polarization.
•
If on its way we put a polarization filter a photon may pass through it or may not.
•
We can use a detector to check of a photon has passed through a filter.
Heisenberg Uncertainty Principle:
•
Certain pairs of physical properties are related in such a way that measuring one
property prevents the observer from knowing the value of the other. When
measuring the polarization of a photon, the choice of what direction to measure
affects all subsequent measurements.
•
If a photon passes through a vertical filter it will have the vertical orientation
regardless of its initial direction of polarization.
12
Quantum Key Distribution
Photon Polarization:
Vertical filter
Tilted filter
at the angle 
The probability of a photon appearing after the second filter depends on the angle
and becomes 0 at  = 90 degrees.
The first filter randomizes the measurements of the second filter.
Polarization by a filter:
•
A pair of orthogonal filters such as vertical/horizontal is called a basis.
•
A pair of bases is conjugate if the measurement in the first basis completely
randomizes the measurements in the second basis.
•
As in the previous slide example for  =45deg.
Sender-receiver of photons:
•
Suppose Alice uses 0-deg/90-deg polarizer sending photons to Bob. But she does
not reveal which.
•
Bob can determine photons by using filter aligned to the same basis.
•
But if he uses 45deg/135 deg polarizer to measure the photon he will not be able
to determine any information about the initial polarization of the photon.
•
The result of his measurement will be completely random
Eavesdropper Eve:
•
If Eve uses the filter aligned with Alice’s she can recover the original polarization
of the photon.
•
If she uses the misaligned filter she will receive no information about the photon.
13
Quantum Key Distribution
•
Also she will influence the original photon and be unable to retransmit it with the
original polarization.
•
Bob will be able to deduce Ave’s presence.
Bit Vs Qubit:
A qubit is the fundamental building block of quantum computers. Qubits are
made up of controlled particles and the means of control (e.g. devices that trap particles
and switch them from one state to another). Each photon carries one qubit of information
A quantum computer is a device for computation that makes direct use of quantum
mechanical phenomena, such as superposition and entanglement, to perform operations
on data. The basic principle behind quantum computation is that quantum properties can
be used to represent data and perform operations on these data
A classical computer has a memory made up of bits, where each bit represents either a
one or a zero. A quantum computer maintains a sequence of qubits. A single qubit can
represent a one, a zero, or, crucially, any quantum superposition of these; moreover, a
pair of qubits can be in any quantum superposition of 4 states, and three qubits in any
superposition of 8. In general a quantum computer with n qubits can be in an arbitrary
superposition of up to 2n different states simultaneously (this compares to a normal
computer that can only be in one of these 2n states at any one time). A quantum computer
operates by manipulating those qubits with a fixed sequence of quantum logic gates. The
sequence of gates to be applied is called a quantum algorithm.
14
Quantum Key Distribution
Consider first a classical computer that operates on a three-bit register. The state of the
computer at any time is a probability distribution over the 23 = 8 different three-bit strings
000, 001, ..., 111. If it is a deterministic computer, then it is in exactly one of these states
with probability 1. However, if it is a probabilistic computer, then it may have a chance
in being in a number of different states. We can describe this probabilistic state by eight
nonnegative numbers a,b,c,d,e,f,g,h (where a = probability computer is in state 000, b =
probability computer is in state 001, etc.). There is a restriction that these probabilities
sum to 1.
The state of a three-qubit quantum computer is similarly described by an eightdimensional vector (a,b,c,d,e,f,g,h), called a wavefunction. However, instead of adding to
one, the sum of the squares of the coefficient magnitudes, | a | 2 + | b | 2 + ... + | h | 2, must
equal one. Moreover, the coefficients are complex numbers. Since states are represented
by complex wavefunctions, two states being added together will undergo interference.
This is a key difference between quantum computing and probabilistic classical
computing.[6]
Note that although recording a classical state of n bits, a 2n-dimensional probability
distribution, requires an exponential number of real numbers, practically we can always
think of the system as being exactly one of the n-bit strings—we just don't know which
one. Quantum mechanically, this is not the case, and all 2n complex coefficients need to
be kept track of to see how the quantum system evolves. For example, a 300-qubit
quantum computer has a state described by 2300 (approximately 1090) complex numbers,
more than the number of atoms in the observable universe.
15
Quantum Key Distribution
Quantum Random Number Generators:
Classical physics is deterministic. If the state of a system is known, physical laws can be
used to predict its evolution. On the contrary, the outcome of certain phenomena is,
according to quantum physics, fundamentally random. One such phenomenon is the
reflection or transmission of an elementary light “particle” –a photon – on a semitransparent mirror. In such a case, the photon is transmitted or reflected by the mirror
with a probability of 50%. It is thus completely impossible for an observer to predict the
outcome. Because of this intrinsic randomness, it is natural to use this phenomenon to
generate strings of random numbers. Quantis is a quantum random number generator
exploiting this principle.
