SlideShare a Scribd company logo
1 of 36
Quantum Cryptography
Arinto Murdopo
Maria Stylianou
Ioanna Tsalouchidou
13/12/2011
Outline
● Quantum Cryptography
● Theoretical Background
● Quantum Key Distribution (QKD)
○ BB84 Protocol
● Vulnerabilities & Attacks
○ Faked - state attack
Quantum Cryptography
- How it came up
● Cryptography => Secure Communication
=> Secure Data Transmission
● Two techniques
○ Symmetric - key encryption (shared key)
■ Key - distribution problem
○ Asymmetric - key encryption (pair of public&secret keys)
■ Success based on hardware limitations, absence of
good algorithms and non-use of quantum computers.
Quantum Cryptography!
Quantum Cryptography
● Quantum Cryptography is
○ the use of laws of quantum physics, to:
■ perform cryptographic functionalities
■ break cryptographic systems
● Examples:
○ Quantum Key Distribution (next section)
○ Quantum Computers to break existing protocols
Theoretical Background
● Quantum - minimum amount of any physical entity
● Photon Polarization - Quantum Superposition
○ Vertical-Horizontal 2 orthogonal
○ Diagonal +-45 degrees states
● Heisenberg Uncertainty Principle
○ “observation causes perturbation”
○ no-cloning theorem
Polarized Wave Applet! http://surendranath.tripod.com/Applets/Waves/Polarisation/PW.html
Theoretical Background
Filter to distinguish polarized photons.
Correct Filter
applied
Wrong Filter
applied
Quantum Key Distribution - BB84
● First quantum cryptography protocol
● Goal: describe a scheme of two users who want to
communicate and exchange data securely.
● Idea: distribute a key securely, based on the laws of
physics.
● Security proofs:
○ If someone reads the state of photon -> state changes
○ Not possible to copy the photon in order to encode it with
all possible ways (basis)
Quantum Key Distribution - BB84
Quantum Key Distribution - BB84
Step 1
● Alice has two choices, key (a) & basis (b), chosen
randomly
● Combine bits of a and b, 1-1,
● Four different states of qubit (photon polarization)
● Sent through public quantum channels:
○ Optical Fiber
○ Free Space
Photon Source
Quantum Key Distribution - BB84
Step 2
● Bob receives qubit from Alice
● Bob measures it by choosing random basis using
Beam Splitter (BS), practically it could be 50/50 mirror
● PBS sends qubit to certain detector using some rules
Quantum Key Distribution - BB84
Step 2
How PBS of a specific basis works
● Let photon that polarized on that basis to pass through to
the correct detector
● Otherwise, the photon can head randomly to any of the
wrong detectors
Quantum Key Distribution - BB84
Step 2
Example of how PBS combining with detector works!
Quantum Key Distribution - BB84
Step 3
● 1st communication between Alice and Bob in public
channel
● They compare the basis used to encode and measure
the qubit
● If Bob.basis == Alice.basis
○ Keep the bit!
● Else
○ Discard the bit
● The length of the initial key is reduced to half of its length
because the probability of Bob choosing the same basis
as Alice is 50%
Quantum Key Distribution - BB84
Step 4
● Check if someone has intruded the communication or if
some imperfection of the devices or channel has
introduced noise that distort the outcome
● If Eve has intruded the communication, she will
DEFINITELY left some traces due to Heisenberg
Uncertainty Principle (HUP) and non cloning theorem
Quantum Key Distribution - BB84
Step 4
● Alice and Bob performs MANY parity-checks
● In this way, they can find out whether Eve has intruded
the communication
● Very simple example:
○ Calculate parity of blocks of 4-bits
● Alice sends the parities of her blocks and Bob checks them
Quantum Key Distribution - BB84
Step 5
● Now Alice and Bob have the same keys, all the bits are
same
● The problem is, in Step 4, Eve manages to find out some
portions of their key
● Privacy Amplification comes into the rescue!
Quantum Key Distribution - BB84
Step 5
● Alice and Bob apply Hash function to compress the key
into the final one. And they should use the same Hash
function.
Vulnerabilities - Photon number attack
● Sending more than one photon for each bit leads to photon
number attack.
○ Eve can steal extra photons to extract the
stolen photons information.
● Ensure photon spitter only sends exactly ONE photon each
time.
● Single photon ensures quantum mechanic laws are
satisfied.
Vulnerabilities - Spectral attack
● If photons are created by four DIFFERENT laser photo
diodes, they have different spectral characteristics.
● Eve performs spectral attack by measuring COLOR, and not
polarization.
Vulnerabilities - Random numbers
● Are our random numbers really "Random"?
● Bob side, randomness is determined by BS.
● Alice side, randomness if a bit stream cannot be proven
mathematically
○ Algorithms generate "random" sequences by following
specific patterns => NOT that random!
○ Eve can use same algorithm to extract information.
Entangled Photon Pairs comes to the rescue!
Entangled photon pairs
BB84 with photon pairs
Faked-state attack
General scheme
Faked-state attack
Practical Implementation - Detector replica
● Eve has replica of Bob's detector
● To capture the photon and measure it like Bob always does
Faked-state attack
Practical Implementation - Fake Stated Generator
● Blind Bob's detector
○ Insensitive to photon
● Forces Bob's detectors to have same "click" as what Eve
has measured
○ Bob and Eve have same information
Faked-state attack
Practical Implementation - Blind all Bob's detectors
● QKD detectors use Single Photon Avalanche Diode (SPAD)
Faked-state attack
Single Photo Avalanche Diode
● Has two modes
○ Geiger Mode
○ Linear Mode
Hence, SPAD in Linear Mode can be considered as
blind-to-photon.
Faked-state attack
Single Photo Avalanche Diode
● How to make SPAD behaves in Linear Mode?
Faked-state attack
Single Photo Avalanche Diode
● SPAD in Linear Mode
● Bright illumination causes the capacitor has not enough time
to recharge and re-balance the voltage value at point 2
● SPAD's bias voltage below VBreakdown -> Linear Mode
Faked-state attack
Single Photo Avalanche Diode
● SPAD in Linear Mode
●
Faked-state attack
Practical Implementation - Force Bob's detector to click
● Blinding Bob's detector is not enough
● Eve needs to force specific Bob's detector to "click"
according to the measurement result in Eve's detector
Faked-state attack
Practical Implementation - Force Bob's detector to click
● SPAD in linear mode ("blind SPAD) -> easily forced to
create a "click"
● Sending pulse of light with intensity power "I0"
Faked-state attack
Practical Implementation - Blind the detector
● Correct light pulse intensity is important
● (2*I0) is the answer!
Putting them all together!
Faked-state attack
Faked-state attack
Result of the Attack: Impressive!
Bob@V Bob@-45 Bob@H Bob@+45
Eve@V 99.51% 0 0 0
Eve@-45 0 99.66% 0 0
Eve@H 0 0 99.80% 0
Eve@+45 0 0 0 99.95%
The end!
Questions?

