SlideShare a Scribd company logo
1 of 43
Quantum Cryptography
Beyond the buzz
Grégoire Ribordy
CERN, May 3rd 2006
www.idquantique.com 2
Outline
 Quantum physics and information technology
 The limits of classical cryptography
 The principles of quantum cryptography
 Practical systems and applications
 Future directions
www.idquantique.com 3
Moore’s law and quantum physics
Oui
Non
1
10
100
1000
10000
100000
1970 1980 1990 2000 2010 2020
Year
Transistors
per
chip
[x1000]
0
10
20
30
40
50
Size
of
transistor's
grid
[atoms]
1
10
100
1000
10000
100000
1970 1980 1990 2000 2010 2020
Year
Transistors
per
chip
[x1000]
0
10
20
30
40
50
Size
of
transistor's
grid
[atoms]
Quantum Limit
www.idquantique.com 4
Classical and Quantum physics
Classical physics
 … - 1900
 Describes the macroscopic world
 Deterministic
 Intuitive
Quantum physics
 1900 - …
 Description of the microscopic
world
 Probabilistic
 Central role of the observer
 Not very intuitive
Quantum physics  Novel information processing possibilities
 Quantum Information Theory (QIT)
www.idquantique.com 5
Generating random numbers with quantum physics
 High bit rate
• 4 or 16 Mbits/s
 Continuous monitoring
 Main OS’s supported
www.idquantique.com 6
Outline
 Quantum physics and information technology
 The limits of classical cryptography
 The principles of quantum cryptography
 Practical systems and applications
 Future directions
www.idquantique.com 7

Message
Public Key
Scrambled
Message

Message
Private Key
Different Keys

Message
Secret Key
Scrambled
Message

Message
Secret Key
Identical keys
Key Exchange ?!?
Introduction: Classical Cryptography
 Secret Key Cryptography
 Public Key Cryptography
Alice
Bob
Different keys
 Key exchange solved
Vulnerabilities!!!
www.idquantique.com 8
Key length
Computing
time
Decryption
(without key)
Security of public key cryptography
Encryption
Decryption (with key)
Selected Key Length
www.idquantique.com 9
Vulnerabilities of public key cryptography
Key length
Computing
time
Classical computer
Selected Key Length
www.idquantique.com 10
Vulnerabilities of public key cryptography
Key length
Computing
time
Quantum computer
Classical computer
& Theoretical progress
Selected Key Length
www.idquantique.com 11
Where does Quantum Cryptography fit in?

Message
Secret Key
Scrambled
Message

Message
Secret Key
Alice
Bob
Quantum Cryptography is a key distribution technique!
Quantum Key Distribution is a better name!!!
Secret key exchange by quantum cryptography
www.idquantique.com 12
Outline
 Quantum physics and information technology
 The limits of classical cryptography
 The principles of quantum cryptography
 Practical systems and applications
 Future directions
www.idquantique.com 13
Physical implementation of a data channel
Fragile !
"0"
"1"
"1"
Classical communication Quantum communication
Security guaranteed by the laws of quantum physics
www.idquantique.com 14
Quantum Cryptography: rules of the game
1. Details of the protocole publicly known
2. Goal: to produce a secret key or nothing
 « Eve cannot do better than cutting the line »
Alice and Bob: to estimate Eve’s information on key
IAE small: Produce a key
IAE large:
|...> sk’
Eve
Quantum channel
Classical channel
QUANTUM KEY DISTRIBUTION
www.idquantique.com 15
Polarization of Photons
 Direction of oscillation of the electric field associated to a lightwave
 Polarization states
 What can we do with it ?
50 %
E


50 %
www.idquantique.com 16
Irreversibility of Measurements
Incoming photon polarized at 90
Incoming photon polarized at 45
50 %
Rotation of polarizer
50 %
www.idquantique.com 17
Quantum communications
 Transmitting information with a single-photon
 Use a quantum property to carry information
Liner States
= "0" = |0>
= "1" = |1>
www.idquantique.com 18
Eavesdropping (1)
 A single-photon constitutes an elementary quantum system
It cannot be split
 Semi-transparent mirror
?
?
50%
50%
www.idquantique.com 19
Eavesdropping (2)
 Communication interception
 Use quantum physics to force spy to introduce errors in the
communication
?
|0> |0>
Eve
Bob
Alice
www.idquantique.com 20
Quantum Cryptography Protocole
 BB84
 A better name: Quantum Key Distribution
Alice's Bit Sequence
0 1 0 - 0 1 1 1 1 - 1 0
- 1 - - 0 1 - - 1 - 1 0
Bob's Bases
Bob's Results
Key
Alice
Bob
Polarizers
Horizontal - Vertical
Diagonal (-45 , +45 )
 
