SlideShare a Scribd company logo
1 of 33
”Uncrackable" communications
through physics: Quantum Key
Distribution (QKD)*
* Also sometimes referred to as Quantum Cryptography
Kirby Linvill
June 24th, 2019
What is QKD?
• QKD protocols use quantum mechanical phenomena
to establish shared keys between two parties that can
then be used for symmetric encryption schemes.
Key Benefit of QKD
• Eavesdropping can be detected allowing for provably
secure communication
Background Information
Quantum Crash Course
Qubit
(shown as a Bloch Sphere)
Collapses when measured
= 0
= 1
As a consequence, it is
impossible to tell what
state a qubit is in with only
a single measurement*
* A corollary is the no cloning
theorem which states that it is
impossible to copy a qubit
+−
0
1
x
y
z
0
1
x
y
z
0
1
x
y
z
Quantum Crash Course (cont.)
Qubit
(shown as a Bloch Sphere)
100%
Can measure in a different basis
( − , + basis shown here)
= ++− x
y
z
+−
0
1
x
y
z
QKD: Now with more Photons!
Several QKD implementations including the one we’ll talk about use
polarization
Orthogonal Qubit Bases: Orthogonal Polarization Bases:
0 , 1
− , +
0°, 90°
45°, 135°
One-Time Pad Encryption
1001011010111010….
⊕
Shared Key
(One-Time Pad)
0011101000101001
Message
1010110010010011
Encrypted Message
1010110010010011
⊕
1001011010111010….
0011101000101001:)
Decrypted Message
Alice Bob
(XOR)
The Good Stuff: QKD
A First Protocol: BB84
1. Alice and Bob agree on two (orthogonal) bases to use*
Alice
Bit Basis A Basis B
0 0 −
1 1 +
Bob
*Since BB84 is a protocol that uses polarization, the bases should actually be orthogonal
polarization angles but I’ll use qubit bases because I think it’s more intuitive to understand.
A First Protocol: BB84 (cont.)
2. Alice generates a random stream of bits AND a random stream of bases
3. These streams are used to determine the quantum states Alice sends
Alice Bob
1001011010111010…. ABABAABAAABABBAB….
1 − 0 + 0 1 + 0 1 0 + 1 + − 1 − ….
Bit Basis A Basis B
0 0 −
1 1 +
A First Protocol: BB84 (cont.)
4. Alice sends the qubits to Bob who measures them in a random basis
Alice
Bob
1 − 0 + 0 1 + 0 ….
BBAAABBB….
Bit Basis A Basis B
0 0 −
1 1 +
Flashback: Quantum Measurements
Qubit
(shown as a Bloch Sphere)
Measurement in the same basis
as the qubit was encoded yields
the same result 100% of the time
100% = ++− x
y
z
+−
0
1
x
y
z
Flashback: Quantum Measurements
Measurement in an
orthogonal basis yields a
perfectly random basis state
Qubit
(shown as a Bloch Sphere)
= 0
= 1
+−
0
1
x
y
z
0
1
x
y
z
0
1
x
y
z
A First Protocol: BB84 (cont.)
What happens when Bob measures?
Alice (sends)
Bob (measures)
Alice sends +
0 , 1 basis:
0 50%
1 50%
+ 100%
− , + basis:
Bit Basis A Basis B
0 0 −
1 1 +
A First Protocol: BB84 (cont.)
5. Bob converts his measurements back to bits*
Alice Bob
1 − 0 + 0 1 + 0 …. BBAAABBB….
? 00? 0? 1?….
* Note that Bob will only choose the same basis as Alice 50% of the time on average
Bit Basis A Basis B
0 0 −
1 1 +
A First Protocol: BB84 (cont.)
6. Alice and Bob exchange information about the bases they
encoded/measured in over classical channels
7. They discard the bits for which they encoded/measured in different bases
8. The resulting bits are a shared key and can be used as a One-Time Pad!
Alice Bob
BBAAABBB….
?00?0?1?….10010110….
ABABAABA….
0001…. 0001….
Bit Basis A Basis B
0 0 −
1 1 +
The End!*
* Wait! What happened to that ”can detect eavesdropping” stuff?
BB84: From the top! This time with Eve
1. Alice and Bob agree on two (orthogonal) bases to use
Alice
Bit Basis A Basis B
0 0 −
1 1 +
Bob
BB84: With Eve (cont.)
2. Alice generates a random stream of bits AND a random stream of bases
3. These streams are used to determine the quantum states Alice sends
Alice Bob
1001011010111010…. ABABAABAAABABBAB….
1 − 0 + 0 1 + 0 1 0 + 1 + − 1 − ….
Bit Basis A Basis B
0 0 −
1 1 +
BB84: With Eve (cont.)
4. Alice sends the qubits to Bob, but they are intercepted by Eve, who
measures them in a random basis*
Alice
Bit Basis A Basis B
0 0 −
1 1 +
Bob
1 − 0 + 0 1 + 0 ….
BBAAABBB….
Eve
ABABABAB….
* Recall that the act of measurement changes the state of the qubit
meaning that imperceptible passive observation should be impossible
