SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 2 (July-Aug. 2012), PP 41-43
www.iosrjournals.org
www.iosrjournals.org 41 | Page
Quantum Cryptography Using Past-Future Entanglement
1
Smriti Jha
1
(Computer Science, Pune University, India)
Abstract: Quantum Entanglement is an important principle on which Quantum Key Distribution is based.
However, observations of measurements are discussed over a classical channel. Communication using
entangled states is facilitated by Quantum Teleportation and has been the basis for various protocols. The
purpose of this paper is to study the past protocols and present a security perspective on a novel quantum
protocol which modifies the process of Quantum Teleportation. This paper explores the methodology of
Quantum Teleportation and applies the concept to modern cryptographic applications.
Keywords: Entanglement, Past-Future Vacuum Entanglement, Quantum Cryptography, Quantum
Teleportation, Quantum Channel, Ekert Protocol, Qauntum Key Distribution
I. INTRODUCTION
Quantum Cryptography’s essence lies in its use of quantum channels instead of classical channels.
These quantum channels are based on the laws of quantum-mechanics, mainly underlining Heisenberg’s
uncertainty principle, superposition principle and the EPR paradox. Over the years, various quantum protocols
have been proposed for Quantum Key Distribution (QKD), which aim to ensure secure communication of the
key between users, Alice and Bob. [1]
In this paper, we take a brief look at the tested methods of Quantum Cryptography, their mechanism
and introduce recent research done on the subject. A security perspective is provided on the mentioned Quantum
protocol along with future scope of the same.
II. HISTORY OF QUANTUM PROTOCOLS
2.1 BB84 Protocol
BB84 protocol was proposed by Charles Bennett and Gilles Brassard in 1984 for Quantum Key
Distribution. This protocol is based on Heisenberg’s uncertainty principle and has since been of prominent use.
BB84 protocol realizes a quantum channel which transport polarized photon states from one user to another,
without making any use of entanglement. [2]
As a prerequisite to the BB84 protocol, measurement is exercised in two different orthogonal bases.
The first orthogonal base is called the rectilinear base with horizontal axis signifying the bit 0 and vertical axis
signifying the bit 1. The second orthogonal base is the diagonal basis with 45o
as bit 0 and 135o
as bit 1.
Alice and Bob communicate over this quantum channel with the purpose of fixing a common secret key. First,
Alice chooses a random number of bits, and for each bit chooses a random basis, rectilinear or diagonal. These
photons are then sent to Bob, who is unaware of the basis Alice has chosen for each bit. Bob then proceeds to
measure each photon in a random basis. After this, Alice and Bob compare with each other, over a public
channel, the bases they chose to measure each bit and discard any bit where Bob’s basis of measurement does
not match the one Alice used for that bit.
In this scenario, if any eavesdropper, say Eve, tries to secretly spy on the channel, it would cause
detectable disturbance in the channel as she would have to measure the photon sent by Alice before sending it to
Bob. This is in conformity with the no cloning theorem which states that Eve cannot replicate a particle of
unknown state. Hence, Eve is forced to guess, which if incorrect would lead to loss of information, by
Heisenberg’s uncertainty principle with Bob having a 50-50 chance of measuring a bit value different from
Alice. This would alert both Alice and Bob and they can drop their communication for ensuring safety of
information.
2.2. Ekert’s protocol
Artur Ekert introduced a novel approach to quantum key distribution, using entangled states and the
concept of Quantum Teleportation. In Ekert’s implementation, one source of entangled polarized photon is used
to emit pairs of photons which are split between Alice and Bob, with each receiving one photon from the
entangled pair. The rest of the process is almost similar to BB84 protocol, with Alice and Bob independently
choosing their bases of measurements and then keeping the bits which are measured on a common basis. [3]
Different angular orientations can be used for measurements, results of which are then used to determine the
Quantum Cryptography Using Past-Future Entanglement
www.iosrjournals.org 42 | Page
Svalue in Clauser-Horne-Shimony-Holt inequality. Any attempt by eavesdropper to spy on the communication
between Alice and Bob would destroy the entanglement shared between them and hence can be easily detected.
Entanglement is an effective way for QKD as it does not require a random number generator. Recent
experiments have achieved QKD using entangled photons proving their credibility. These attributes make
entanglement of great significance in modern quantum cryptography techniques.
2.3. Quantum Teleportation
Quantum Teleportation is a technique of transporting quantum state from one location to another
without disobeying the no cloning theorem.
Alice has a quantum state that she wants to send to Bob:
(1)
But she cannot send the quantum state by measuring it, as it would not give her the value of α or β, but
instead would result in the state |0> with probability |α|2
and in state |1> with probability |β|2
.
To circumvent this issue, Alice and Bob share a Bell state between each other. With the measurements
made on Alice’s quantum state and Bell state, Alice gathers two values b1 and b2 by measuring her qubits,
though her qubits are destroyed in the process. This information is passed onto Bob, who then receives the