H/V Basis
45 Basis

0
0
0
0
www.idquantique.com 21
Eavesdropping (3)
50% 50%
50%
50%
50% 50% 50%
50%
Bob
Eve
Ok Ok
Ok
Error
Error
Alice
www.idquantique.com 22
Key Distillation (ideal case)
Alice Bob
Quantum channel
QBER =
0 : no eavesdropping
> 0 : eavesdropping
Sifted key
Reveals rather than prevents eavesdropping
A better name: quantum key distribution
www.idquantique.com 23
Key Distillation (realistic case)
Alice Bob
Quantum channel
Public channel
(losses)
Sifted key
Raw key
Key Key
www.idquantique.com 24
Information curves
0.4
0.0
Shannon
Information
0.1 0.2 0.3
0.0
0.2
0.4
0.6
0.8
1.0
QBER
)
(
1 QBER
H
IAB 

IAE
Opt. indiv. attack
Secret key rate
www.idquantique.com 25
The Principles of Quantum Cryptography: Summary
Quantum Communication
Raw key exchange
Integrity Verification
Key Distillation
Key Use
Quantum Cryptography
Conventional Symmetric
Cryptography
Point-to-point optical link
Future-proof key exchange
with security guaranteed by
the laws of physics
www.idquantique.com 26
Outline
 Quantum physics and information technology
 The limits of classical cryptography
 The principles of quantum cryptography
 Practical systems and applications
 Future directions
www.idquantique.com 27
Building a Quantum Key Distibution System
 Necessary components
 “System approach”
Channel
Single-Photon Source
Single-Photon Detector
www.idquantique.com 28
Polarization Coding
 Typical system
LD 1
LD 2
LD 3
LD 4
Quantum
Channel
Alice Bob
Basis 1
Basis 2
/2
PBS
PBS
"0"
"1"
"0"
Waveplates
BS
BS
BS F "1"
APD
APD
Public Channel
www.idquantique.com 29
Interferences
www.idquantique.com 30
Interferometer
 Classical interference

