The document provides an overview of quantum cryptography and quantum key distribution. It discusses how quantum physics allows for more secure key exchange compared to classical cryptography. The principles of quantum cryptography are explained, including how single photons can be used to transmit encryption keys in a way that detects eavesdropping. Practical quantum cryptography systems are also summarized, highlighting components like single-photon sources and detectors. Potential applications and future directions are outlined, such as extending the transmission distance using quantum relays or satellites.
2. www.idquantique.com 2
Outline
Quantum physics and information technology
The limits of classical cryptography
The principles of quantum cryptography
Practical systems and applications
Future directions
3. www.idquantique.com 3
Moore’s law and quantum physics
Oui
Non
1
10
100
1000
10000
100000
1970 1980 1990 2000 2010 2020
Year
Transistors
per
chip
[x1000]
0
10
20
30
40
50
Size
of
transistor's
grid
[atoms]
1
10
100
1000
10000
100000
1970 1980 1990 2000 2010 2020
Year
Transistors
per
chip
[x1000]
0
10
20
30
40
50
Size
of
transistor's
grid
[atoms]
Quantum Limit
4. www.idquantique.com 4
Classical and Quantum physics
Classical physics
… - 1900
Describes the macroscopic world
Deterministic
Intuitive
Quantum physics
1900 - …
Description of the microscopic
world
Probabilistic
Central role of the observer
Not very intuitive
Quantum physics Novel information processing possibilities
Quantum Information Theory (QIT)
6. www.idquantique.com 6
Outline
Quantum physics and information technology
The limits of classical cryptography
The principles of quantum cryptography
Practical systems and applications
Future directions
7. www.idquantique.com 7
Message
Public Key
Scrambled
Message
Message
Private Key
Different Keys
Message
Secret Key
Scrambled
Message
Message
Secret Key
Identical keys
Key Exchange ?!?
Introduction: Classical Cryptography
Secret Key Cryptography
Public Key Cryptography
Alice
Bob
Different keys
Key exchange solved
Vulnerabilities!!!
10. www.idquantique.com 10
Vulnerabilities of public key cryptography
Key length
Computing
time
Quantum computer
Classical computer
& Theoretical progress
Selected Key Length
11. www.idquantique.com 11
Where does Quantum Cryptography fit in?
Message
Secret Key
Scrambled
Message
Message
Secret Key
Alice
Bob
Quantum Cryptography is a key distribution technique!
Quantum Key Distribution is a better name!!!
Secret key exchange by quantum cryptography
12. www.idquantique.com 12
Outline
Quantum physics and information technology
The limits of classical cryptography
The principles of quantum cryptography
Practical systems and applications
Future directions
14. www.idquantique.com 14
Quantum Cryptography: rules of the game
1. Details of the protocole publicly known
2. Goal: to produce a secret key or nothing
« Eve cannot do better than cutting the line »
Alice and Bob: to estimate Eve’s information on key
IAE small: Produce a key
IAE large:
|...> sk’
Eve
Quantum channel
Classical channel
QUANTUM KEY DISTRIBUTION
15. www.idquantique.com 15
Polarization of Photons
Direction of oscillation of the electric field associated to a lightwave
Polarization states
What can we do with it ?
50 %
E
50 %
19. www.idquantique.com 19
Eavesdropping (2)
Communication interception
Use quantum physics to force spy to introduce errors in the
communication
?
