Quantum Key Distribution with Multiple Photons for Secure

advertisement
Quantum Key Distribution with Multiple
Photons for Secure Communications over
Cloud
Chamundeswari K1, G.Murali2
Student, Department of CSE, JNTUACEP, Pulivendula, India 1
Asst.Professor, Department of CSE, JNTUACEP, Pulivendula, India 2
Abstract--Security plays an important role in all communications networks. Quantum key cryptography is said to
provide security that can’t be broken. Classical cryptography has security problems as the security depends on the
computational complexity of the keys. There are some implementations of QKD protocols such as BB84. However,
these protocols are susceptible to attacks such as siphoning attack which needs to be addressed. Many quantum key
distribution protocols came into existence after initial protocol implementation in the form of BB84. These protocols
have problem with respect to siphoning attacks. Recently a solution is provided by Mandal et al. where they
implemented a three stage QKD process. In this paper we used the same concepts and implemented a prototype
application that provides classical public channel while making use of a simulator that mimics the QKD in quantum
channel. The experimental results reveal that the proposed application is provably secure. Moreover we deployed the
application in cloud and the quantum experiments with cloud are to be left for future work.
Keywords – Security, quantum cryptography, classical cryptography, QKD
I.
INTRODUCTION
Cryptography has been around for securing
communications over networks. The evolution
process
witnessed
symmetric
cryptography,
asymmetric cryptography and quantum cryptography.
Symmetric cryptography has a drawback such as key
sharing as the same key is used by sender and
receiver of information. This makes it vulnerable to
attacks. The asymmetric cryptography makes use of
key pairs so as to ensure that all participants in
communication are having two keys namely private
key and public key. The public key is informed to all
participants while the private key remains secret and
known to only that participant. In this scenario
encryption is made using the public key of the
recipient while decryption is made with private key
of the recipient thus eliminating the need for key
sharing. This will make asymmetric cryptography
more secure than its symmetric counterpart. The
security of traditional cryptography is based on the
strength of the keys while quantum key cryptography
is said to provide security that can’t be broken.
Classical cryptography has security problems as the
security depends on the computational complexity of
the keys. However, quantum cryptography is a
misnomer as it really does not involve in encryption
and decryption procedures. It is only meant for
quantum key distribution
illustrates this process.
securely.
Figure
1
Figure 1 – Differences between classical channel and
quantum channel
BB84 [1] is the first protocol that demonstrates
quantum key distribution. Provably secure
communications [2] are possible with such key
distribution mechanism. As can be seen in Figure 1, it
is evident that there two channels. The quantum
channel only takes care of secure key distribution
while that key is used by classical public channel in
order to provide fool proof security to the real world
communications over the network.
In this paper we built a prototype application that
demonstrates the secure communications over
classical public channel while it makes use of QKD
process provided by a simulator program. With this
and the concepts provided in [3], experiments are
made to test the application. In literature other
solutions found include [4], [5], [6], [7], [8], [9], [10],
and [11]. The empirical results are encouraging with
100% security every time. As cloud computing
became popular we also tried the application
deployment in cloud. The empirical results reveal
that the application can be accessed through cloud
from any corner of the world without time and
geographical restrictions.
results while section V concludes the paper and
provides directions for future work.
II.
IMPLEMENTATION
We built a prototype application that demonstrates
the concept of classical cryptography powered by
quantum key distribution. Our implementation of
quantum distribution is influenced by the work done
in [3] where a three stage protocol and its dynamics
are presented. The protocol is based on the “no
cloning theorem” which is based on the quantum
states in the quantum theory. This theorem forbids
the creation of identical quantum states. It was
originally stated by Wootters et al. in 1982. The
theorem proves the cloning of photons is not
possible. Our implementation also exhibits quantum
entanglement where quantum states of particles
cannot be disclosed independently. It does mean that
the quantum channel will be able to identify
eavesdropping (or it experiences embarrassment
when such thing happens). Entanglement helps
quantum channel behave predicatively when
eavesdropping is suspected.