Port 1
Port 2
E

1
E

2
E

0
0.5
1
0 2 4 6
Phase [radians]
Sortie 1
Sortie 2
www.idquantique.com 31
Phase encoding
 Quantum optics: single-photon
A
B
Alice
Bob
D2
D1
0
0.5
1
0 2 4 6
Phase [radians]
Output 1
Output 2
Base 1: A = 0; p
Base 2: A = p/2; 3 p/2
Basis choice: B = 0; p/2
Compatible: Alice A  Di
Bob Di  A
(A-B = np)
Bases
Incompatible: Alice and Bob ??
(A-B = p/2)
www.idquantique.com 32
Phase encoding (2)
 Stability of such system ???
 In practice
A
B
Alice
Bob
D2
D1
10 km
10 km ± /10 (100 nm)
Alice
A B
Bob
Time (ns)
LL
0
20
40
60
80
CC
-3 -2 -1 0 1 2 3
CL + LC
+
www.idquantique.com 33
Auto-compensated set-up
 Time multiplexing
Alice
Bob
A
B
Att.
Short arm
Long arm
MF
SP
www.idquantique.com 34
Practical requirements
 Distance limitation < 100 km
Current range is sufficient for a vast majority of MAN/SAN applications
 Point-to-point dark fiber
• Amplifiers
• Opto-electro-opto conversion
perturbation of the quantum state of the photon
Distance
Signal, Noise
pnoise
psignal
www.idquantique.com 35
Link Encryptors with QKD
 Network Appliance
• Point-to-point link encryption
• Layer 2 device
• Network protocole independent
• Compatible with higher layer encryption
Specifications
- Encryption: AES (128, 192, 256 bits)
- Key rate as high as 100 keys / s
- Distance < 100 km (60 miles)
- Pair of dark fiber
Target Applications
MAN or SAN encryption
www.idquantique.com 36
« Swiss Quantum » Pilot Site
www.idquantique.com 37
Outline
 Quantum physics and information technology
 The limits of classical cryptography
 The principles of quantum cryptography
 Practical systems and applications
 Future directions
www.idquantique.com 38
Extending the key distribution distance
 Chaining links
 Better components
 Free space links to low-earth-orbit (LEO) satellites
 Quantum relays and repeaters
Tokyo Geneva
A B
B' A' B" A" B'" A'"
Telco Infrastructure
www.idquantique.com 39
Compatibility with conventional optical networks
 Optical switching
 WDM Links
www.idquantique.com 40
Thank you very much for your attention
id Quantique SA
Chemin de la Marbrerie, 3
CH-1227 Carouge
Switzerland
Ph: +41 22 301 83 71
Fax: +41 22 301 83 79
info@idquantique.com
www.idquantique.com
www.idquantique.com 41
Optical Taps
 Optical taps are cheap and simple to use
« Tapping a fibre-optic cable without being detected, and making sense of the
information you collect isn’t trivial but has certainly been done by intelligence
agencies for the past seven or eight years. These days, it is within the range of a
well funded attacker, probably even a really curious college physics major with
access to a fibre optics lab and lots of time on his hands. »
John Pescatore, former NSA Analyst
The submarine « USS Carter » worth $4.1 bn will be able to tap and eavesdrop
undersea cables.
www.idquantique.com 42
Key use
 The key produced by a quantum cryptography system is used with
conventional symmetric encryption algorithms
• One-time pad  « unconditional security »
• Other symmetric algorithms (AES, Tripe-DES, etc.)  enhanced security
by frequent key change
 Why is Quantum Cryptography not used to transmit data?
1) Quantum Cryptography cannot guarantee that one particular bit will
actually be received.
With a random key, it is not a problem. With data, it is.
2) Quantum Cryptography does not prevent eavesdropping, but reveals it a
posteriori. Sending a key and verifying its secrecy allows to prevent
information leakage.
www.idquantique.com 43
Device Authentication
Initial key
Quantum Cryptography Session n: key material
Authentication key
Encryption/decryption key
Session n
Authentication key n
Authentication
key
refreshed

More Related Content

Similar to Presentation_CERN_03-05-06.ppt

Digital imaging of head and neck of the animals
Digital imaging of head and neck of the animalsDigital imaging of head and neck of the animals
Digital imaging of head and neck of the animals
sozanmuhamad1
 
Digital imaging of the all body organ of
Digital imaging  of the all body organ ofDigital imaging  of the all body organ of
Digital imaging of the all body organ of
sozanmuhamad1
 
Quantum Computing at NIST
Quantum Computing at NISTQuantum Computing at NIST
Quantum Computing at NIST
inside-BigData.com
 
An affordable Quantum Cryptography system
An affordable Quantum Cryptography systemAn affordable Quantum Cryptography system
An affordable Quantum Cryptography system
Rita Pizzi
 
Quantum technology
Quantum technologyQuantum technology
Quantum technology
eaiti
 
Continuous variables quantum cryptography
Continuous variables quantum cryptographyContinuous variables quantum cryptography
Continuous variables quantum cryptography
wtyru1989
 
Nanobeam implantation
Nanobeam implantationNanobeam implantation
Nanobeam implantation
Sam Brown
 
Emerging Technologies in On-Chip and Off-Chip Interconnection Networks
Emerging Technologies in On-Chip and Off-Chip Interconnection NetworksEmerging Technologies in On-Chip and Off-Chip Interconnection Networks
Emerging Technologies in On-Chip and Off-Chip Interconnection Networks
Ashif Sikder
 

Similar to Presentation_CERN_03-05-06.ppt (20)

Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
 
Digital imaging of head and neck of the animals
Digital imaging of head and neck of the animalsDigital imaging of head and neck of the animals
Digital imaging of head and neck of the animals
 
Digital imaging of the all body organ of
Digital imaging  of the all body organ ofDigital imaging  of the all body organ of
Digital imaging of the all body organ of
 