quantum state. It is to be noted that without the classical information b1 and b2 from Alice’s end, Bob will fail to
reconstruct the desired quantum state.
III. RELATED WORK
In a recent paper published by Carlos Sabin, Borja Peropadre, Marco del Ray, and Eduardo Martin-
Martinez from the Institute of Fundamental Physics in Madrid [4], a new kind of entanglement has been
proposed in which two qubits become entangled with each other without ever physically interacting with each
other.
The qubit P interacts with the quantum field along an open transmission line for an interval Ton and
then, after a time-lapse Toff, the qubit F starts interacting for a time Ton in a symmetric fashion. After that, past-
future quantum correlations will have transferred to the qubits, even if the qubits do not co-exist at the same
time.
The physicists have successfully realized this experiment using current technology. The paper puts
forward the idea of quantum teleportation “in time” where information about the quantum state of qubit P1
is
codified in the field during time Toff and recovered in F using classical information stored in the past. Special
care has been taken in the experiments to disallow any photon exchange which could contribute in correlations,
making the qubits entangled entirely using transference of vacuum correlations. The physicists have shown that
if qubits are separated by given distance r and the interaction can be switched on and off fast enough to have
finite interaction times, then past-future entanglement is possible for qubits with constant energy gaps.
The paper explores the example of Paula in possession of P, and another qubit P1
which she wants to
teleport to Frank. After the interaction with vacuum field is turned off at –t1, she carries out measurements on
her qubits. After t2, Frank can use the results of Paula’s measurements (stored as classical information) and
manipulate his qubit F, to transfer the state of P1
to F. The fidelity is a function of quantum correlations between
P and F. The information of P1
is coded in the field during Toff irrespective of the resultant state of qubit P after
its interaction and measurement. The information is then recovered during Ton in F.
IV. PROPOSED APPLICATION
The proposed method focuses on a security technique which is based on the Past-Future Entanglement
where the source of entanglement is neither Alice nor a third-party source which emits pairs of entangled
particles. The source of Entanglement here is the vacuum field, which is the transmission line itself.
This novel quantum protocol has presented Quantum Teleportation “in time”, which points to the fact that the
quantum state of P is transferred to F in a time interval when none of them were coupled to the field. This time
interval is denoted by Toff.
Communication faces the possibility of an eavesdropper listening on the channel in order to decipher
the messages exchanged between two users. It is a well-known fact that one-time pad is considered the most
secure way of encryption as it has a unique key for each message, though has its own disadvantages due to long
key value.
The Past-Future Entanglement can serve as a potential technique for Quantum Cryptography. Here P
interacts with the field for Ton before F couples to the field, there is a time interval Toff which is devoid of any
interaction occurring with the vacuum field.
Let’s say an eavesdropper wants to spy on Alice and Bob’s communication, and interacts with the
transmission line. This would disturb the correlation as Toff requires absolutely no interacting till F is coupled to
the field. Hence, such an intrusion can be detected by the parties. Another thing of notice here is that as none of
Quantum Cryptography Using Past-Future Entanglement
www.iosrjournals.org 43 | Page
the qubits are interacting with the vacuum field during Toff, the eavesdropper cannot have any knowledge of the
qubits, which would be eventually required to crack the encrypted key.
In a scenario where an eavesdropper interferes with the field during Ton, it would still disturb the
entanglement, decreasing the fidelity of the quantum correlations. This would cause Alice and Bob to detect an
intrusion.
The quantum channel has also proven to support Quantum Teleportation through time where the
classical bits stored in the field are used by qubit F to replicate the quantum state of P1
. Though classical bits can
be extracted by an eavesdropper, say Eve, she would still not know the entangled qubit F, which is required to
derive the quantum state.
V. CONCLUSION
This paper has explored the security applications of the novel quantum protocol with respect to Past-
Future Entanglement. Future Scope of the method lies in practical realization of Past-Future Entanglement and
making it accessible. The paper is only focused on the security applications of the quantum channel, which can
be equally applied in various other quantum information processing tasks. Another field of research could be
implementation in device independent quantum cryptography.
REFERENCES
[1] Lomonaco, S., J., "A Quick Glance at Quantum Cryptography", November, 1998. http://xxx.lanl.gov/abs/quant-ph/9811056.
[2] Bennett, C. H. and Brassard, G., "Quantum Cryptography: Public key distribution and coin tossing.", International Conference on
Computers, Systems & Signal Processing, Bangalore, India, 10-12 December 1984, pp. 175-179
[3] Ekert, A. K., "Quantum cryptography based on Bell's theorem", Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661 -
663M
[4] Carlos Sabín, Borja Peropadre, Marco del Rey, Eduardo Martín-Martínez, “Extracting Past-Future Vacuum Correlations Using
Circuit QED”, Phys. Rev. Lett. 109, 033602