More Related Content

Viewers also liked

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyShyam Mohan
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101Omar Shehab
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]guestea12c43
 
The uncertainty principle
The uncertainty principleThe uncertainty principle
The uncertainty principlefarman53
 
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/Manmohan Dash
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
Презентация устройства "Корден"
Презентация устройства "Корден"Презентация устройства "Корден"
Презентация устройства "Корден"kulibin
 
حملة عمر بلدك
حملة عمر بلدكحملة عمر بلدك
حملة عمر بلدكAlaa Wahba
 
Defining classes-and-objects-1.0
Defining classes-and-objects-1.0Defining classes-and-objects-1.0
Defining classes-and-objects-1.0BG Java EE Course
 
Digitalisaatio ja valtioneuvosto
Digitalisaatio ja valtioneuvostoDigitalisaatio ja valtioneuvosto
Digitalisaatio ja valtioneuvostoJyrki Kasvi
 
On the frontier of genotype-2-phenotype data integration
On the frontier of genotype-2-phenotype data integrationOn the frontier of genotype-2-phenotype data integration
On the frontier of genotype-2-phenotype data integrationmhaendel
 

Viewers also liked (19)

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]
 
The uncertainty principle
The uncertainty principleThe uncertainty principle
The uncertainty principle
 
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Презентация устройства "Корден"
Презентация устройства "Корден"Презентация устройства "Корден"
Презентация устройства "Корден"
 
حملة عمر بلدك
حملة عمر بلدكحملة عمر بلدك
حملة عمر بلدك
 
Defining classes-and-objects-1.0
Defining classes-and-objects-1.0Defining classes-and-objects-1.0
Defining classes-and-objects-1.0
 
Digitalisaatio ja valtioneuvosto
Digitalisaatio ja valtioneuvostoDigitalisaatio ja valtioneuvosto
Digitalisaatio ja valtioneuvosto
 