Quantum Computing at NIST
Quantum Computing at NISTQuantum Computing at NIST
Quantum Computing at NIST
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
 
An affordable Quantum Cryptography system
An affordable Quantum Cryptography systemAn affordable Quantum Cryptography system
An affordable Quantum Cryptography system
 
Quantum technology
Quantum technologyQuantum technology
Quantum technology
 
nano%20tutorial%20pt1.pdf
nano%20tutorial%20pt1.pdfnano%20tutorial%20pt1.pdf
nano%20tutorial%20pt1.pdf
 
Photonic Computing Presention V 2.1
Photonic Computing Presention V 2.1Photonic Computing Presention V 2.1
Photonic Computing Presention V 2.1
 
Photonic Computing Presentation V 2.1
Photonic Computing Presentation V 2.1Photonic Computing Presentation V 2.1
Photonic Computing Presentation V 2.1
 
Continuous variables quantum cryptography
Continuous variables quantum cryptographyContinuous variables quantum cryptography
Continuous variables quantum cryptography
 
Nanobeam implantation
Nanobeam implantationNanobeam implantation
Nanobeam implantation
 
Quantum Computing Basics
Quantum Computing BasicsQuantum Computing Basics
Quantum Computing Basics
 
Introduction to Quantum Computer
Introduction to Quantum ComputerIntroduction to Quantum Computer
Introduction to Quantum Computer
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Quantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTUREQuantum computing COMPLETE LECTURE
Quantum computing COMPLETE LECTURE
 
Valerio bocci ardusipm seminar makers week 1st june 2016 physics department r...
Valerio bocci ardusipm seminar makers week 1st june 2016 physics department r...Valerio bocci ardusipm seminar makers week 1st june 2016 physics department r...
Valerio bocci ardusipm seminar makers week 1st june 2016 physics department r...
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Emerging Technologies in On-Chip and Off-Chip Interconnection Networks
Emerging Technologies in On-Chip and Off-Chip Interconnection NetworksEmerging Technologies in On-Chip and Off-Chip Interconnection Networks
Emerging Technologies in On-Chip and Off-Chip Interconnection Networks
 
What is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is ImportantWhat is Quantum Computing and Why it is Important
What is Quantum Computing and Why it is Important
 