More Related Content

What's hot

Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
Arinto Murdopo
 
Graphene as tunable electron-phonon material
Graphene as tunable electron-phonon materialGraphene as tunable electron-phonon material
Graphene as tunable electron-phonon material
Claudio Attaccalite
 
Electron-phonon coupling in graphene
Electron-phonon coupling in grapheneElectron-phonon coupling in graphene
Electron-phonon coupling in graphene
Claudio Attaccalite
 
Development of fpga based system for neutron flux monitoring in fast breeder ...
Development of fpga based system for neutron flux monitoring in fast breeder ...Development of fpga based system for neutron flux monitoring in fast breeder ...
Development of fpga based system for neutron flux monitoring in fast breeder ...
Alexander Decker
 
Quantum teleportation
Quantum teleportationQuantum teleportation
Quantum teleportation
JAISMON FRANCIS
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)
Kirby Linvill
 
FIESTA: French Initiative for Electronic Simulations with Thousands of Atoms
FIESTA:  French Initiative for Electronic Simulations with Thousands of AtomsFIESTA:  French Initiative for Electronic Simulations with Thousands of Atoms
FIESTA: French Initiative for Electronic Simulations with Thousands of Atoms
Claudio Attaccalite
 

What's hot (8)

quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Graphene as tunable electron-phonon material
Graphene as tunable electron-phonon materialGraphene as tunable electron-phonon material
Graphene as tunable electron-phonon material
 
Electron-phonon coupling in graphene
Electron-phonon coupling in grapheneElectron-phonon coupling in graphene
Electron-phonon coupling in graphene
 
Development of fpga based system for neutron flux monitoring in fast breeder ...
Development of fpga based system for neutron flux monitoring in fast breeder ...Development of fpga based system for neutron flux monitoring in fast breeder ...
Development of fpga based system for neutron flux monitoring in fast breeder ...
 
Quantum teleportation
Quantum teleportationQuantum teleportation
Quantum teleportation
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)
 
FIESTA: French Initiative for Electronic Simulations with Thousands of Atoms
FIESTA:  French Initiative for Electronic Simulations with Thousands of AtomsFIESTA:  French Initiative for Electronic Simulations with Thousands of Atoms
FIESTA: French Initiative for Electronic Simulations with Thousands of Atoms
 

Viewers also liked

Numerical Solution of Nth - Order Fuzzy Initial Value Problems by Fourth Orde...
Numerical Solution of Nth - Order Fuzzy Initial Value Problems by Fourth Orde...Numerical Solution of Nth - Order Fuzzy Initial Value Problems by Fourth Orde...
Numerical Solution of Nth - Order Fuzzy Initial Value Problems by Fourth Orde...
IOSR Journals
 