Figure 2 – Cloud platform
As can be seen in Figure 2, it is evident that the cloud
computing provides services such as software as a
service, platform as a service and infrastructure as a
service. As the cloud applications and cloud users are
growing day by day, it is understood that the cloud
based applications become dominant in the near
future in the real world. This thought helped us to
push our application forward and tailored it to deploy
in cloud server. Thus the application is made a
scalable, secure solution that has no time and
geographical restrictions besides making the
application intuitive with classical public channel.
The remainder of the paper is structured as follows.
Section II provides review of literature on the QKD
process and related works. Section III presents the
proposed solution. Section IV presents experimental
Figure 3 – Important of no cloning theorem
As can be seen in Figure 3, it is evident that the
quantum channel cannot be really subjected to
cloning of photons in order to eavesdrop or break
security. Adversaries cannot perform closing
operations for various kinds of attacks on quantum
channel. Quantum entanglement and no cloning
theory attributed to quantum channel make it a
provably secure key distribution channel that
quarantines fool proof security. The data channel or
classical public channel makes use of the secret key
that has been distributed through quantum channel
for performing cryptographic primitives in order to
have secure communication over communication
networks. Eve can never eavesdrop when there is
quantum entanglement in place or even cannot clone
photons for violating secure communications over the
network.
place. However, the basis for fool proof security is
with the quantum channel that ensures provably
secure key distribution. Both channels when work
together, it is possible to have the expected security
to application that can never be broken. For the
purpose of quantum key distribution, we made use of
a simulator that mimics quantum channel. This is
done to have laboratory experiments to test the
prototype application. The simulation program that
generates quantum states and thus keys is as
presented in Figure 5.
Figure 4 – Virtual photons
As can be seen in Figure 4, it is evident that virtual
photons are absorbed and resultant force is released.
There are virtual photons that are exchanged
continuously in order to generate electromagnetic
force. The virtual photons and the quantum
entanglement and the no cloning theorem are the
basis for the secure key distribution in quantum
channel. When key distribution is successful as it
should be quantum channel, it is possible that that
classical public channel makes use of the secret keys
and performs traditional cryptographic operations so
as
to
ensure
unconditional
security
to
communications over network.
III.
EXPERIMENTAL RESULTS
We built prototype application that demonstrates the
proof of concept. The environment used for
implementation of the application includes a PC with
2 GB RAM, core 2 dual processor running Windows
operating system. For web application development
Java/J2EE platform is used. The UI is built using JSP
pages while the Servlets technology performs server
side processing. There is secure communication
demonstrated using the application. The application
layer of the OSI model is used to perform various
security operations such as encryption, decryption
and quantum key distribution. As discussed earlier in
this paper, we used the application and its
cryptographic primitives in classical public channel
or data channel where secure communications take
Figure 5 – QKD simulator
As can be seen in Figure 5, it is evident that the
quantum states generated by the simulator are
captured and used in the classical public channel of
the application. The application makes use of the
quantum security principles and performs encryption
and decryption operations that cannot be broken due
to QKD which is unconditionally secure. The
quantum channel successfully addresses the problems
when attackers launch attacks and try to eavesdrop
the quantum channel. The quantum entanglement is
in place and such attempts are neighter successful nor
useful in cloning photons in order to reuse it later for
other attacks. The adversaries’ attempt goes in vain
as the quantum channel is used for key distribution
while traditional cryptographic operations are
performed using the keys distributed over quantum
channel. Here our efforts are limited to building an
application that makes use of the simulator that can
mimic the quantum channel.
Accuracy Percentage
Performance
Analysis
100
50
0
1
2
3
Experiments
Figure 8 – Performance analysis
Figure 6 – Application showing content before
encryption
As can be seen in Figure 6, the application has
provision for encryption and decryption in classical
public channel. It has provision for encryption and
decryption operations in the channel while the secure
key distribution is left to the simulation
demonstrating QKD process. The encrypted content
is as shown in Figure 7.
