quantum cryptography - Department of Computer Science

advertisement
Quantum Cryptography – Security through Uncertainty
Narayana Kashyap
QUANTUM CRYPTOGRAPHY – SECURITY
THROUGH UNCERTAINTY
NARAYANA D KASHYAP
Spring 2003
ABSTRACT
Quantum cryptography is governed by the laws of physics. It basically utilizes
Heisenberg’s Uncertainty Principle. The way it works is by a system which includes a
transmitter and receiver. A sender transmits photons which have been polarized (using
either rectilinear polarization or diagonal polarization). The receiver at the other end
measures this polarization for each photon by using any of the two types. The receiver
records the measurement (rectilinear or diagonal). He announces the measurement but not
the result and the sender announces back to the receiver which of the measurements were
of the correct type. Both the parties keep the cases in which the receiver measurements
were of the correct type. These cases are then translated into bits (1's and 0's) called
qubits and thereby become the key. An eavesdropper is bound to introduce errors to this
transmission because he/she does not know in advance the type of polarization of each
photon and quantum mechanics does not allow him/her to acquire sharp values of two
non-commuting observables (here rectilinear and diagonal polarizations). The two
legitimate users of the quantum channel test for eavesdropping by revealing a random
subset of the key bits and checking (in public) the error rate. Although they cannot
prevent eavesdropping, they will never be fooled by an eavesdropper because any effort
to tap the channel, however subtle and sophisticated, will be detected. Whenever they are
not happy with the security of the channel they can try to set up the key distribution
again.
1. INTRODUCTION
Cryptography
Gentlemen do not read each other's mail - Henry Stimson, U.S. Secretary of State
During early days when people wanted information to be protected or to be destined for
only a few designated people, they used to hide information in such a way that the
onlooker would be puzzled and does not understand what the writing is. The earliest
known technique is Caesar Cipher, a substitution technique where the letters of English
were replaced with the letters further down the alphabet set. Such techniques and
methods where information is not easy to perceive and understand leads to what is known
as Cryptography.
With the usage of the internet, where information is exposed to everyone and
could be tampered by anyone, the need for information hiding has become even more
important and prioritized in the modern day society. Hackers and cryptanalysts find this
information easy to watch, modify and sometimes even block the information from
getting across to the destined person. Hence, a person who would like to have
information sent across to only a few selected trusted parties takes help from
CS 265 Term Paper
Page 1 of 5
April 14, 2003
Quantum Cryptography – Security through Uncertainty
Narayana Kashyap
organizations which help in hiding the information and securely transferring the
information to the designated parties. These organizations use what is called as Public /
Private Key Cryptography. The algorithms and the techniques used are quite robust and it
would take a cryptanalyst considerable amount of time and effort to decipher the
encrypted message. The time, in fact, is quite huge; a 128-bit key used for encryption is
said to have a time factor of the order of millions of years to decipher using brute force
methods. These algorithms are based on mathematical concepts, which can be solved or
broken through better decryption techniques and faster and parallel computers in the
future. One method goes beyond mathematics and its concepts and instead, the laws of
physics govern the security of encrypted message. This form is called Quantum
Cryptography.
Quantum Cryptography
I can't speak without an interception.
This is private; please get off my line.
Please tell me when I can have my privacy. - Ray and Dave Davies
This cryptographic technique allows a secure channel between two people who want to
communicate in privacy. Here initial parameters are agreed in forefront and during the
course of communication can change to the desired configuration or sometimes these
parameters are not even needed. It is as powerful as classical cryptography and can take
conventional cryptography to the next level, as Quantum Cryptography can sense even a
passive attack or eavesdropping on the quantum channel.
“Quantum theory is believed to govern all objects, large and small, but its consequences
are most conspicuous in microscopic systems such as individual atoms or subatomic
particles. The act of measurement is an integral part of quantum mechanics, not just a
passive, external process as in classical physics. So it is possible to design a quantum
channel - one that carries signals based on quantum phenomena - in such a way that any
effort to monitor the channel necessarily disturbs the signal in some detectable way.”
(http://www.cyberbeach.net/~jdwyer/quantum_crypto/quantum1.htm)
This is due to Heisenberg’s Uncertainty Principle which asserts that certain pairs of
physical properties are completely complimentary to each other, in the sense that
measuring one of them disturbs the other property.
This principle can be applied to the quantum channel, which is used by Quantum
Cryptography. The Quantum channel carries small particles called “Quantums” or
“Photons” of light within them. Hence the name, Quantum Cryptography. When light
travels, it generates oscillating electric field, and the direction of oscillation is known as
the polarization of the photon.
The Quantum channel can be constructed with the help of two polarizing filters which are
placed at either ends; one is the sender and the other is the receiver. These crystals are
made of birefringent crystal (such as calcite). The sender can place his crystal in a
CS 265 Term Paper
Page 2 of 5
April 14, 2003
Quantum Cryptography – Security through Uncertainty
Narayana Kashyap
direction that he wants the photons to be polarized and transmitted. The receiver on the
other hand places his crystal in a direction he wishes to receive the photons.