Recently uploaded

+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 

Presentation_CERN_03-05-06.ppt

  • 1. Quantum Cryptography Beyond the buzz Grégoire Ribordy CERN, May 3rd 2006
  • 2. www.idquantique.com 2 Outline  Quantum physics and information technology  The limits of classical cryptography  The principles of quantum cryptography  Practical systems and applications  Future directions
  • 3. www.idquantique.com 3 Moore’s law and quantum physics Oui Non 1 10 100 1000 10000 100000 1970 1980 1990 2000 2010 2020 Year Transistors per chip [x1000] 0 10 20 30 40 50 Size of transistor's grid [atoms] 1 10 100 1000 10000 100000 1970 1980 1990 2000 2010 2020 Year Transistors per chip [x1000] 0 10 20 30 40 50 Size of transistor's grid [atoms] Quantum Limit
  • 4. www.idquantique.com 4 Classical and Quantum physics Classical physics  … - 1900  Describes the macroscopic world  Deterministic  Intuitive Quantum physics  1900 - …  Description of the microscopic world  Probabilistic  Central role of the observer  Not very intuitive Quantum physics  Novel information processing possibilities  Quantum Information Theory (QIT)
  • 5. www.idquantique.com 5 Generating random numbers with quantum physics  High bit rate • 4 or 16 Mbits/s  Continuous monitoring  Main OS’s supported
  • 6. www.idquantique.com 6 Outline  Quantum physics and information technology  The limits of classical cryptography  The principles of quantum cryptography  Practical systems and applications  Future directions
  • 7. www.idquantique.com 7  Message Public Key Scrambled Message  Message Private Key Different Keys  Message Secret Key Scrambled Message  Message Secret Key Identical keys Key Exchange ?!? Introduction: Classical Cryptography  Secret Key Cryptography  Public Key Cryptography Alice Bob Different keys  Key exchange solved Vulnerabilities!!!
  • 8. www.idquantique.com 8 Key length Computing time Decryption (without key) Security of public key cryptography Encryption Decryption (with key) Selected Key Length
  • 9. www.idquantique.com 9 Vulnerabilities of public key cryptography Key length Computing time Classical computer Selected Key Length
  • 10. www.idquantique.com 10 Vulnerabilities of public key cryptography Key length Computing time Quantum computer Classical computer & Theoretical progress Selected Key Length
  • 11. www.idquantique.com 11 Where does Quantum Cryptography fit in?  Message Secret Key Scrambled Message  Message Secret Key Alice Bob Quantum Cryptography is a key distribution technique! Quantum Key Distribution is a better name!!! Secret key exchange by quantum cryptography
  • 12. www.idquantique.com 12 Outline  Quantum physics and information technology  The limits of classical cryptography  The principles of quantum cryptography  Practical systems and applications  Future directions
  • 13. www.idquantique.com 13 Physical implementation of a data channel Fragile ! "0" "1" "1" Classical communication Quantum communication Security guaranteed by the laws of quantum physics
  • 14. www.idquantique.com 14 Quantum Cryptography: rules of the game 1. Details of the protocole publicly known 2. Goal: to produce a secret key or nothing  « Eve cannot do better than cutting the line » Alice and Bob: to estimate Eve’s information on key IAE small: Produce a key IAE large: |...> sk’ Eve Quantum channel Classical channel QUANTUM KEY DISTRIBUTION
  • 15. www.idquantique.com 15 Polarization of Photons  Direction of oscillation of the electric field associated to a lightwave  Polarization states  What can we do with it ? 50 % E   50 %
  • 16. www.idquantique.com 16 Irreversibility of Measurements Incoming photon polarized at 90 Incoming photon polarized at 45 50 % Rotation of polarizer 50 %
  • 17. www.idquantique.com 17 Quantum communications  Transmitting information with a single-photon  Use a quantum property to carry information Liner States = "0" = |0> = "1" = |1>
  • 18. www.idquantique.com 18 Eavesdropping (1)  A single-photon constitutes an elementary quantum system It cannot be split  Semi-transparent mirror ? ? 50% 50%
  • 19. www.idquantique.com 19 Eavesdropping (2)  Communication interception  Use quantum physics to force spy to introduce errors in the communication ? |0> |0> Eve Bob Alice
  • 20. www.idquantique.com 20 Quantum Cryptography Protocole  BB84  A better name: Quantum Key Distribution Alice's Bit Sequence 0 1 0 - 0 1 1 1 1 - 1 0 - 1 - - 0 1 - - 1 - 1 0 Bob's Bases Bob's Results Key Alice Bob Polarizers Horizontal - Vertical Diagonal (-45 , +45 )   H/V Basis 45 Basis  0 0 0 0
  • 21. www.idquantique.com 21 Eavesdropping (3) 50% 50% 50% 50% 50% 50% 50% 50% Bob Eve Ok Ok Ok Error Error Alice
  • 22. www.idquantique.com 22 Key Distillation (ideal case) Alice Bob Quantum channel QBER = 0 : no eavesdropping > 0 : eavesdropping Sifted key Reveals rather than prevents eavesdropping A better name: quantum key distribution