LESTER_ANTONY_FRANCIS ( Aug 2016)
LESTER_ANTONY_FRANCIS ( Aug 2016)LESTER_ANTONY_FRANCIS ( Aug 2016)
LESTER_ANTONY_FRANCIS ( Aug 2016)
 
Basic computer
Basic computerBasic computer
Basic computer
 
Methods intro-1.0
Methods intro-1.0Methods intro-1.0
Methods intro-1.0
 
On the frontier of genotype-2-phenotype data integration
On the frontier of genotype-2-phenotype data integrationOn the frontier of genotype-2-phenotype data integration
On the frontier of genotype-2-phenotype data integration
 

Similar to Quantum Cryptography and Possible Attacks

Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographySwasat Dutta
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfsasasas14
 

Similar to Quantum Cryptography and Possible Attacks (16)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum crypto system
Quantum crypto systemQuantum crypto system
Quantum crypto system
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 

More from Maria Stylianou

SPARJA: a Distributed Social Graph Partitioning and Replication Middleware
SPARJA: a Distributed Social Graph Partitioning and Replication MiddlewareSPARJA: a Distributed Social Graph Partitioning and Replication Middleware
SPARJA: a Distributed Social Graph Partitioning and Replication MiddlewareMaria Stylianou
 
Scaling Online Social Networks (OSNs)
Scaling Online Social Networks (OSNs)Scaling Online Social Networks (OSNs)
Scaling Online Social Networks (OSNs)Maria Stylianou
 
Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee Maria Stylianou
 
Cano projectGreen Optical Networks with Signal Quality Guarantee
Cano projectGreen Optical Networks with Signal Quality Guarantee Cano projectGreen Optical Networks with Signal Quality Guarantee
Cano projectGreen Optical Networks with Signal Quality Guarantee Maria Stylianou
 
A Survey on Large-Scale Decentralized Storage Systems to be used by Volunteer...
A Survey on Large-Scale Decentralized Storage Systems to be used by Volunteer...A Survey on Large-Scale Decentralized Storage Systems to be used by Volunteer...
A Survey on Large-Scale Decentralized Storage Systems to be used by Volunteer...Maria Stylianou
 
Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Maria Stylianou
 
Automatic Energy-based Scheduling
Automatic Energy-based SchedulingAutomatic Energy-based Scheduling
Automatic Energy-based SchedulingMaria Stylianou
 
Instrumenting the MG applicaiton of NAS Parallel Benchmark
Instrumenting the MG applicaiton of NAS Parallel BenchmarkInstrumenting the MG applicaiton of NAS Parallel Benchmark
Instrumenting the MG applicaiton of NAS Parallel BenchmarkMaria Stylianou
 
Low-Latency Multi-Writer Atomic Registers
Low-Latency Multi-Writer Atomic RegistersLow-Latency Multi-Writer Atomic Registers
Low-Latency Multi-Writer Atomic RegistersMaria Stylianou
 
How Companies Learn Your Secrets
How Companies Learn Your SecretsHow Companies Learn Your Secrets
How Companies Learn Your SecretsMaria Stylianou
 
EEDC - Why use of REST for Web Services
EEDC - Why use of REST for Web Services EEDC - Why use of REST for Web Services
EEDC - Why use of REST for Web Services Maria Stylianou
 
EEDC - Distributed Systems
EEDC - Distributed SystemsEEDC - Distributed Systems
EEDC - Distributed SystemsMaria Stylianou
 

More from Maria Stylianou (15)

SPARJA: a Distributed Social Graph Partitioning and Replication Middleware
SPARJA: a Distributed Social Graph Partitioning and Replication MiddlewareSPARJA: a Distributed Social Graph Partitioning and Replication Middleware
SPARJA: a Distributed Social Graph Partitioning and Replication Middleware
 
Scaling Online Social Networks (OSNs)
Scaling Online Social Networks (OSNs)Scaling Online Social Networks (OSNs)
Scaling Online Social Networks (OSNs)
 
Erlang in 10 minutes
Erlang in 10 minutesErlang in 10 minutes
Erlang in 10 minutes
 
Pregel - Paper Review
Pregel - Paper ReviewPregel - Paper Review
Pregel - Paper Review
 
Google's Dremel
Google's DremelGoogle's Dremel
Google's Dremel
 
Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee Green Optical Networks with Signal Quality Guarantee
Green Optical Networks with Signal Quality Guarantee
 
Cano projectGreen Optical Networks with Signal Quality Guarantee
Cano projectGreen Optical Networks with Signal Quality Guarantee Cano projectGreen Optical Networks with Signal Quality Guarantee
Cano projectGreen Optical Networks with Signal Quality Guarantee
 
A Survey on Large-Scale Decentralized Storage Systems to be used by Volunteer...
A Survey on Large-Scale Decentralized Storage Systems to be used by Volunteer...A Survey on Large-Scale Decentralized Storage Systems to be used by Volunteer...
A Survey on Large-Scale Decentralized Storage Systems to be used by Volunteer...
 
Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...
 
Automatic Energy-based Scheduling
Automatic Energy-based SchedulingAutomatic Energy-based Scheduling
Automatic Energy-based Scheduling
 
Instrumenting the MG applicaiton of NAS Parallel Benchmark
Instrumenting the MG applicaiton of NAS Parallel BenchmarkInstrumenting the MG applicaiton of NAS Parallel Benchmark
Instrumenting the MG applicaiton of NAS Parallel Benchmark
 
Low-Latency Multi-Writer Atomic Registers
Low-Latency Multi-Writer Atomic RegistersLow-Latency Multi-Writer Atomic Registers
Low-Latency Multi-Writer Atomic Registers
 
How Companies Learn Your Secrets
How Companies Learn Your SecretsHow Companies Learn Your Secrets
How Companies Learn Your Secrets
 
EEDC - Why use of REST for Web Services
EEDC - Why use of REST for Web Services EEDC - Why use of REST for Web Services
EEDC - Why use of REST for Web Services
 
EEDC - Distributed Systems
EEDC - Distributed SystemsEEDC - Distributed Systems
EEDC - Distributed Systems
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Quantum Cryptography and Possible Attacks

  • 1. Quantum Cryptography Arinto Murdopo Maria Stylianou Ioanna Tsalouchidou 13/12/2011
  • 2. Outline ● Quantum Cryptography ● Theoretical Background ● Quantum Key Distribution (QKD) ○ BB84 Protocol ● Vulnerabilities & Attacks ○ Faked - state attack
  • 3. Quantum Cryptography - How it came up ● Cryptography => Secure Communication => Secure Data Transmission ● Two techniques ○ Symmetric - key encryption (shared key) ■ Key - distribution problem ○ Asymmetric - key encryption (pair of public&secret keys) ■ Success based on hardware limitations, absence of good algorithms and non-use of quantum computers. Quantum Cryptography!
  • 4. Quantum Cryptography ● Quantum Cryptography is ○ the use of laws of quantum physics, to: ■ perform cryptographic functionalities ■ break cryptographic systems ● Examples: ○ Quantum Key Distribution (next section) ○ Quantum Computers to break existing protocols
  • 5. Theoretical Background ● Quantum - minimum amount of any physical entity ● Photon Polarization - Quantum Superposition ○ Vertical-Horizontal 2 orthogonal ○ Diagonal +-45 degrees states ● Heisenberg Uncertainty Principle ○ “observation causes perturbation” ○ no-cloning theorem Polarized Wave Applet! http://surendranath.tripod.com/Applets/Waves/Polarisation/PW.html
  • 6. Theoretical Background Filter to distinguish polarized photons. Correct Filter applied Wrong Filter applied
  • 7. Quantum Key Distribution - BB84 ● First quantum cryptography protocol ● Goal: describe a scheme of two users who want to communicate and exchange data securely. ● Idea: distribute a key securely, based on the laws of physics. ● Security proofs: ○ If someone reads the state of photon -> state changes ○ Not possible to copy the photon in order to encode it with all possible ways (basis)
  • 9. Quantum Key Distribution - BB84 Step 1 ● Alice has two choices, key (a) & basis (b), chosen randomly ● Combine bits of a and b, 1-1, ● Four different states of qubit (photon polarization) ● Sent through public quantum channels: ○ Optical Fiber ○ Free Space Photon Source
  • 10. Quantum Key Distribution - BB84 Step 2 ● Bob receives qubit from Alice ● Bob measures it by choosing random basis using Beam Splitter (BS), practically it could be 50/50 mirror ● PBS sends qubit to certain detector using some rules
  • 11. Quantum Key Distribution - BB84 Step 2 How PBS of a specific basis works ● Let photon that polarized on that basis to pass through to the correct detector ● Otherwise, the photon can head randomly to any of the wrong detectors
  • 12. Quantum Key Distribution - BB84 Step 2 Example of how PBS combining with detector works!
  • 13. Quantum Key Distribution - BB84 Step 3 ● 1st communication between Alice and Bob in public channel ● They compare the basis used to encode and measure the qubit ● If Bob.basis == Alice.basis ○ Keep the bit! ● Else ○ Discard the bit ● The length of the initial key is reduced to half of its length because the probability of Bob choosing the same basis as Alice is 50%