 Fiber-optic links:
Randomly generated keys are changed up to 1,000 times/s in MagiQ’s OPN Security
Gateway, which uses a secure fiber-optic link to transmit the changing key sequence up
to 120 km as a stream of polarized photons. The company claims that linking its systems
together can transmit a QKD several hundred kilometers.
Quantum properties other than polarization can encode the value of a bit for the quantum
key. This company introduced the first commercial quantum-cryptography products in
2002: single-photon detectors and random-number generators, two essential components
for quantum-cryptography systems. In 2003, the company partnered with two electronicsecurity firms to develop a commercial system.
16
Quantum Key Distribution
3 QUANTUM KEY EXCHANGE
Quantum Key Exchange can be further divided into three families of protocols;
discrete variable, continuous variable and distributed phase reference coding. Discrete
variable protocols were the first to be invented, and they remain the most widely
implemented. The other two families are mainly concerned with overcoming practical
limitations of experiments. The two protocols are:
 BB84 Protocol
 E91 Protocol
are described below both use discrete variable coding.
3.1 BB84 Protocol
This protocol, known as BB84 after its inventors and year of publication, was
originally described using photon polarization states to transmit the information.
However, any two pairs of conjugate states can be used for the protocol, and many
optical fiber based implementations described as BB84 use phase encoded states. The
sender (traditionally referred to as Alice) and the receiver (Bob) are connected by a
quantum communication channel which allows quantum states to be transmitted. In the
case of photons this channel is generally either an optical fiber or simply free space. In
addition they communicate via a public classical channel, for example using broadcast
radio or the internet. Neither of these channels need to be secure; the protocol is designed
with the assumption that an eavesdropper (referred to as Eve) can interfere in any way
with both.
The security of the protocol comes from encoding the information in non-orthogonal
states. Quantum indeterminacy means that these states cannot in general be measured
without disturbing the original state as stated in “No cloning theorem”.
17
Quantum Key Distribution
BB84 uses two pairs of states, with each pair conjugate to the other pair, and the
two states within a pair orthogonal to each other. Pairs of orthogonal states are referred to
as a basis. The usual polarization state pairs used are either the rectilinear basis of vertical
(0°) and horizontal (90°), the diagonal basis of 45° and 135° or the circular basis of leftand right-handedness. Any two of these bases are conjugate to each other, and so any two
can be used in the protocol. Below the rectilinear and diagonal bases are used.
Basis
0
1
First, Alice and Bob have to communicate (one way communication) via quantum
channel, and then they both will establish connection with public channel in quantum
transmission (two way communication).
BB84 protocol works as follow:
a) Via Quantum Channel
i.
Alice creates a random bit (0 or 1) and then randomly selects one of her two
bases (rectilinear or diagonal in this case) to transmit it in. Alice then
transmits a single photon in the state specified to Bob, using the quantum
channel. This process is then repeated from the random bit stage, with Alice
recording the state, basis and time of each photon sent.
ii.
After all the photon transmission finished, Bob will measure the bits he
received using the rectilinear or diagonal basis.
b) Via Public Channel
i.
Bob announces which kind of measurement he made with or without the
presence of Eve.
ii.
Alice tells him whether he made the correct measurement.
iii.
Alice and Bob agree publicly to discard all incorrect measurements.
18
Quantum Key Distribution
iv.
Alice and Bob agree publicly to discard all positions where photons were not
detected.
v.
Polarizations of resulting photons are 0 for horizontal & left-circular.
vi.
Polarizations of resulting photons are 1 for vertical & right-circular as shown
below.
vii.
Alice and Bob now share a raw key, which is considered not fully secret, bits
maybe tampered by Eve during the transmission.
viii.
They both then will continue communicate in public channel to find and
correct the bits that they have by key distillation process.
19
Quantum Key Distribution
Quantum mechanics (particularly quantum indeterminacy) says there is no
possible measurement that will distinguish between the 4 different polarization states, as
they are not all orthogonal. The only measurement possible is between any two
orthogonal states (a basis), so for example measuring in the rectilinear basis will give a
result of horizontal or vertical. If the photon was created as horizontal or vertical (as a
rectilinear eigenstate) then this will measure the correct state, but if it was created as 45°
or 135° (diagonal eigenstates) then the rectilinear measurement will instead return either
horizontal or vertical at random. Furthermore, after this measurement the photon will be
polarized in the state it was measured in (horizontal or vertical), with all information
about its initial polarization lost.