BB84: With Eve (cont.)
What happens if Eve listens in?
Alice (sends)
Bit Basis A Basis B
0 0 −
1 1 +
Bob (measures)
Alice sends +
0 , 1 basis:
0 50%
1 50%
+ 100%
− , + basis:
Eve (measures)
0 50%
1 50%
0 , 1 basis:
− 50%
+ 50%
− , + basis:
+ 100%
0 50%
1 50%
0 , 1 basis: − , + basis:
Error!
BB84: With Eve (cont.)
5. Bob and Eve convert their measurements back to bitstrings
Alice
Bit Basis A Basis B
0 0 −
1 1 +
Bob
1 − 0 + 0 1 + 0 …. BBAAABBB….
Eve
ABABABAB….
10010???….
1 − 0 + 0 ? ? ? ….
?00?0???….
BB84: With Eve (cont.)
Without Eavesdropper
Bit Basis A Basis B
0 0 −
1 1 +
Bob Measures:
?00?0???….
With Eavesdropper
?00?0?1?….
Notice that the presence of an eavesdropper changes the outcome of
Bob’s measurements, leaving additional chances to induce errors
BB84: With Eve (cont.)
6. Alice and Bob exchange information about the bases they
encoded/measured in over classical channels
7. They discard the bits for which they encoded/measured in different bases
to form the candidate shared key
Alice Bob
BBAAABBB….
?00?0???….10010110….
ABABAABA….
0001…. 000?….
Bit Basis A Basis B
0 0 −
1 1 +
Eve
BB84: With Eve (cont.)
8. Alice and Bob then compare a few random bits of the
candidate shared key
Alice Bob0001…. 000?….
Bit Basis A Basis B
0 0 −
1 1 +
Eve
0
1
0
?
✓
✕
* On average there will be a 25% error rate in the presence of an eavesdropper since:
• Errors only occur if Bob chooses the same basis as Alice but Eve chooses the wrong basis
• Eve chooses the same basis as Bob on average 50% of the time
• If Eve and Bob choose different bases, they still measure the same result 50% of the time
BB84: With Eve (cont.)
9. If no errors are detected (e.g. there was no Eve), Alice and Bob drop
the bits they compared and use the remaining bits as their shared key
Alice Bob0001…. 0001….
Bit Basis A Basis B
0 0 −
1 1 +
0
1
0
✓
✓ 1
00….0001….
Shared Key
Can we do better?
If eavesdropping is detected, can we still get a shared key?
Yes* Alice and Bob can use Privacy Amplification to reduce Eve’s
knowledge about a key
If transmission losses or errors occur, can we still get a shared key?
Yes, Alice and Bob can use Information Reconciliation (form of error
correction) to ensure they have identical keys
*The best I’m aware of allows for up to an 18.9% error rate: https://arxiv.org/pdf/quant-ph/0105121.pdf
Physical Implementations
• QKD is done using light
• Most implementations use lasers tuned to get close to producing
single photons
• Transmission can be over optical fibers (421 km is the current record)1
or through free space (has been done over 1200 km to a satellite)2
• Trusted repeater stations are used to create larger QKD links
• BB84 is implemented using polarization (bases are typically [0°, 90°]
and [45°, 135°]), other equivalent schemes use entanglement
1. https://arxiv.org/pdf/1807.03222.pdf
2. https://arxiv.org/pdf/1707.01339.pdf
Weaknesses
• Relies on an authenticated classical channel since BB84 is vulnerable to a
simultaneous MITM attack on both channels
• Sources are not perfect single-photon emitters, additional photons can be
captured by Eve using a Photon-Number-Splitting attack1 (addressed by
decoy state modifications)
• Detectors can be tricked by Eve using bright pulses to only register
measurements in bases she chooses (Faked States Attack)2
• Backscatter from bright pulses from Eve can be used to infer basis choices
(Trojan Horse Attack)3
• Vulnerable to Denial-of-Service attacks if errors are beyond privacy
amplification threshold
• Relay stations provide target for hacking
• Reliant on secure supply-chain for QKD components
1. https://pdfs.semanticscholar.org/87d2/fad6966bf5d9726ebd6be3e96a2e8b12bfdc.pdf
2. https://arxiv.org/pdf/1008.4593.pdf
3. https://arxiv.org/pdf/1406.5813.pdf
Key Benefit (Amended)
• Eavesdropping can be detected* allowing for provably
secure communication+
* On the quantum channel
+ Assuming you can reliably create, transmit, and detect single
photons on trusted secure hardware over a single link
Further Reading
• https://arxiv.org/pdf/0802.4155.pdf (The Security of Practical
Quantum Key Distribution)
Any Questions?
Thank You!
?