Evaluation of Uptake of Methylene blue dye by Sulphonated biomass of Cicer ar...
Evaluation of Uptake of Methylene blue dye by Sulphonated biomass of Cicer ar...Evaluation of Uptake of Methylene blue dye by Sulphonated biomass of Cicer ar...
Evaluation of Uptake of Methylene blue dye by Sulphonated biomass of Cicer ar...
IOSR Journals
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
IOSR Journals
 
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particlesSimple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
IOSR Journals
 
Efficient Parallel Pruning of Associative Rules with Optimized Search
Efficient Parallel Pruning of Associative Rules with Optimized  SearchEfficient Parallel Pruning of Associative Rules with Optimized  Search
Efficient Parallel Pruning of Associative Rules with Optimized Search
IOSR Journals
 
Ingoldian Fungi in Kigga Falls, Chikmagalur District, Karnataka
Ingoldian Fungi in Kigga Falls, Chikmagalur District, KarnatakaIngoldian Fungi in Kigga Falls, Chikmagalur District, Karnataka
Ingoldian Fungi in Kigga Falls, Chikmagalur District, Karnataka
IOSR Journals
 
F0522833
F0522833F0522833
F0522833
IOSR Journals
 
Prevalence and morphological details of Nyctotherus periplanetae in the host ...
Prevalence and morphological details of Nyctotherus periplanetae in the host ...Prevalence and morphological details of Nyctotherus periplanetae in the host ...
Prevalence and morphological details of Nyctotherus periplanetae in the host ...
IOSR Journals
 
In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...
In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...
In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...
IOSR Journals
 
Discovery of superluminal velocities of X-rays and Bharat Radiation challengi...
Discovery of superluminal velocities of X-rays and Bharat Radiation challengi...Discovery of superluminal velocities of X-rays and Bharat Radiation challengi...
Discovery of superluminal velocities of X-rays and Bharat Radiation challengi...
IOSR Journals
 
Characterization of Manganese doped ZnO (MZO) thin films by Spin Coating Tech...
Characterization of Manganese doped ZnO (MZO) thin films by Spin Coating Tech...Characterization of Manganese doped ZnO (MZO) thin films by Spin Coating Tech...
Characterization of Manganese doped ZnO (MZO) thin films by Spin Coating Tech...
IOSR Journals
 
A Hypocoloring Model for Batch Scheduling Problem
A Hypocoloring Model for Batch Scheduling ProblemA Hypocoloring Model for Batch Scheduling Problem
A Hypocoloring Model for Batch Scheduling Problem
IOSR Journals
 
Effect of time-of-day specific obese training on body composition and physica...
Effect of time-of-day specific obese training on body composition and physica...Effect of time-of-day specific obese training on body composition and physica...
Effect of time-of-day specific obese training on body composition and physica...
IOSR Journals
 
Some Common Fixed Point Results for Expansive Mappings in a Cone Metric Space
Some Common Fixed Point Results for Expansive Mappings in a Cone Metric SpaceSome Common Fixed Point Results for Expansive Mappings in a Cone Metric Space
Some Common Fixed Point Results for Expansive Mappings in a Cone Metric Space
IOSR Journals
 
Physicochemical and Bacteriological Analyses of Sachets Water Samples in Kano...
Physicochemical and Bacteriological Analyses of Sachets Water Samples in Kano...Physicochemical and Bacteriological Analyses of Sachets Water Samples in Kano...
Physicochemical and Bacteriological Analyses of Sachets Water Samples in Kano...
IOSR Journals
 
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
IOSR Journals
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
IOSR Journals
 
A Study To Locate The Difference Between Active And Passive Recovery After St...
A Study To Locate The Difference Between Active And Passive Recovery After St...A Study To Locate The Difference Between Active And Passive Recovery After St...
A Study To Locate The Difference Between Active And Passive Recovery After St...
IOSR Journals
 

Viewers also liked (20)

Numerical Solution of Nth - Order Fuzzy Initial Value Problems by Fourth Orde...
Numerical Solution of Nth - Order Fuzzy Initial Value Problems by Fourth Orde...Numerical Solution of Nth - Order Fuzzy Initial Value Problems by Fourth Orde...
Numerical Solution of Nth - Order Fuzzy Initial Value Problems by Fourth Orde...
 