To check for the presence of eavesdropping Alice and Bob now compare a certain
subset of their remaining bit strings. If a third party (usually referred to as Eve, for
'eavesdropper') has gained any information about the photons' polarization, this will have
introduced errors in Bobs' measurements. If more than p bits differ they abort the key and
try again, possibly with a different quantum channel, as the security of the key cannot be
guaranteed. p is chosen so that if the number of bits known to Eve is less than this,
privacy amplification can be used to reduce Eve's knowledge of the key to an arbitrarily
small amount, by reducing the length of the key.
20
Quantum Key Distribution
BB84 Protocol Implementation:
3.1.1 Software Structure
For the BB84 implementation, the software has been developed using Java
language. Alice and Bob will communicate within Quantum channel and public channel
with or without the presence of Eve. Referred to the physical implementation of BB84
protocol, this software works in two channel, Quantum channel and public channel. Alice
play as the sender role, Bob as the receiver and Eve as the eavesdropper. This software
consists of 5 objects, which are Alice, Bob, Eve, Quantum channel and Public channel.
Alice is a sender who will provide (transmit) bits to Quantum channel. This Quantum
channel act just like the physical implementation, which is if there is a tap from
eavesdropper, the bits will be change. Assuming that Alice wants to transmit bits to Bob
without any knowledge of Eve exist, Bob then read the Quantum channel object to
retrieve the bits either it have been modify by Eve or it is originally from Alice. Alice and
Bob then communicate in public channel to find error bits and correct it. Bob use public
channel object to communicate with Alice with existence of Eve. But, at the public
channel, Eve only can observe the communication; no modification will be made by Eve.
3.1.2 Hardware Setup:
21
Quantum Key Distribution
In this implementation, devices that have been used are:
• 3 workstation
• 1 switch
All devices are setup in the same room. Switch are use to connect all
workstations. Each workstation represents Alice, Bob and Eve respectively. Static IP are
used so that all workstation can communicate via the switch. So, Eve will recognize Alice
and Bob by their IP addresses. Developed software is installed on each of workstations to
simulate the protocol.
3.1.3 The Protocol
The software protocol
22
Quantum Key Distribution
For this simulation, each of object (Alice, Bob, Eve) play different role. Only the
appropriate function is executed on each of workstation, depends on its role. The
Quantum channel and public channel object are executed on Alice’s, while Eve and Bob
object are execute on different workstation respectively.
This program works as follow:
1) Alice generated a length (k) of random number (0 & 1) then sends it on Quantum
channel object to be ‘read’ by Bob and Eve.
2) If there is eavesdropping from Eve, Eve is the one who have to ‘read’ the Quantum
channel object first. Eve can modify the bits with two kind of attack; intercept/resend or
beam splitting.
3) Then, Bob read the updated version from Quantum channel object, assuming that Bob
doesn’t know about the tapping from Eve.
4) Bob then measure the bits he ‘read’ from Quantum channel object with his selected
own bases. Then, Bob ‘announce’ the bases he made to Alice via public channel, which
located at Alice’s.
5) Sifting raw key begin, Alice ‘read’ Bob’s measurement at public channel object and
‘confirm’ to Bob the position Bob has measures in the right bases (m bits) by announce it
at public channel.
6) Next, Alice and Bob estimate error to detect eavesdropper. They both calculate and
compare their bits error rate (e). If they found that their error rate is higher than
maximum bits error rate (e>emax), they will suspend the communication and start all
over again. (emax has predetermined value)
7) Now, both Alice and Bob will have a shared key, which is called ‘raw key’. This key
is not really shared since Alice and Bob’s version are different. They eliminate the m bits
from the raw key.
8) Both Alice and Bob then perform ‘error correction’ on their raw key to find erroneous
bits in uncompared parts of keys and ‘privacy amplification’ to minimize the number of
bits that an eavesdropper knows in the final key.
9) Finally, they both will get a same string of bits, which is the shared secret key.
23
Quantum Key Distribution
3.2 E91 protocol:
The Ekert scheme uses entangled pairs of photons. These can be created by Alice, by
Bob, or by some source separate from both of them, including eavesdropper Eve. The
photons are distributed so that Alice and Bob each end up with one photon from each
pair. Quantum entanglement is a condition of two or more quantum particles like photons
where the various properties are correlated.
The scheme relies on two properties of entanglement. First, the entangled states are
perfectly correlated in the sense that if Alice and Bob both measure whether their
particles have vertical or horizontal polarizations, they will always get the same answer
with 100% probability. The same is true if they both measure any other pair of
complementary (orthogonal) polarizations. However, the particular results are completely
random; it is impossible for Alice to predict if she (and thus Bob) will get vertical
polarization or horizontal polarization.