|0> |0>
Eve
Bob
Alice
22. www.idquantique.com 22
Key Distillation (ideal case)
Alice Bob
Quantum channel
QBER =
0 : no eavesdropping
> 0 : eavesdropping
Sifted key
Reveals rather than prevents eavesdropping
A better name: quantum key distribution
25. www.idquantique.com 25
The Principles of Quantum Cryptography: Summary
Quantum Communication
Raw key exchange
Integrity Verification
Key Distillation
Key Use
Quantum Cryptography
Conventional Symmetric
Cryptography
Point-to-point optical link
Future-proof key exchange
with security guaranteed by
the laws of physics
26. www.idquantique.com 26
Outline
Quantum physics and information technology
The limits of classical cryptography
The principles of quantum cryptography
Practical systems and applications
Future directions
27. www.idquantique.com 27
Building a Quantum Key Distibution System
Necessary components
“System approach”
Channel
Single-Photon Source
Single-Photon Detector
28. www.idquantique.com 28
Polarization Coding
Typical system
LD 1
LD 2
LD 3
LD 4
Quantum
Channel
Alice Bob
Basis 1
Basis 2
/2
PBS
PBS
"0"
"1"
"0"
Waveplates
BS
BS
BS F "1"
APD
APD
Public Channel
31. www.idquantique.com 31
Phase encoding
Quantum optics: single-photon
A
B
Alice
Bob
D2
D1
0
0.5
1
0 2 4 6
Phase [radians]
Output 1
Output 2
Base 1: A = 0; p
Base 2: A = p/2; 3 p/2
Basis choice: B = 0; p/2
Compatible: Alice A Di
Bob Di A
(A-B = np)
Bases
Incompatible: Alice and Bob ??
(A-B = p/2)
32. www.idquantique.com 32
Phase encoding (2)
Stability of such system ???
In practice
A
B
Alice
Bob
D2
D1
10 km
10 km ± /10 (100 nm)
Alice
A B
Bob
Time (ns)
LL
0
20
40
60
80
CC
-3 -2 -1 0 1 2 3
CL + LC
+
34. www.idquantique.com 34
Practical requirements
Distance limitation < 100 km
Current range is sufficient for a vast majority of MAN/SAN applications
Point-to-point dark fiber
• Amplifiers
• Opto-electro-opto conversion
perturbation of the quantum state of the photon
Distance
Signal, Noise
pnoise
psignal
35. www.idquantique.com 35
Link Encryptors with QKD
Network Appliance
• Point-to-point link encryption
• Layer 2 device
• Network protocole independent
• Compatible with higher layer encryption
Specifications
- Encryption: AES (128, 192, 256 bits)
- Key rate as high as 100 keys / s
- Distance < 100 km (60 miles)
- Pair of dark fiber
Target Applications
MAN or SAN encryption
37. www.idquantique.com 37
Outline
Quantum physics and information technology
The limits of classical cryptography
The principles of quantum cryptography
Practical systems and applications
Future directions
38. www.idquantique.com 38
Extending the key distribution distance
Chaining links
Better components
Free space links to low-earth-orbit (LEO) satellites
Quantum relays and repeaters
Tokyo Geneva
A B
B' A' B" A" B'" A'"
Telco Infrastructure
40. www.idquantique.com 40
Thank you very much for your attention
id Quantique SA
Chemin de la Marbrerie, 3
CH-1227 Carouge
Switzerland
Ph: +41 22 301 83 71
Fax: +41 22 301 83 79
info@idquantique.com
www.idquantique.com
41. www.idquantique.com 41
Optical Taps
Optical taps are cheap and simple to use
« Tapping a fibre-optic cable without being detected, and making sense of the
information you collect isn’t trivial but has certainly been done by intelligence
agencies for the past seven or eight years. These days, it is within the range of a
well funded attacker, probably even a really curious college physics major with
access to a fibre optics lab and lots of time on his hands. »
John Pescatore, former NSA Analyst
The submarine « USS Carter » worth $4.1 bn will be able to tap and eavesdrop
undersea cables.
42. www.idquantique.com 42
Key use
The key produced by a quantum cryptography system is used with
conventional symmetric encryption algorithms
• One-time pad « unconditional security »
• Other symmetric algorithms (AES, Tripe-DES, etc.) enhanced security
by frequent key change
Why is Quantum Cryptography not used to transmit data?
1) Quantum Cryptography cannot guarantee that one particular bit will
actually be received.
With a random key, it is not a problem. With data, it is.
2) Quantum Cryptography does not prevent eavesdropping, but reveals it a
posteriori. Sending a key and verifying its secrecy allows to prevent
information leakage.