A0440113
A0440113A0440113
A0440113
 
Evaluation of Uptake of Methylene blue dye by Sulphonated biomass of Cicer ar...
Evaluation of Uptake of Methylene blue dye by Sulphonated biomass of Cicer ar...Evaluation of Uptake of Methylene blue dye by Sulphonated biomass of Cicer ar...
Evaluation of Uptake of Methylene blue dye by Sulphonated biomass of Cicer ar...
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
 
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particlesSimple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
Simple and Effective Method of the Synthesis of Nanosized Fe2O 3particles
 
Efficient Parallel Pruning of Associative Rules with Optimized Search
Efficient Parallel Pruning of Associative Rules with Optimized  SearchEfficient Parallel Pruning of Associative Rules with Optimized  Search
Efficient Parallel Pruning of Associative Rules with Optimized Search
 
Ingoldian Fungi in Kigga Falls, Chikmagalur District, Karnataka
Ingoldian Fungi in Kigga Falls, Chikmagalur District, KarnatakaIngoldian Fungi in Kigga Falls, Chikmagalur District, Karnataka
Ingoldian Fungi in Kigga Falls, Chikmagalur District, Karnataka
 
F0522833
F0522833F0522833
F0522833
 
Prevalence and morphological details of Nyctotherus periplanetae in the host ...
Prevalence and morphological details of Nyctotherus periplanetae in the host ...Prevalence and morphological details of Nyctotherus periplanetae in the host ...
Prevalence and morphological details of Nyctotherus periplanetae in the host ...
 
In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...
In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...
In Vivo Assay of Analgesic Activity of Methanolic and Petroleum Ether Extract...
 
Discovery of superluminal velocities of X-rays and Bharat Radiation challengi...
Discovery of superluminal velocities of X-rays and Bharat Radiation challengi...Discovery of superluminal velocities of X-rays and Bharat Radiation challengi...
Discovery of superluminal velocities of X-rays and Bharat Radiation challengi...
 
Characterization of Manganese doped ZnO (MZO) thin films by Spin Coating Tech...
Characterization of Manganese doped ZnO (MZO) thin films by Spin Coating Tech...Characterization of Manganese doped ZnO (MZO) thin films by Spin Coating Tech...
Characterization of Manganese doped ZnO (MZO) thin films by Spin Coating Tech...
 
A Hypocoloring Model for Batch Scheduling Problem
A Hypocoloring Model for Batch Scheduling ProblemA Hypocoloring Model for Batch Scheduling Problem
A Hypocoloring Model for Batch Scheduling Problem
 
Effect of time-of-day specific obese training on body composition and physica...
Effect of time-of-day specific obese training on body composition and physica...Effect of time-of-day specific obese training on body composition and physica...
Effect of time-of-day specific obese training on body composition and physica...
 
Some Common Fixed Point Results for Expansive Mappings in a Cone Metric Space
Some Common Fixed Point Results for Expansive Mappings in a Cone Metric SpaceSome Common Fixed Point Results for Expansive Mappings in a Cone Metric Space
Some Common Fixed Point Results for Expansive Mappings in a Cone Metric Space
 
Physicochemical and Bacteriological Analyses of Sachets Water Samples in Kano...
Physicochemical and Bacteriological Analyses of Sachets Water Samples in Kano...Physicochemical and Bacteriological Analyses of Sachets Water Samples in Kano...
Physicochemical and Bacteriological Analyses of Sachets Water Samples in Kano...
 
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
Design of a Dual-Band Microstrip Patch Antenna for GPS,WiMAX and WLAN.
 
A0740103
A0740103A0740103
A0740103
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 
A Study To Locate The Difference Between Active And Passive Recovery After St...
A Study To Locate The Difference Between Active And Passive Recovery After St...A Study To Locate The Difference Between Active And Passive Recovery After St...
A Study To Locate The Difference Between Active And Passive Recovery After St...
 