Second, any attempt at eavesdropping by Eve will destroy these correlations in a way that
Alice and Bob can detect.
Quantum cryptography exploiting photon pairs entangled in polarization
24
Quantum Key Distribution
The Ekert scheme uses entangled pairs of photons. These can be made by Alice, by Bob,
or by some source separate from both of them; in any case, they are distributed so that
Alice and Bob each end up with one photon from each pair.
The scheme relies on three properties of entanglement. First, we can make
entangled states which are perfectly anti-correlated, in the sense that if Alice and Bob
both test whether their particles have or
polarizations, they will always get opposite
answers, and the same is true if they both test whether they have
or
, or if they both
carry out the same test for any other pair of complementary (orthogonal) polarizations.
However, their individual results are completely random: it is impossible to predict in
advance if Alice will get
or
.
Second, these states have a property often called quantum non-locality, which has no
analogue in classical physics or everyday experience. If Alice and Bob carry out different
polarization measurements, their answers will not be perfectly anti-correlated, or
perfectly correlated, but they will in general be statistically correlated. That is, Alice can
make a better than random guess at Bob's answer, given her own, and vice versa. And
these correlations are stronger - in other words, Alice's guesses will on average be better than any model based on classical physics or ordinary intuition would predict.
Third, any attempt at eavesdropping by Eve will weaken these correlations, in a way that
Alice and Bob can detect.
25
Quantum Key Distribution
4 KEY DISTILLATION
The quantum cryptography protocols will provide Alice and Bob with nearly identical
shared keys, and also with an estimate of the discrepancy between the keys. These
differences can be caused by eavesdropping, but will also be caused by imperfections
in the transmission line and detectors. As it is impossible to distinguish between these
two types of errors, it is assumed all errors are due to eavesdropping in order to
guarantee security. A post processing phase, also known as key distillation, is then
performed as shown in diagram. It takes place after the sifting of the key and consists
of two steps. Provided the error rate between the keys is lower than a certain
threshold (20%), two steps can be performed to first remove the erroneous bits and
then reduce Eve's knowledge of the key to an arbitrary small value. These two steps
are known as information reconciliation and privacy amplification.
26
Quantum Key Distribution
4.1 Information reconciliation:
It is a form of error correction carried out between Alice and Bob's keys, in order
to ensure both keys are identical. It is conducted over the public channel and as such it is
vital to minimise the information sent about each key, as this can be read by Eve. A
common protocol used for information reconciliation is the cascade protocol. This
operates in several rounds, with both keys divided into blocks in each round and the
parity of those blocks compared. If a difference in parity is found then a binary search is
performed to find and correct the error. If an error is found in a block from a previous
round that had correct parity then another error must be contained in that block; this error
is found and corrected as before. This process is repeated recursively, which is the source
of the cascade name. After all blocks have been compared, Alice and Bob both reorder
their keys in the same random way, and a new round begins. At the end of multiple
rounds Alice and Bob will have identical keys with high probability, however Eve will
have gained additional information about the key from the parity information exchanged.
Error correction algorithm (Shor’s algorithm):
In 2001 first working 7-qubit NMR computer demonstrated at IBM's Almaden
Research Center was the first execution of Shor's algorithm. The number 15 was factored
using 1018 identical molecules, each containing 7 atoms. Peter Shor, at AT&T's Bell Labs
in New Jersey, discovered a remarkable algorithm. It allowed a quantum computer to
factor large integers quickly. It solved both the factoring problem and the discrete log
problem. Shor's algorithm could theoretically break many of the cryptosystems in use
today. Its invention sparked a tremendous interest in quantum computers, even outside
the physics community.
Shor proposed the first scheme for quantum error correction. This is an approach to
making quantum computers that can compute with large numbers of qubits for long
periods of time. Errors are always introduced by the environment, but quantum error
correction might be able to overcome those errors. This could be a key technology for
building large-scale quantum computers that work. These early proposals had a number
27
Quantum Key Distribution
of limitations. They could correct for some errors, but not errors that occur during the
correction process itself. A number of improvements have been suggested, and active
research on this continues. An alternative to quantum error correction has been found.
Instead of actively correcting the errors induced by the interaction with the environment,
special states that are immune to the errors can be used. This approach, known as
decoherence free subspaces, assumes that there is some symmetry in the computerenvironment interaction.
Shor’s Algorithm:
-
Let f(x) = bx mod N, if we can find some r that f(x) = f(x+r), then we can find a
number d’ such that cd’ = 1 mod r
-
The value d’ works like the decoding value we calculated from cd = 1 mod f
-
In addition, using different values for b<N, we can determine the prime
components of N
Shor’s algorithm time computational complexity is:
T (n)  O[(ln n) 3 ]
Eve can wiretap the public channel, but that won't do her any good. She gets information
on the bases and not on the outcome of the measurement. In case Eve attempts to
measure part of the Quantum Channel she betrays herself by a high Quantum Bit Error
Rate (QBER) and Alice and Bob are warned.