A photon encountering a calcite crystal behaves in one of two ways depending on its
polarization in relation to the crystal. The photon may pass through the crystal
perpendicular to the axis of the crystal or it may pass through the crystal parallel to the
axis but slightly shifted along the axis. If the photons are not in any of these two
directions, then the photons arriving out of the calcite crystal may take a direction that is
random in nature and hence it may be perpendicular to the axis or parallel to the axis. If
the photons are not at all polarized before they enter into the crystal, then the crystal
polarizes them depending on the direction of entry into the crystal.
2. WORKING OF QUANTUM CRYPTOGRAPHY
Nobody understands quantum theory. - Richard Feynman, Nobel prize-winning physicist
The polarizations are of two types:
1. Rectilinear Polarization (0 or 90) (vertical or horizontal)
2. Diagonal Polarization (45 or 135)
According to Quantum theory, Rectilinear and Diagonal polarizations are complementary
properties, such that an apparatus set up to test the rectilinear polarizations cannot be
used to test diagonally polarized photons. But the same can be identified by a similar
apparatus that has been rotated 45 degrees from the original orientation. Thus, one
property randomizes the other property.
Bennett and Brassard in 1984 proposed an algorithm for Quantum Key Distribution and
was termed as BB84. This algorithm uses a quantum channel as well as a classical public
channel through which the participants can send regular messages.
We consider three participants in the system
Alice -> sender
Bob -> receiver
Eve -> eavesdropper
Alice and Bob would like to exchange their secret key. Hence they use Quantum
cryptography to exchange. The system involves a transmitter and a receiver (each side
consists of a laser emitter of light along with a filter to polarize/select the polarized
photons) Alice uses the transmitter to send photons in one of the four polarizations: 0,45,
90 or 135 degrees. Bob uses the receiver to measure the polarization. According to the
laws of Quantum Mechanics, the receiver can distinguish between rectilinear
polarizations or horizontal polarizations, but not both polarizations together.
CS 265 Term Paper
Page 3 of 5
April 14, 2003
Quantum Cryptography – Security through Uncertainty
Narayana Kashyap
The scenario of the key distribution is as follows:
Pre - agreed arrangement:
45 and 90 are 1’s, 0 and 135 are 0’s
The key distribution requires several steps.
1. Alice sends photons with one of four polarizations, which she has chosen in
random.
2. For each photon, Bob chooses at random the type of measurement: either
rectilinear (+) or diagonal (x).
3. Bob records the result of the measurement and keeps it as a secret
4. Bob publicly announces the types of measurements that he made, and Alice tells
him which measurements were correct; this announcement is made over the
classic public channel.





5. Alice and bob keep all the cases in which Bob measured the correct type. These
cases are translated into bits (1 or 0) and eventually become the key.
6. Finally the key agreed on is:
1
CS 265 Term Paper
0
0
Page 4 of 5
1
1
April 14, 2003
Quantum Cryptography – Security through Uncertainty
Narayana Kashyap
Some interesting things to be noted here are:
1. Bob announces publicly, for each photon, which type of measurement he has
made (rectilinear or diagonal) but not the measurement result (for example, 0, 45,
90 or 135 degrees).
2. Alice and Bob both discard the cases in which Bob had made a wrong
measurement or the cases in which the detectors (filters) failed to register the
photon at all (the reason behind this is because the filters are not 100% efficient)
3. CONCLUSION
1. It is possible to send a secret key using single photon burst, without unnoticeably
being intercepted.
2. Quantum cryptography promises to revolutionize secure communication by
providing security based on the fundamental laws of physics, instead of the
current state of mathematical algorithms or computing technology. The devices
for implementing such methods exist and the performance of demonstration
systems is being continuously improved. Within the next few years, if not months,
such systems could start encrypting some of the most valuable secrets of
government and industry.
3. The wide spread use and acceptance of Quantum Cryptography is just a matter of
time. Currently the size and expense of the quantum equipment makes it
infeasible for use in a home environment.
4. REFERENCES:
1. R. Rivest, A. Shamir, and L. Adleman, "On Digital Signatures and Public-Key
Cryptosystems", MIT Laboratory for Computer Science, Technical Report,
MIT/LCS/TR-212 (January 1979).
2. C.H. Bennett, G. Brassard, and A.K. Ekert, "Quantum cryptography", Scientific
American, October 1992, p. 50.
5. WEBSITES:
1.
2.
3.
4.
5.
6.
7.
8.
http://www.cyberbeach.net/~jdwyer/quantum_crypto/quantum1.htm
http://www.cs.dartmouth.edu/~jford/crypto.html
http://www.cki.au.dk/experiment/qrypto/doc/QuCrypt/bb84coding.html
http://www.qubit.org
www.vad1.com/qcr
http://qso.lanl.gov/qc
www.quantum.univie.ac.at/research/crypto
http://www.csa.com/hottopics/crypt/oview.html
CS 265 Term Paper
Page 5 of 5
April 14, 2003
Download