As can be seen in Figure 8, it is evident that there are
three experiments made with the prototype
application that demonstrates classical public channel
and takes the help of a simulator for QKD. In each
experiment, the fool proof security is proven with
100% accuracy. These experiments are made using
both the channels for secure communications. The
empirical results reveal that the proposed application
is useful for secure communications besides having
the ability to overcome potential threats while
delivering intended services.
After making such experiments successfully we
deployed the application in cloud. The application is
in public cloud does mean that it can be accessed
from any corner of the world as it does not put time
and geographical restrictions in pace. The
deployment of the application in cloud is for
demonstrating the cloud usage of such application.
However, cloud computing experiments with
quantum channel are left for future work.
IV.
CONCLUSION
AND
FUTUREWORK
Figure 7 – Encryption result
As can be seen in Figure 7, the content of files
presented on web pages is in encrypted format that
can’t be understood by humans. Again it can be
decrypted using the classical public channel as
described earlier. However, the key distribution
process as usual is done using the quantum channel
that is encapsulated by the simulator program.
In this paper, we studied quantum key distribution
processes and implemented an application that
demonstrates the communications with 100%
security. Quantum entanglement and no clone
theorem are in place in order to provide fool proof
security. Three stage protocol proposed by Mandal et
al. [3] is basis for our experiments. The secure key
distribution through quantum channel is done with
the help of simulator program available in Java. The
simulator program mimics the QKD which is used
for laboratory experiments. The proposed application
is able to capture the quantum channel results in
order to perform conventional cryptography
operations such as encryption and decryption. Thus it
is evident that quantum channel is used for only QKD
process while the classical public channel is best used
for communications where traditional security
mechanism can be used. There is synergic effect
visible in the experiments as both the channels work
together seamlessly. The prototype application is
capable of demonstrating the proof of concept. The
empirical results are encouraging. We also tried to
deploy the application in cloud. We made it public
through cloud deployment that can help the
application to be accessed by people without time
and geographical restrictions. One direction for future
work is to implement the protocol and use it in a real
network instead of simulations. In other words in
future we intend to explore the quantum channel in a
real cloud computing.
REFERENCES
[1] C. H. Bennett, and G. Brassard, Quantum
Cryptography: Public Key Distribution and Coin Tossing.
In Proceedings of IEEE International Conference on
Computers, Systems and Signal Processing, Bangalore,
1984, pp. 175-179.
[2] H.K. Lo, H.F. Chau, Unconditional security of quantum
key distribution over arbitrary long distances. Science
1999; 283(5410): 2050-2056.
[3] Sayonnha Mandal1, Gregory Macdonald1, Mayssaa El
Rifai,
Nikhil
Punekar
and
Farnaz
Zamani.
Implementation of Secure Quantum Protocol using
Multiple Photons for Communication. IEEE. p1-6.
[4] Y. Chen, P. Verma, S. Kak, Embedded security
framework for integrated classical and quantum
cryptography services in optical burst switching networks.
Security and Communication Networks 2, 546-554, 2009.
[5] S. Kak, P. Verma, and G. MacDonald, Cryptography
and state estimation using polarization states. SPIE
Conference on The Nature of Light: What are Photons?,
August 2011.
[6] S. Kak, Quantum information and entropy.
International Journal of Theoretical Physics 46, 860-876,
2007.
[7] E. Collet, Polarized light in fiber optics, chapter 9, pp
191.
[8] K. Inoue, Quantum Key Distribution Technologies.
IEEE Journal of Selected Topics in Quantum Electronics,
vol. 12, no.4, July/August 2006.
[9] L. Lydersen, Wiechers, C., Wittman, C., Elser, D.,
Skaar, J. and Makarov, V. Hacking commercial quantum
cryptography systems by tailored bright illumination. Nat.
Photonics 4, 686, 2010.
[10] G. Benenti, G. Casatti, and G. Strini, Principles of
Quantum computation, vol. I: Basic Concepts, World
Scientific Publishing, New Jersey, 2004.
(n.d).
[11] S. Kak, A three-stage quantum cryptography protocol.
Foundations of Physics Letters 19, 293, 2006.
Download