Quantum Bit Error Rate
The Quantum Bit Error Rate (QBER) is the ratio of an error rate to the key rate and
contains information on the existence of an eavesdropper and how much he knows.
QBER =
µ
28
Quantum Key Distribution
pf : probability for a wrong 'click' (1-2%)
pd : probability for a wrong photon signal (Si: 10 − 7; GaAs 10 − 5)
n : number of detections
q : phase = 1/2 (better for optical fibers); polarization = 1 (better in the air)
Σ: detector efficiency
fr: pulse repeat frequency
tl: transmission rate (for large distances small)
µ : attenuation for light pulses (single photons = 1)
Usually the QBER is around 11%. It means that Eve didn't gain more information on the
key as Bob.
29
Quantum Key Distribution
4.2 Privacy Amplification:
It is a method for reducing (and effectively eliminating) Eve's partial information
about Alice and Bob's key. This partial information could have been gained both by
eavesdropping on the quantum channel during key transmission (thus introducing
detectable errors), and on the public channel during information reconciliation (where it
is assumed Eve gains all possible parity information). Privacy amplification uses Alice
and Bob's key to produce a new, shorter key, in such a way that Eve has only negligible
information about the new key. This can be done using a universal hash function, chosen
at random from a publicly known set of such functions, which takes as its input a binary
string of length equal to the key and outputs a binary string of a chosen shorter length.
The amount by which this new key is shortened is calculated, based on how much
information Eve could have gained about the old key (which is known due to the errors
this would introduce), in order to reduce the probability of Eve having any knowledge of
the new key to a very low value.
 The second step is called privacy amplification and consists in compressing the
key by an appropriate factor to reduce the information of the eavesdropper.
If attacker knows L bits of the length n string x, hash function may be used to map
the string x to h(x) of length L-n-s for any s Attacker’s expected knowledge of h(x) is
less than 2-s/ln2 bits A rudimentary privacy amplification protocol is described below.
Privacy Amplification Protocol:
Let us consider, as an illustration, a two-bit key shared by the emitter and the receiver and
let us assume that it is 01. Let us further assume that the eavesdropper knows the first bit
of the key but not the second one: 0?. The simplest privacy amplification protocol
consists in calculating the sum, without carry, of the two bits and to use the resulting bit
as the final key. The legitimate users obtain 0 + 1 = 1. The eavesdropper does not know
the second bit. For him, this operation could be either 0 + 0 = 0 or 0 + 1 = 1. He has no
30
Quantum Key Distribution
way to decide which one is the correct one. Consequently, he does not have any
knowledge on the final key. There is a cost. This privacy amplification protocol shortens
the key by 50%.
The compression factor depends on the error rate. The higher it is, the more
information an eavesdropper might have on the key and the more it must be compressed
to be secure. Below figure schematically shows the impact of the sifting and distillation
steps on the key size. This procedure works up to a maximum error rate. Above this
threshold, the eavesdropper can have too much information on the sequence to allow the
legitimate parties to produce a key. Because of this, it is essential for a quantum
cryptography system to have an intrinsic error rate that is well below this threshold.
Key distillation is then complemented by an authentication step in order to
prevent a “man in the middle” attack, where the eavesdropper would cut the
communication channels and pretend to the emitter that he is the receiver and viceversa.
This is possible thanks to the use of a pre-established secret key in the emitter and the
receiver, which is used to authenticate the communications on the classical channel. This
initial secret key serves only to authenticate the first quantum cryptography session. After
each session, part of the key produced is used to replace the previous authentication key.
31
Quantum Key Distribution
5 IMPLIMENTATIONS
The highest bit rate system currently demonstrated exchanges secure keys at 1
Mbit/s (over 20 km of optical fibre) and 10 kbit/s (over 100 km of fibre), achieved by a
collaboration between the University of Cambridge and Toshiba using the BB84 protocol
with decoy pulses.
The longest distance over which quantum key distribution has been demonstrated
using optic fibre is 148.7 km, achieved by Los Alamos/NIST using the BB84 protocol.
Significantly, this distance is long enough for almost all the spans found in today's fibre
networks. The distance record for free space QKD is 144 km between two of the Canary
Islands, achieved by a European collaboration using entangled photons (the Ekert
scheme) in 2006, and using BB84 enhanced with decoy states in 2007. The experiments
suggest transmission to satellites is possible, due to the lower atmospheric density at
higher altitudes. For example although the minimum distance from the International
Space Station to the ESA Space Debris Telescope is about 400 km, the atmospheric
thickness is about an order of magnitude less than in the European experiment, thus
yielding less attenuation compared to this experiment.