Similar to Quantum Cryptography Using Past-Future Entanglement

EPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFEPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFarankaila
 
Il teletrasporto dell'energia quantistica
Il teletrasporto dell'energia quantisticaIl teletrasporto dell'energia quantistica
Il teletrasporto dell'energia quantisticaDario Caliendo
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
ijcisjournal
 
Quantum
QuantumQuantum
Quantum
saba majeed
 
Quantum Teleportation : Theory and Experiment
Quantum Teleportation : Theory and ExperimentQuantum Teleportation : Theory and Experiment
Quantum Teleportation : Theory and Experiment
Chithrabhanu Perumangaattu
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
Kalluri Madhuri
 
CRYPTO0914.ppt
CRYPTO0914.pptCRYPTO0914.ppt
CRYPTO0914.ppt
sasasas14
 
CRYPTO0914.ppt
CRYPTO0914.pptCRYPTO0914.ppt
CRYPTO0914.ppt
hienlmgm
 
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdfQuantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
KienBuiXuan3
 
Communicating through emtanglement transfer
Communicating through emtanglement transfer Communicating through emtanglement transfer
Communicating through emtanglement transfer
Eran Sinbar
 
Quantum entanglement is one of the most intriguing and counterintuitive pheno...
Quantum entanglement is one of the most intriguing and counterintuitive pheno...Quantum entanglement is one of the most intriguing and counterintuitive pheno...
Quantum entanglement is one of the most intriguing and counterintuitive pheno...
NishaJaiswal34
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
ijcisjournal
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Amr Mohamed
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
Richard Gill
 
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
IJNSA Journal
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
IJNSA Journal
 

Similar to Quantum Cryptography Using Past-Future Entanglement (20)

EPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFEPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDF
 
Il teletrasporto dell'energia quantistica
Il teletrasporto dell'energia quantisticaIl teletrasporto dell'energia quantistica
Il teletrasporto dell'energia quantistica
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
 
Quantum
QuantumQuantum
Quantum
 
Quantum Teleportation : Theory and Experiment
Quantum Teleportation : Theory and ExperimentQuantum Teleportation : Theory and Experiment
Quantum Teleportation : Theory and Experiment
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Report_amit
Report_amitReport_amit
Report_amit
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
CRYPTO0914.ppt
CRYPTO0914.pptCRYPTO0914.ppt
CRYPTO0914.ppt
 
CRYPTO0914.ppt
CRYPTO0914.pptCRYPTO0914.ppt
CRYPTO0914.ppt
 
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdfQuantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
 
Communicating through emtanglement transfer
Communicating through emtanglement transfer Communicating through emtanglement transfer
Communicating through emtanglement transfer
 
MZ2
MZ2MZ2
MZ2
 
Quantum entanglement is one of the most intriguing and counterintuitive pheno...
Quantum entanglement is one of the most intriguing and counterintuitive pheno...Quantum entanglement is one of the most intriguing and counterintuitive pheno...
Quantum entanglement is one of the most intriguing and counterintuitive pheno...
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
 
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Quantum Cryptography Using Past-Future Entanglement