  • 14. Quantum Key Distribution - BB84 Step 4 ● Check if someone has intruded the communication or if some imperfection of the devices or channel has introduced noise that distort the outcome ● If Eve has intruded the communication, she will DEFINITELY left some traces due to Heisenberg Uncertainty Principle (HUP) and non cloning theorem
  • 15. Quantum Key Distribution - BB84 Step 4 ● Alice and Bob performs MANY parity-checks ● In this way, they can find out whether Eve has intruded the communication ● Very simple example: ○ Calculate parity of blocks of 4-bits ● Alice sends the parities of her blocks and Bob checks them
  • 16. Quantum Key Distribution - BB84 Step 5 ● Now Alice and Bob have the same keys, all the bits are same ● The problem is, in Step 4, Eve manages to find out some portions of their key ● Privacy Amplification comes into the rescue!
  • 17. Quantum Key Distribution - BB84 Step 5 ● Alice and Bob apply Hash function to compress the key into the final one. And they should use the same Hash function.
  • 18. Vulnerabilities - Photon number attack ● Sending more than one photon for each bit leads to photon number attack. ○ Eve can steal extra photons to extract the stolen photons information. ● Ensure photon spitter only sends exactly ONE photon each time. ● Single photon ensures quantum mechanic laws are satisfied.
  • 19. Vulnerabilities - Spectral attack ● If photons are created by four DIFFERENT laser photo diodes, they have different spectral characteristics. ● Eve performs spectral attack by measuring COLOR, and not polarization.
  • 20. Vulnerabilities - Random numbers ● Are our random numbers really "Random"? ● Bob side, randomness is determined by BS. ● Alice side, randomness if a bit stream cannot be proven mathematically ○ Algorithms generate "random" sequences by following specific patterns => NOT that random! ○ Eve can use same algorithm to extract information. Entangled Photon Pairs comes to the rescue!
  • 24. Faked-state attack Practical Implementation - Detector replica ● Eve has replica of Bob's detector ● To capture the photon and measure it like Bob always does
  • 25. Faked-state attack Practical Implementation - Fake Stated Generator ● Blind Bob's detector ○ Insensitive to photon ● Forces Bob's detectors to have same "click" as what Eve has measured ○ Bob and Eve have same information
  • 26. Faked-state attack Practical Implementation - Blind all Bob's detectors ● QKD detectors use Single Photon Avalanche Diode (SPAD)
  • 27. Faked-state attack Single Photo Avalanche Diode ● Has two modes ○ Geiger Mode ○ Linear Mode Hence, SPAD in Linear Mode can be considered as blind-to-photon.
  • 28. Faked-state attack Single Photo Avalanche Diode ● How to make SPAD behaves in Linear Mode?
  • 29. Faked-state attack Single Photo Avalanche Diode ● SPAD in Linear Mode ● Bright illumination causes the capacitor has not enough time to recharge and re-balance the voltage value at point 2 ● SPAD's bias voltage below VBreakdown -> Linear Mode
  • 30. Faked-state attack Single Photo Avalanche Diode ● SPAD in Linear Mode ●
  • 31. Faked-state attack Practical Implementation - Force Bob's detector to click ● Blinding Bob's detector is not enough ● Eve needs to force specific Bob's detector to "click" according to the measurement result in Eve's detector
  • 32. Faked-state attack Practical Implementation - Force Bob's detector to click ● SPAD in linear mode ("blind SPAD) -> easily forced to create a "click" ● Sending pulse of light with intensity power "I0"
  • 33. Faked-state attack Practical Implementation - Blind the detector ● Correct light pulse intensity is important ● (2*I0) is the answer!
  • 34. Putting them all together! Faked-state attack
  • 35. Faked-state attack Result of the Attack: Impressive! Bob@V Bob@-45 Bob@H Bob@+45 Eve@V 99.51% 0 0 0 Eve@-45 0 99.66% 0 0 Eve@H 0 0 99.80% 0 Eve@+45 0 0 0 99.95%