The most advanced quantum computers have not gone beyond manipulating more than
16 qubits, meaning that they are a far cry from practical application. However, the
potential remains that quantum computers one day could perform, quickly and easily,
calculations that are incredibly time-consuming on conventional computers. Several key
advancements have been made in quantum computing in the last few years.
Canadian startup company D-Wave demonstrated a 16-qubit quantum computer. The
computer solved a sudoku puzzle and other pattern matching problems. The company
claims it will produce practical systems by 2008. Skeptics believe practical quantum
computers are still decades away, that the system D-Wave has created isn't scalable, and
that many of the claims on D-Wave's Web site are simply impossible (or at least
impossible to know for certain given our understanding of quantum mechanics).
32
Quantum Key Distribution
D-Wave's 16-qubit
quantum computer
Some recent advancements in the field of quantum computing:
Qubit Control
Computer scientists control the microscopic particles that
act as qubits in quantum computers by using control
devices.

Ion traps use optical or magnetic fields (or a
combination of both) to trap ions.

Optical traps use light waves to trap and control
particles.
Quantum dots are made of semiconductor material and
are used to contain and manipulate electrons.
Semiconductor impurities contain electrons by using
"unwanted" atoms found in semiconductor material.
Superconducting circuits allow electrons to flow with
almost no resistance at very low temperatures.



33
Quantum Key Distribution
New Design Enables More Cost-effective Quantum Key Distribution:
Researchers at the National Institute of Standards and Technology (NIST) have
demonstrated a simpler and potentially lower-cost method for distributing strings of
digits, or "keys," for use in quantum cryptography, the most secure method of
transmitting data. The new "quantum key distribution" (QKD) method, minimizes the
required number of detectors, by far the most costly components in quantum
cryptography.Although this minimum-detector arrangement cuts transmission rates by
half, the NIST system still works at broadband speeds, allowing, for example, real-time
quantum encryption and decryption of webcam-quality video streams over an
experimental quantum network.
In quantum cryptography, a recipient (named Bob) needs to measure a sequence of
photons, or particles of light that are transmitted by a sender (named Alice). These
photons have information encoded in their polarization, or direction of their electric field.
In the most common polarization-based protocol, known as BB84, Bob uses four singlephoton detectors, costing approximately $5,000-$20,000 each. One pair of detectors
records photons with horizontal and vertical polarization, which could indicate 0 and 1
respectively. The other pair detects photons with "diagonal", or +/- 45 degree,
polarization in which the "northeast" and "northwest" directions alternatively denote 0
and 1.
In the new method, the researchers, led by NIST's Xiao Tang, designed an optical
component to make the diagonally polarized photons rotate by a further 45 degrees and
arrive at the same detector but later, and into a separate "time bin", than the
34
Quantum Key Distribution
horizontal/vertical polarized ones. Therefore, one pair of detectors can be used to record
information from both kinds of polarized photons in succession, reducing the required
number of detectors from four to two.
In another protocol, called B92, the researchers reduced the required number of detectors
from two to one. And in work performed since their new paper, the researchers further
developed their approach so that the popular BB84 method now only requires one
detector instead of four.
Practical Quantum Cryptography:
Polarization-based quantum cryptography is now a mature technology: many
experimental groups have built prototypes, and commercial devices like the one shown
above by Geneva based company ID Quantique are now available.
35
Quantum Key Distribution
6 ATTACKS
6. 1 Intercept and resend
The simplest type of possible attack is the intercept-resend attack, where Eve
measures the quantum states (photons) sent by Alice and then sends replacement states to
Bob, prepared in the state she measures. In the BB84 protocol this will produce errors in
the key shared between Alice and Bob. As Eve has no knowledge of the basis a state sent
by Alice is encoded in, she can only guess which basis to measure in, in the same way as
Bob. If she chooses correctly then she will measure the correct photon polarization state
as sent by Alice, and will resend the correct state to Bob.
However if she chooses incorrectly then the state she measures will be random,
and the state sent to Bob will not be the same as the state sent by Alice. If Bob then
measures this state in the same basis Alice sent he will get a random result, as Eve has
sent him a state in the opposite basis, instead of the correct result he would get without
the presence of Eve. An example of this type of attack is shown in the table below.