  • 23. www.idquantique.com 23 Key Distillation (realistic case) Alice Bob Quantum channel Public channel (losses) Sifted key Raw key Key Key
  • 24. www.idquantique.com 24 Information curves 0.4 0.0 Shannon Information 0.1 0.2 0.3 0.0 0.2 0.4 0.6 0.8 1.0 QBER ) ( 1 QBER H IAB   IAE Opt. indiv. attack Secret key rate
  • 25. www.idquantique.com 25 The Principles of Quantum Cryptography: Summary Quantum Communication Raw key exchange Integrity Verification Key Distillation Key Use Quantum Cryptography Conventional Symmetric Cryptography Point-to-point optical link Future-proof key exchange with security guaranteed by the laws of physics
  • 26. www.idquantique.com 26 Outline  Quantum physics and information technology  The limits of classical cryptography  The principles of quantum cryptography  Practical systems and applications  Future directions
  • 27. www.idquantique.com 27 Building a Quantum Key Distibution System  Necessary components  “System approach” Channel Single-Photon Source Single-Photon Detector
  • 28. www.idquantique.com 28 Polarization Coding  Typical system LD 1 LD 2 LD 3 LD 4 Quantum Channel Alice Bob Basis 1 Basis 2 /2 PBS PBS "0" "1" "0" Waveplates BS BS BS F "1" APD APD Public Channel
  • 30. www.idquantique.com 30 Interferometer  Classical interference  Port 1 Port 2 E  1 E  2 E  0 0.5 1 0 2 4 6 Phase [radians] Sortie 1 Sortie 2
  • 31. www.idquantique.com 31 Phase encoding  Quantum optics: single-photon A B Alice Bob D2 D1 0 0.5 1 0 2 4 6 Phase [radians] Output 1 Output 2 Base 1: A = 0; p Base 2: A = p/2; 3 p/2 Basis choice: B = 0; p/2 Compatible: Alice A  Di Bob Di  A (A-B = np) Bases Incompatible: Alice and Bob ?? (A-B = p/2)
  • 32. www.idquantique.com 32 Phase encoding (2)  Stability of such system ???  In practice A B Alice Bob D2 D1 10 km 10 km ± /10 (100 nm) Alice A B Bob Time (ns) LL 0 20 40 60 80 CC -3 -2 -1 0 1 2 3 CL + LC +
  • 33. www.idquantique.com 33 Auto-compensated set-up  Time multiplexing Alice Bob A B Att. Short arm Long arm MF SP
  • 34. www.idquantique.com 34 Practical requirements  Distance limitation < 100 km Current range is sufficient for a vast majority of MAN/SAN applications  Point-to-point dark fiber • Amplifiers • Opto-electro-opto conversion perturbation of the quantum state of the photon Distance Signal, Noise pnoise psignal
  • 35. www.idquantique.com 35 Link Encryptors with QKD  Network Appliance • Point-to-point link encryption • Layer 2 device • Network protocole independent • Compatible with higher layer encryption Specifications - Encryption: AES (128, 192, 256 bits) - Key rate as high as 100 keys / s - Distance < 100 km (60 miles) - Pair of dark fiber Target Applications MAN or SAN encryption
  • 36. www.idquantique.com 36 « Swiss Quantum » Pilot Site
  • 37. www.idquantique.com 37 Outline  Quantum physics and information technology  The limits of classical cryptography  The principles of quantum cryptography  Practical systems and applications  Future directions
  • 38. www.idquantique.com 38 Extending the key distribution distance  Chaining links  Better components  Free space links to low-earth-orbit (LEO) satellites  Quantum relays and repeaters Tokyo Geneva A B B' A' B" A" B'" A'" Telco Infrastructure
  • 39. www.idquantique.com 39 Compatibility with conventional optical networks  Optical switching  WDM Links
  • 40. www.idquantique.com 40 Thank you very much for your attention id Quantique SA Chemin de la Marbrerie, 3 CH-1227 Carouge Switzerland Ph: +41 22 301 83 71 Fax: +41 22 301 83 79 info@idquantique.com www.idquantique.com
  • 41. www.idquantique.com 41 Optical Taps  Optical taps are cheap and simple to use « Tapping a fibre-optic cable without being detected, and making sense of the information you collect isn’t trivial but has certainly been done by intelligence agencies for the past seven or eight years. These days, it is within the range of a well funded attacker, probably even a really curious college physics major with access to a fibre optics lab and lots of time on his hands. » John Pescatore, former NSA Analyst The submarine « USS Carter » worth $4.1 bn will be able to tap and eavesdrop undersea cables.
  • 42. www.idquantique.com 42 Key use  The key produced by a quantum cryptography system is used with conventional symmetric encryption algorithms • One-time pad  « unconditional security » • Other symmetric algorithms (AES, Tripe-DES, etc.)  enhanced security by frequent key change  Why is Quantum Cryptography not used to transmit data? 1) Quantum Cryptography cannot guarantee that one particular bit will actually be received. With a random key, it is not a problem. With data, it is. 2) Quantum Cryptography does not prevent eavesdropping, but reveals it a posteriori. Sending a key and verifying its secrecy allows to prevent information leakage.
  • 43. www.idquantique.com 43 Device Authentication Initial key Quantum Cryptography Session n: key material Authentication key Encryption/decryption key Session n Authentication key n Authentication key refreshed