Title: Kvantekryptografi med fotoner i optiske fibre
1Norsk kryptoseminar, 17-18. oktober 2002. NTNU,
Trondheim
Quantum Cryptography
Vadim Makarov and Dag R. Hjelme Institutt for
fysikalsk elektronikk NTNU www.vad1.com/qcr/
2Classical vs. quantum information
Perfect copy
Unchanged original
Imperfect copy
Broken original
3Qubit polarization stateof a single photon
Measure?
50
Measure?
50
4What is the problem with classical cryptography?
- Secret key cryptography
- Requires secure channel for key distribution
- In principle every classical channel can be
monitored passively - Security is mostly based on complicated
non-proven algorithms - Public key cryptography
- Security is based on non-proven mathematical
assumptions (e.g. difficulty of factoring
large numbers) - We DO know how to factorize in polynomial time!
Shors algorithm for quantum computers. Just wait
until one is built. - Breakthrough renders messages insecure
retroactively
5The holy grail One-time pad
- The only cipher mathematically proven
- Requires massive amounts of key material
m
m
c
k
k
6Key distribution
- Secret key cryptography requires secure channel
for key distribution. - Quantum cryptography distributes the key by
transmitting quantum states in open channel. -
7Quantum key distribution
Bob
Alice
Diagonal detector basis
Diagonal polarization filters
Horizontal-vertical detector basis
Horizontal-vertical polarization filters
Light source
Alices bit sequence 1 0 1 1 0 0 1 1 0
0 1 1 1 0
Bobs detection basis
Bobs measurement 1 0 0 1 0 0 1 1 0 0
0 1 0 0
Retained bit sequence 1 1 0 0 1 0
0 1 0
Image reprinted from article W. Tittel, G.
Ribordy, and N. Gisin, "Quantum cryptography,"
Physics World, March 1998
8Eavesdropping with wrong reference system
9Interferometric QKD channel
? 1 0? or 90? - "1"
Reference systems ? 2 0? ? 2 90?
? 1 180? or 270? - "0"
10Implementation interferometer structure
Alice
Variable Ratio PM Coupler
Polarization Combiner
Phase Modulator 1
Variable Delay Line
Polarizer
Laser
PM fiber
Attenuator
1300 nm (or 1550 nm) Pulse Rate 10 MHz
Alice's PC
Line Standard SM fiber
Public Communication Channel
Eve's Territory
Bob
Bob's PC
Phase Modulator 2
Polarization Controller
PM Coupler 50/50
APD
'0'
Polarization Combiner
Polarizing Splitter
'1'
PM fiber
11Photo 1. Alice (uncovered, no thermoisolation
installed)
12Photo 2. Bob (uncovered, no thermoisolation
installed)
13Single-photon detectorAPD in Geiger mode
tgate down to 1ns gate pulse rate 20 MHz
14Recovery from errors
Eves information
Bobs information
QBER limit
- Individual attacks 15
- All theoretically possible attacks 11
15Distance limitation
16Components of security
1. Conventional security 2. Security against
quantum attacks 3. Security against Trojan horse
attacks - ones that dont deal with quantum
states, but use loopholes in optical scheme
17Practical security large pulse attack
Alice
Phase Modulator
Attenuator
Alice's PC
Line
Eves Equipment
- interrogating Alices phase modulator with
powerful external pulses (can give Eve bit values
directly)
18Eavesdropping experiment
Alice
4 reflection
Phase Modulator
Laser
Vmod
Eve
L1
OTDR
Out
Variable attenuator
In
L2
Fine length adjustment to get L1 L2
4.1
8.2
0
Vmod, V
19Photo 3. Artem Vakhitov tunes up Eves setup
20Re-keying satellites/Global key distribution
network
1.9 km 10 km 23.4 km
21Quantum key distribution in network
- Multi-user key distribution
Bob 1
Passive splitter
Alice
Bob 2
Bob 3
- Multiplexing with telecom traffic
1300 nm
28 km
Bob
Alice
WDM
WDM
Data transmitter
Data receiver
1550 nm 1.2 Gbit/s
22Entangled photon pairs
1560nm Entangled Photon Pairs
Nonlinear Crystal
Pump Pulses 780nm
To Bob
Random state prepared passively
Passive Measurement Alice
23Advanced multi-party protocolsSecret sharing
and splitting
24Commercial status
- id Quantique (Geneva)
- first commercially available quantum key
distribution system - MagiQ Technologies (Boston)
- EQUIS project (Heriot-Watt University and
Corning UK) - compact integration into standard PCs
- several research groups, telecom/ electronics
companies