Alice's random bit
0
1
1
0
1
0
0
1
Alice's random sending basis
Photon polarization Alice sends
Eve's random measuring basis
Polarization Eve measures and
sends
36
Quantum Key Distribution
Bob's random measuring basis
Photon polarization Bob measures
PUBLIC DISCUSSION OF BASIS
Shared secret key
0
0
0
1
Errors in key
✓
✘
✓
✓
The probability Eve chooses the incorrect basis is 50% (assuming Alice chooses her basis
randomly), and if Bob measures this intercepted photon in the basis Alice sent he will get
a random result, i.e. an incorrect result with probability of 50%. The probability an
intercepted photon generates an error in the key string is then 50% x 50% = 25%. If Alice
and Bob publicly compare n of their key bits (thus discarding them as key bits, as they
are no longer secret) the probability they find disagreement and identify the presence of
Eve is
So to detect an eavesdropper with probability Pd = 0.999999999 Alice and Bob need to
compare n = 72 key bits.
37
Quantum Key Distribution
6.2 Security Proofs
The above is just a simple example of an attack. If Eve is assumed to have unlimited
resources, for example classical and quantum computing power, there are many more
attacks possible. BB84 has been proven secure against any attacks allowed by quantum
mechanics, both for sending information using an ideal photon source which only ever
emits a single photon at a time, and also using practical photon sources which sometimes
emit multiphoton pulses. These proofs are unconditionally secure in the sense that no
conditions are imposed on the resources available to the Eavesdropper, however there are
other conditions required:
1. Eve cannot access Alice and Bob's encoding and decoding devices.
2. The random number generators used by Alice and Bob must be trusted and truly
random (for example a Quantum random number generator).
3. The classical communication channel must be authenticated using an
unconditionally
6.3 Man in the middle attack
Quantum cryptography is vulnerable to a man-in-the-middle attack when used without
authentication to the same extent as any classical protocol, since no principle of quantum
mechanics can distinguish friend from foe. As in the classical case, Alice and Bob cannot
authenticate each other and establish a secure connection without some means of
verifying each other's identities (such as an initial shared secret). If Alice and Bob have
an initial shared secret then they can use an unconditionally secure authentication scheme
(such as Carter-Wegman) along with quantum key distribution to exponentially expand
this key, using a small amount of the new key to authenticate the next session. Several
methods to create this initial shared secret have been proposed, for example using a 3rd
party or chaos theory.
38
Quantum Key Distribution
6.4 Photon number splitting attack
In the BB84 protocol Alice sends quantum states to Bob using single photons. In practice
many implementations use laser pulses attenuated to a very low level to send the quantum
states. These laser pulses contain a very small number of photons, for example 0.2
photons per pulse, which are distributed according to a Poissonian distribution. This
means most pulses actually contain no photons (no pulse is sent), some pulses contain 1
photon (which is desired) and a few pulses contain 2 or more photons. If the pulse
contains more than one photon, then Eve can split off the extra photons and transmit the
remaining single photon to Bob. This is the basis of the photon number splitting attack,
where Eve stores these extra photons in a quantum memory until Bob detects the
remaining single photon and Alice reveals the encoding basis. Eve can then measure her
photons in the correct basis and obtain information on the key without introducing
detectable errors.
Even with the possibility of a PNS attack a secure key can still be generated, as shown in
the GLLP security proof, however a much higher amount of privacy amplification is
needed reducing the secure key rate significantly (with PNS the rate scales as t2 as
compared to t for a single photon sources, where t is the transmittance of the quantum
channel).
There are several solutions to this problem. The most obvious is to use a true single
photon source instead of an attenuated laser. While such sources are still at a
developmental stage QKD has been carried out successfully with them. However as
current sources operate at a low efficiency and frequency key rates and transmission
distances are limited. Another solution is to modify the BB84 protocol, as is done for
example in the SARG04 protocol, in which the secure key rate scales as t3 / 2. The most
promising solution is the decoy state idea, in which Alice randomly sends some of her
laser pulses with a lower average photon number. These decoy states can be used to
detect a PNS attack, as Eve has no way to tell which pulses are signal and which decoy.
Using this idea the secure key rate scales as t, the same as for a single photon source. This
39
Quantum Key Distribution
idea has been implemented successfully in several QKD experiments, allowing for high
key rates secure against all known attacks.
6.5 Hacking attacks
Hacking attacks target imperfections in the implementation of the protocol instead of the
protocol directly. If the equipment used in quantum cryptography can be tampered with,
it could be made to generate keys that were not secure using a random number generator
attack. Another common class of attacks is the Trojan horse attack which does not require
physical access to the endpoints: rather than attempt to read Alice and Bob's single
photons, Mallory sends a large pulse of light back to Alice in between transmitted
photons. Alice's equipment reflects some of Mallory's light, revealing the state of Alice's
polarizer. This attack is easy to avoid, for example using an optical isolator to prevent
light from entering Alice's system, and all other hacking attacks can similarly be defeated
by modifying the implementation. Apart from Trojan horse there are several other known
attacks including faked state attacks, phase remapping attacks and time-shift attacks. The
time-shift attack has even been successfully demonstrated on a commercial quantum
crypto-system. This demonstration is the first successful demonstration of quantum
hacking against a non-homemade quantum key distribution system.