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 2 (July-Aug. 2012), PP 41-43 www.iosrjournals.org www.iosrjournals.org 41 | Page Quantum Cryptography Using Past-Future Entanglement 1 Smriti Jha 1 (Computer Science, Pune University, India) Abstract: Quantum Entanglement is an important principle on which Quantum Key Distribution is based. However, observations of measurements are discussed over a classical channel. Communication using entangled states is facilitated by Quantum Teleportation and has been the basis for various protocols. The purpose of this paper is to study the past protocols and present a security perspective on a novel quantum protocol which modifies the process of Quantum Teleportation. This paper explores the methodology of Quantum Teleportation and applies the concept to modern cryptographic applications. Keywords: Entanglement, Past-Future Vacuum Entanglement, Quantum Cryptography, Quantum Teleportation, Quantum Channel, Ekert Protocol, Qauntum Key Distribution I. INTRODUCTION Quantum Cryptography’s essence lies in its use of quantum channels instead of classical channels. These quantum channels are based on the laws of quantum-mechanics, mainly underlining Heisenberg’s uncertainty principle, superposition principle and the EPR paradox. Over the years, various quantum protocols have been proposed for Quantum Key Distribution (QKD), which aim to ensure secure communication of the key between users, Alice and Bob. [1] In this paper, we take a brief look at the tested methods of Quantum Cryptography, their mechanism and introduce recent research done on the subject. A security perspective is provided on the mentioned Quantum protocol along with future scope of the same. II. HISTORY OF QUANTUM PROTOCOLS 2.1 BB84 Protocol BB84 protocol was proposed by Charles Bennett and Gilles Brassard in 1984 for Quantum Key Distribution. This protocol is based on Heisenberg’s uncertainty principle and has since been of prominent use. BB84 protocol realizes a quantum channel which transport polarized photon states from one user to another, without making any use of entanglement. [2] As a prerequisite to the BB84 protocol, measurement is exercised in two different orthogonal bases. The first orthogonal base is called the rectilinear base with horizontal axis signifying the bit 0 and vertical axis signifying the bit 1. The second orthogonal base is the diagonal basis with 45o as bit 0 and 135o as bit 1. Alice and Bob communicate over this quantum channel with the purpose of fixing a common secret key. First, Alice chooses a random number of bits, and for each bit chooses a random basis, rectilinear or diagonal. These photons are then sent to Bob, who is unaware of the basis Alice has chosen for each bit. Bob then proceeds to measure each photon in a random basis. After this, Alice and Bob compare with each other, over a public channel, the bases they chose to measure each bit and discard any bit where Bob’s basis of measurement does not match the one Alice used for that bit. In this scenario, if any eavesdropper, say Eve, tries to secretly spy on the channel, it would cause detectable disturbance in the channel as she would have to measure the photon sent by Alice before sending it to Bob. This is in conformity with the no cloning theorem which states that Eve cannot replicate a particle of unknown state. Hence, Eve is forced to guess, which if incorrect would lead to loss of information, by Heisenberg’s uncertainty principle with Bob having a 50-50 chance of measuring a bit value different from Alice. This would alert both Alice and Bob and they can drop their communication for ensuring safety of information. 2.2. Ekert’s protocol Artur Ekert introduced a novel approach to quantum key distribution, using entangled states and the concept of Quantum Teleportation. In Ekert’s implementation, one source of entangled polarized photon is used to emit pairs of photons which are split between Alice and Bob, with each receiving one photon from the entangled pair. The rest of the process is almost similar to BB84 protocol, with Alice and Bob independently choosing their bases of measurements and then keeping the bits which are measured on a common basis. [3] Different angular orientations can be used for measurements, results of which are then used to determine the
  • 2. Quantum Cryptography Using Past-Future Entanglement www.iosrjournals.org 42 | Page Svalue in Clauser-Horne-Shimony-Holt inequality. Any attempt by eavesdropper to spy on the communication between Alice and Bob would destroy the entanglement shared between them and hence can be easily detected. Entanglement is an effective way for QKD as it does not require a random number generator. Recent experiments have achieved QKD using entangled photons proving their credibility. These attributes make entanglement of great significance in modern quantum cryptography techniques. 