More Related Content

What's hot

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Quantum Computing and Qiskit
Quantum Computing and QiskitQuantum Computing and Qiskit
Quantum Computing and QiskitPooja Mistry
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyShyam Mohan
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Professor Lili Saghafi
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
Overview of quantum computing and it's application in artificial intelligence
Overview of quantum computing and it's application in artificial intelligenceOverview of quantum computing and it's application in artificial intelligence
Overview of quantum computing and it's application in artificial intelligenceBincySam2
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstractKalluri Madhuri
 

What's hot (20)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Computing and Qiskit
Quantum Computing and QiskitQuantum Computing and Qiskit
Quantum Computing and Qiskit
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
Quantum Computers new Generation of Computers part 7 by prof lili saghafi Qua...
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Overview of quantum computing and it's application in artificial intelligence
Overview of quantum computing and it's application in artificial intelligenceOverview of quantum computing and it's application in artificial intelligence
Overview of quantum computing and it's application in artificial intelligence
 
Introduction to Quantum Computer
Introduction to Quantum ComputerIntroduction to Quantum Computer
Introduction to Quantum Computer
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 

Similar to Quantum Key Distribution Meetup Slides (Updated)

quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolPerformance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolIJAEMSJORNAL
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum AbbasiIEEEP Karachi
 
NOTA TOPIK 2_SSK20152 (3).pptx
NOTA TOPIK 2_SSK20152 (3).pptxNOTA TOPIK 2_SSK20152 (3).pptx
NOTA TOPIK 2_SSK20152 (3).pptxeedayaya1
 
3. Boolean Algebra.pptx
3. Boolean Algebra.pptx3. Boolean Algebra.pptx
3. Boolean Algebra.pptxNaveenPunia5
 
Quantum Computing - Basic Concept .
Quantum Computing - Basic Concept       .Quantum Computing - Basic Concept       .
Quantum Computing - Basic Concept .Ganesh Pasnurwar
 

Similar to Quantum Key Distribution Meetup Slides (Updated) (13)

crypto.ppt
crypto.pptcrypto.ppt
crypto.ppt
 
crypto.ppt
crypto.pptcrypto.ppt
crypto.ppt
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Computer Science Final Project
Computer Science Final ProjectComputer Science Final Project
Computer Science Final Project
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolPerformance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
 
Report_amit
Report_amitReport_amit
Report_amit
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
NOTA TOPIK 2_SSK20152 (3).pptx
NOTA TOPIK 2_SSK20152 (3).pptxNOTA TOPIK 2_SSK20152 (3).pptx
NOTA TOPIK 2_SSK20152 (3).pptx
 
1542 inner products
1542 inner products1542 inner products
1542 inner products
 
3. Boolean Algebra.pptx
3. Boolean Algebra.pptx3. Boolean Algebra.pptx
3. Boolean Algebra.pptx
 
Quantum Computing - Basic Concept .
Quantum Computing - Basic Concept       .Quantum Computing - Basic Concept       .
Quantum Computing - Basic Concept .
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 

Quantum Key Distribution Meetup Slides (Updated)