6.6 Denial of service
Because currently a dedicated fiber optic line (or line of sight in free space) is required
between the two points linked by quantum cryptography, a denial of service attack can be
mounted by simply cutting or blocking the line or, perhaps more surreptitiously, by
attempting to tap it.
40
Quantum Key Distribution
7 History
Quantum cryptography was proposed first by Stephen Wiesner, then at Columbia
University in New York, who, in the early 1970s, introduced the concept of quantum
conjugate coding. His seminal paper titled "Conjugate Coding" was rejected by IEEE
Information Theory but was eventually published in 1983 in SIGACT News (15:1 pp. 7888, 1983). In this paper he showed how to store or transmit two messages by encoding
them in two “conjugate observables”, such as linear and circular polarization of light, so
that either, but not both, of which may be received and decoded. He illustrated his idea
with a design of unforgeable bank notes. A decade later, building upon this work, Charles
H. Bennett, of the IBM Thomas J. Watson Research Center, and Gilles Brassard, of the
Université de Montréal, proposed a method for secure communication based on
Wiesner’s “conjugate observables”. In 1990, independently and initially unaware of the
earlier work, Artur Ekert, then a Ph.D. student at Wolfson College, University of Oxford,
developed a different approach to quantum cryptography based on peculiar quantum
correlations known as quantum entanglement.
41
Quantum Key Distribution
8 Prospects
The current commercial systems are aimed mainly at governments and
corporations with high security requirements. Key distribution by courier is typically
used in such cases, where traditional key distribution schemes are not believed to offer
enough guarantee. This has the advantage of not being intrinsically distance limited, and
despite long travel times the transfer rate can be high due to the availability of large
capacity portable storage devices. The major difference of quantum cryptography is the
ability to detect any interception of the key, whereas with courier the key security cannot
be proven or tested. QKD (Quantum Key Distribution) systems also have the advantage
of being automatic, with greater reliability and lower operating costs than a secure human
courier network.
Factors preventing wide adoption of quantum cryptography outside high security areas
include the cost of equipment, and the lack of a demonstrated threat to existing key
exchange protocols. However, with optic fiber networks already present in many
countries the infrastructure is in place for a more widespread use.
42
Quantum Key Distribution
9. Conclusion
Quantum cryptography allows exchanging encryption keys, whose secrecy is future-proof
and guaranteed by the laws of quantum physics. Quantum cryptography is a fascinating
illustration of the dialog between basic and applied physics. It is based on a beautiful
combination of concepts from quantum physics and information theory and made
possible by the tremendous progress in quantum optics and the technology of optical
fibers and free-space optical communication. Its security principle relies on deep
theorems in classical information theory and on a profound understanding of
Heisenberg’s uncertainty principle.
QC could well be the first application of quantum mechanics at the singlequantum level. Experiments have demonstrated that keys can be exchanged over
distances of a few tens of kilometers at rates on the order of at least a thousand bits per
second. One technological challenge at present concerns improved detectors compatible
with telecommunications fibers. Two other issues concern free-space QC and quantum
repeaters.
43
Quantum Key Distribution
REFERENCES
1. C. H. Bennett, "Quantum Cryptography: Uncertainty in the Service of Privacy",
Science, vol. 257, 7 August 1992, pp. 752-753.
http://www.ai.sri.com/~goldwate/quantum.html
(S. Goldwater, "Quantum Cryptography and Privacy Amplification")
2. S. K. Moore, IEEE Spectrum, May 2002.
3. C. H. Bennett and G. Brassard, in Proceedings of the IEEE International
Conference on Computers, Systems and Signal Processing, IEEE, New York
(1984).
4. C. H. Bennett, G. Brassard, and A. K. Ekert, "Quantum Cryptography", Scientific
American, October 1992, pp. 50-57.
5. A. K. Ekert, Physical Review Letters, 67, 661 (1991).
6. A. K. Ekert, J. G. Rarity, P. R. Tapster, and G. M. Palma, Physical Review
Letters, 69, 1293 (1992).
7. R. J. Hughes, J. E. Nordholt, D. Derkacs, and C. G. Peterson, New Journal of
Physics, 4, 43 (2002).
8. Quantum Cryptography: Privacy Through Certainty
http://www.csa.com/discoveryguides/crypt/overview.php
9. http://en.wikipedia.org/wiki/Quantum_cryptography
10. http://arxiv.org/abs/quant-ph/0101098
44