2.3. Quantum Teleportation Quantum Teleportation is a technique of transporting quantum state from one location to another without disobeying the no cloning theorem. Alice has a quantum state that she wants to send to Bob: (1) But she cannot send the quantum state by measuring it, as it would not give her the value of α or β, but instead would result in the state |0> with probability |α|2 and in state |1> with probability |β|2 . To circumvent this issue, Alice and Bob share a Bell state between each other. With the measurements made on Alice’s quantum state and Bell state, Alice gathers two values b1 and b2 by measuring her qubits, though her qubits are destroyed in the process. This information is passed onto Bob, who then receives the quantum state. It is to be noted that without the classical information b1 and b2 from Alice’s end, Bob will fail to reconstruct the desired quantum state. III. RELATED WORK In a recent paper published by Carlos Sabin, Borja Peropadre, Marco del Ray, and Eduardo Martin- Martinez from the Institute of Fundamental Physics in Madrid [4], a new kind of entanglement has been proposed in which two qubits become entangled with each other without ever physically interacting with each other. The qubit P interacts with the quantum field along an open transmission line for an interval Ton and then, after a time-lapse Toff, the qubit F starts interacting for a time Ton in a symmetric fashion. After that, past- future quantum correlations will have transferred to the qubits, even if the qubits do not co-exist at the same time. The physicists have successfully realized this experiment using current technology. The paper puts forward the idea of quantum teleportation “in time” where information about the quantum state of qubit P1 is codified in the field during time Toff and recovered in F using classical information stored in the past. Special care has been taken in the experiments to disallow any photon exchange which could contribute in correlations, making the qubits entangled entirely using transference of vacuum correlations. The physicists have shown that if qubits are separated by given distance r and the interaction can be switched on and off fast enough to have finite interaction times, then past-future entanglement is possible for qubits with constant energy gaps. The paper explores the example of Paula in possession of P, and another qubit P1 which she wants to teleport to Frank. After the interaction with vacuum field is turned off at –t1, she carries out measurements on her qubits. After t2, Frank can use the results of Paula’s measurements (stored as classical information) and manipulate his qubit F, to transfer the state of P1 to F. The fidelity is a function of quantum correlations between P and F. The information of P1 is coded in the field during Toff irrespective of the resultant state of qubit P after its interaction and measurement. The information is then recovered during Ton in F. IV. PROPOSED APPLICATION The proposed method focuses on a security technique which is based on the Past-Future Entanglement where the source of entanglement is neither Alice nor a third-party source which emits pairs of entangled particles. The source of Entanglement here is the vacuum field, which is the transmission line itself. This novel quantum protocol has presented Quantum Teleportation “in time”, which points to the fact that the quantum state of P is transferred to F in a time interval when none of them were coupled to the field. This time interval is denoted by Toff. Communication faces the possibility of an eavesdropper listening on the channel in order to decipher the messages exchanged between two users. It is a well-known fact that one-time pad is considered the most secure way of encryption as it has a unique key for each message, though has its own disadvantages due to long key value. The Past-Future Entanglement can serve as a potential technique for Quantum Cryptography. Here P interacts with the field for Ton before F couples to the field, there is a time interval Toff which is devoid of any interaction occurring with the vacuum field. Let’s say an eavesdropper wants to spy on Alice and Bob’s communication, and interacts with the transmission line. This would disturb the correlation as Toff requires absolutely no interacting till F is coupled to the field. Hence, such an intrusion can be detected by the parties. Another thing of notice here is that as none of
  • 3. Quantum Cryptography Using Past-Future Entanglement www.iosrjournals.org 43 | Page the qubits are interacting with the vacuum field during Toff, the eavesdropper cannot have any knowledge of the qubits, which would be eventually required to crack the encrypted key. In a scenario where an eavesdropper interferes with the field during Ton, it would still disturb the entanglement, decreasing the fidelity of the quantum correlations. This would cause Alice and Bob to detect an intrusion. The quantum channel has also proven to support Quantum Teleportation through time where the classical bits stored in the field are used by qubit F to replicate the quantum state of P1 . Though classical bits can be extracted by an eavesdropper, say Eve, she would still not know the entangled qubit F, which is required to derive the quantum state. V. CONCLUSION This paper has explored the security applications of the novel quantum protocol with respect to Past- Future Entanglement. Future Scope of the method lies in practical realization of Past-Future Entanglement and making it accessible. The paper is only focused on the security applications of the quantum channel, which can be equally applied in various other quantum information processing tasks. Another field of research could be implementation in device independent quantum cryptography. REFERENCES [1] Lomonaco, S., J., "A Quick Glance at Quantum Cryptography", November, 1998. http://xxx.lanl.gov/abs/quant-ph/9811056. [2] Bennett, C. H. and Brassard, G., "Quantum Cryptography: Public key distribution and coin tossing.", International Conference on Computers, Systems & Signal Processing, Bangalore, India, 10-12 December 1984, pp. 175-179 [3] Ekert, A. K., "Quantum cryptography based on Bell's theorem", Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661 - 663M [4] Carlos Sabín, Borja Peropadre, Marco del Rey, Eduardo Martín-Martínez, “Extracting Past-Future Vacuum Correlations Using Circuit QED”, Phys. Rev. Lett. 109, 033602