  • 1. ”Uncrackable" communications through physics: Quantum Key Distribution (QKD)* * Also sometimes referred to as Quantum Cryptography Kirby Linvill June 24th, 2019
  • 2. What is QKD? • QKD protocols use quantum mechanical phenomena to establish shared keys between two parties that can then be used for symmetric encryption schemes.
  • 3. Key Benefit of QKD • Eavesdropping can be detected allowing for provably secure communication
  • 5. Quantum Crash Course Qubit (shown as a Bloch Sphere) Collapses when measured = 0 = 1 As a consequence, it is impossible to tell what state a qubit is in with only a single measurement* * A corollary is the no cloning theorem which states that it is impossible to copy a qubit +− 0 1 x y z 0 1 x y z 0 1 x y z
  • 6. Quantum Crash Course (cont.) Qubit (shown as a Bloch Sphere) 100% Can measure in a different basis ( − , + basis shown here) = ++− x y z +− 0 1 x y z
  • 7. QKD: Now with more Photons! Several QKD implementations including the one we’ll talk about use polarization Orthogonal Qubit Bases: Orthogonal Polarization Bases: 0 , 1 − , + 0°, 90° 45°, 135°
  • 8. One-Time Pad Encryption 1001011010111010…. ⊕ Shared Key (One-Time Pad) 0011101000101001 Message 1010110010010011 Encrypted Message 1010110010010011 ⊕ 1001011010111010…. 0011101000101001:) Decrypted Message Alice Bob (XOR)
  • 10. A First Protocol: BB84 1. Alice and Bob agree on two (orthogonal) bases to use* Alice Bit Basis A Basis B 0 0 − 1 1 + Bob *Since BB84 is a protocol that uses polarization, the bases should actually be orthogonal polarization angles but I’ll use qubit bases because I think it’s more intuitive to understand.
  • 11. A First Protocol: BB84 (cont.) 2. Alice generates a random stream of bits AND a random stream of bases 3. These streams are used to determine the quantum states Alice sends Alice Bob 1001011010111010…. ABABAABAAABABBAB…. 1 − 0 + 0 1 + 0 1 0 + 1 + − 1 − …. Bit Basis A Basis B 0 0 − 1 1 +
  • 12. A First Protocol: BB84 (cont.) 4. Alice sends the qubits to Bob who measures them in a random basis Alice Bob 1 − 0 + 0 1 + 0 …. BBAAABBB…. Bit Basis A Basis B 0 0 − 1 1 +
  • 13. Flashback: Quantum Measurements Qubit (shown as a Bloch Sphere) Measurement in the same basis as the qubit was encoded yields the same result 100% of the time 100% = ++− x y z +− 0 1 x y z
  • 14. Flashback: Quantum Measurements Measurement in an orthogonal basis yields a perfectly random basis state Qubit (shown as a Bloch Sphere) = 0 = 1 +− 0 1 x y z 0 1 x y z 0 1 x y z
  • 15. A First Protocol: BB84 (cont.) What happens when Bob measures? Alice (sends) Bob (measures) Alice sends + 0 , 1 basis: 0 50% 1 50% + 100% − , + basis: Bit Basis A Basis B 0 0 − 1 1 +
  • 16. A First Protocol: BB84 (cont.) 5. Bob converts his measurements back to bits* Alice Bob 1 − 0 + 0 1 + 0 …. BBAAABBB…. ? 00? 0? 1?…. * Note that Bob will only choose the same basis as Alice 50% of the time on average Bit Basis A Basis B 0 0 − 1 1 +
  • 17. A First Protocol: BB84 (cont.) 6. Alice and Bob exchange information about the bases they encoded/measured in over classical channels 7. They discard the bits for which they encoded/measured in different bases 8. The resulting bits are a shared key and can be used as a One-Time Pad! Alice Bob BBAAABBB…. ?00?0?1?….10010110…. ABABAABA…. 0001…. 0001…. Bit Basis A Basis B 0 0 − 1 1 +
  • 18. The End!* * Wait! What happened to that ”can detect eavesdropping” stuff?
  • 19. BB84: From the top! This time with Eve 1. Alice and Bob agree on two (orthogonal) bases to use Alice Bit Basis A Basis B 0 0 − 1 1 + Bob
  • 20. BB84: With Eve (cont.) 2. Alice generates a random stream of bits AND a random stream of bases 3. These streams are used to determine the quantum states Alice sends Alice Bob 1001011010111010…. ABABAABAAABABBAB…. 1 − 0 + 0 1 + 0 1 0 + 1 + − 1 − …. Bit Basis A Basis B 0 0 − 1 1 +
  • 21. BB84: With Eve (cont.) 4. Alice sends the qubits to Bob, but they are intercepted by Eve, who measures them in a random basis* Alice Bit Basis A Basis B 0 0 − 1 1 + Bob 1 − 0 + 0 1 + 0 …. BBAAABBB…. Eve ABABABAB…. * Recall that the act of measurement changes the state of the qubit meaning that imperceptible passive observation should be impossible
  • 22. BB84: With Eve (cont.) What happens if Eve listens in? Alice (sends) Bit Basis A Basis B 0 0 − 1 1 + Bob (measures) Alice sends + 0 , 1 basis: 0 50% 1 50% + 100% − , + basis: Eve (measures) 0 50% 1 50% 0 , 1 basis: − 50% + 50% − , + basis: + 100% 0 50% 1 50% 0 , 1 basis: − , + basis: Error!
  • 23. BB84: With Eve (cont.) 5. Bob and Eve convert their measurements back to bitstrings Alice Bit Basis A Basis B 0 0 − 1 1 + Bob 1 − 0 + 0 1 + 0 …. BBAAABBB…. Eve ABABABAB…. 10010???…. 1 − 0 + 0 ? ? ? …. ?00?0???….
  • 24. BB84: With Eve (cont.) Without Eavesdropper Bit Basis A Basis B 0 0 − 1 1 + Bob Measures: ?00?0???…. With Eavesdropper ?00?0?1?…. Notice that the presence of an eavesdropper changes the outcome of Bob’s measurements, leaving additional chances to induce errors
  • 25. BB84: With Eve (cont.) 6. Alice and Bob exchange information about the bases they encoded/measured in over classical channels 7. They discard the bits for which they encoded/measured in different bases to form the candidate shared key Alice Bob BBAAABBB…. ?00?0???….10010110…. ABABAABA…. 0001…. 000?…. Bit Basis A Basis B 0 0 − 1 1 + Eve
  • 26. BB84: With Eve (cont.) 8. Alice and Bob then compare a few random bits of the candidate shared key Alice Bob0001…. 000?…. Bit Basis A Basis B 0 0 − 1 1 + Eve 0 1 0 ? ✓ ✕ * On average there will be a 25% error rate in the presence of an eavesdropper since: • Errors only occur if Bob chooses the same basis as Alice but Eve chooses the wrong basis • Eve chooses the same basis as Bob on average 50% of the time • If Eve and Bob choose different bases, they still measure the same result 50% of the time
  • 27. BB84: With Eve (cont.) 9. If no errors are detected (e.g. there was no Eve), Alice and Bob drop the bits they compared and use the remaining bits as their shared key Alice Bob0001…. 0001…. Bit Basis A Basis B 0 0 − 1 1 + 0 1 0 ✓ ✓ 1 00….0001…. Shared Key
  • 28. Can we do better? If eavesdropping is detected, can we still get a shared key? Yes* Alice and Bob can use Privacy Amplification to reduce Eve’s knowledge about a key If transmission losses or errors occur, can we still get a shared key? Yes, Alice and Bob can use Information Reconciliation (form of error correction) to ensure they have identical keys *The best I’m aware of allows for up to an 18.9% error rate: https://arxiv.org/pdf/quant-ph/0105121.pdf
  • 29. Physical Implementations • QKD is done using light • Most implementations use lasers tuned to get close to producing single photons • Transmission can be over optical fibers (421 km is the current record)1 or through free space (has been done over 1200 km to a satellite)2 • Trusted repeater stations are used to create larger QKD links • BB84 is implemented using polarization (bases are typically [0°, 90°] and [45°, 135°]), other equivalent schemes use entanglement 1. https://arxiv.org/pdf/1807.03222.pdf 2. https://arxiv.org/pdf/1707.01339.pdf
  • 30. Weaknesses • Relies on an authenticated classical channel since BB84 is vulnerable to a simultaneous MITM attack on both channels • Sources are not perfect single-photon emitters, additional photons can be captured by Eve using a Photon-Number-Splitting attack1 (addressed by decoy state modifications) • Detectors can be tricked by Eve using bright pulses to only register measurements in bases she chooses (Faked States Attack)2 • Backscatter from bright pulses from Eve can be used to infer basis choices (Trojan Horse Attack)3 • Vulnerable to Denial-of-Service attacks if errors are beyond privacy amplification threshold • Relay stations provide target for hacking • Reliant on secure supply-chain for QKD components 1. https://pdfs.semanticscholar.org/87d2/fad6966bf5d9726ebd6be3e96a2e8b12bfdc.pdf 2. https://arxiv.org/pdf/1008.4593.pdf 3. https://arxiv.org/pdf/1406.5813.pdf
  • 31. Key Benefit (Amended) • Eavesdropping can be detected* allowing for provably secure communication+ * On the quantum channel + Assuming you can reliably create, transmit, and detect single photons on trusted secure hardware over a single link
  • 32. Further Reading • https://arxiv.org/pdf/0802.4155.pdf (The Security of Practical Quantum Key Distribution)