FPGA Implementation of Quantum Cryptography Algorithm PDF
FPGA Implementation of Quantum Cryptography Algorithm PDF
Abstract. Quantum cryptography is a process for developing a perfectly secret encryption key that can be used with any
classical encryption system. This paper presents a study of the EPR state protocol, the first continuous variable quantum key
distribution protocol. We propose an algorithm for this protocol and subsequently its implementation on FPGA (Field-
Programmable Gate Array). For the implementation, we used Xilinx's ISE System Edition tool as Software and Xilinx's
Artix7 Nexys4 DDR board as hardware.
Keywords : Communication Protocol, QKD, Security, Secret Key, FPGA Platform, EPR paradox, Bell's Inequality,
Quantum Cryptography.
1. Introduction
The first means of communication put in place by humans are accompanied by a need for confidentiality in the
information transmission. The first cryptographic systems appear around 200 before J.C[1]. Today, most
classical cryptographic systems rely on mathematical algorithms whose safety and robustness to cracking have
not been formally demonstrated. The computational complexity poses very little resistance to the increase in
computational power of computer systems.
In 1900, based on the quantum theory, M. Planck [2] showed that the emission and absorption of light can
only be in whole energy packets. He thus defined Planck's constant h, which quantifies the energy exchanges
between light and material. In 1905, Einstein was the first to introduce the quantification of radiant energy by
expressing light as grains, then explaining the photoelectric effect. In 1926, Newton then proposed the term
photon.
In 1925, Heisenberg unified the various approaches under the " Matrices Mechanics ", the base of quantum
mechanics, which was enriched in 1926 by the Schrödinger approach. The central purpose of this approach was a
complex-valued wave function, thus satisfying the equation that now bears his name [3].
The beginnings of quantum cryptography appeared in the late sixties in Stephen Wiesner's (unpublished)
article [4], in which he explains the importance of Heisenberg's uncertainty principle in coding currencies in
order to protect them from forgery. He then proposes the use of a multiplexer quantum channel interspersing two
messages so that reading one of them makes the other unreadable.
In 1979, Charles H. Bennett and Gilles Brassard returned to this work to design a secret key distribution
system based on quantum mechanics principles [5]. In 1983, Wiesner's article was finally published, the photon
would now be used for information transmission and not for storage.
Quantum cryptography is not a new cryptographic process. Indeed, it does not directly allow the
communication of intelligible messages but allows (mainly) the cryptographic key distribution, which often
leads to designate the quantum key distribution (QKD) by the more general term of quantum cryptography. It,
therefore, appears as a complement to classical cryptography, it meets the need for private key distribution. The
safety of this method is based on the laws of quantum mechanics and is considered unconditionally safe.
Quantum entanglement, a quantum mechanics astonishing phenomenon, revealed by Einstein and
Schrödinger in the 1930s, assumes that two particles, even distant ones, of a physical system have dependent
quantum states. Any measurement of one of these two particles affects the other. These entangled states seem to
contradict the locality principle.
Quantum entanglement was the base of two famous thought experiments proposed in 1935: the Schrödinger's
cat experiment [3] by Erwin Schrödinger, and the EPR experiment of Einstein, Podolsky, and Rosen [6].
Einstein, Podolsky, and Rosen then concluded that quantum mechanics is incomplete. They were based on the
fact that any quantum state measurement performed at a position A can't influence the measurement result of
this state at a position B (locality hypothesis) and that a quantum state has defined values regardless of its
measure (realism hypothesis). They ended by saying that the description of a quantum system can only be
completed with the use of hidden variables [7] whose role is to predetermine the measurement result of the
quantum states and subsequently solve the EPR paradox.
In 1964 and in order to quantify the debate between quantum mechanics and the notion of hidden variables,
J. Bell introduced a set of inequalities to check for any local and realistic theory [8]. The Bell's inequality test
implies that, at a time t, two detection systems A and B simultaneously perform measurements on the two
elements of an entangled quantum states pair. The Bell's inequalities verification is an important step in the
processing of information. These are relationships that entangled state measurements must respect.
Several quantum cryptography protocols are based on the principle of entangled photons, their security is
based on the properties of the latter. In 1991, Ekert proposed a QKD protocol based on the EPR paradox and on
Bell's inequalities [9]. In the next section, we will explain the principle of this protocol and propose an algorithm
to use for the implementation.
2. EPR protocol
It is a protocol whose states are correlated or entangled. In this protocol, the term EPR pairs is used to denote a
pair of states emitted at a time t. The EPR pairs may be pairs of particles separated at great distances. This
protocol also uses Bell's inequality verification for spy detection. The general architecture of an entangled
quantum cryptography system can be presented as follows:
Alice Bob
𝐴1 = 𝑍 𝐵1 = 𝑍
𝑋+𝑍
𝐴2 = 𝑋 𝐵2 =
2
𝑍+𝑋 𝑍−𝑋
𝐴3 = 𝐵3 =
2 2
With
𝑍 = 0 0 − |1 1| (1)
and
𝑋 = 0 1 + |1 0| (2)
The EPR protocol, like any QKD protocol, uses two types of channels: a quantum channel and a classic channel.
Its algorithm can be described as follows:
2.1 First Phase: quantum channel transmission
At each instant t, an EPR pair is created. The first photon of this pair is transmitted to Alice while the second is
transmitted to Bob. On their part, Alice and Bob, each randomly and with equal probabilities select their operator
from Ai and Bi with i ∈ {1,3}. Depending on the chosen measurement operator, Alice and Bob proceed to
measure their received photons respectively. They reserve their measurement results as well as their choice of
measurement operators.
2.2 Second Phase: communication on the public channel
Step1: Separating data into two groups
In this step, Alice and Bob carry out a public discussion via a conventional channel to determine the set of bits
for which they have used the same measurement operators. Each separates his bit sequence into two groups. The
first group named "Raw Key" contains the set of bits measured with the same measurement operator Ai =
Bi . The second group named "Rejected Key" contains the rest of the bits, the bits for which Alice and Bob didn't
use the same measurement operator.
Step 2: Verifying Bell's Inequality and Spy Detection
Unlike other quantum communication protocols such as BB84 and B92, for the EPR protocol, nothing is
discarded. Indeed, the set "Rejected Key" is used to check the presence of the spy Eve and this through the test
of Bell inequalities. If these inequalities are violated, it is a sign of intrusion. Alice and Bob then proceed to a
discussion through the public channel to compare their rejected keys.
We will match to the set {A1 , A2 , A3 }the set {a, b, c}. Similarly for the set B1 , B2 , B3 the set a, b, c .
Let P(a, b) be the probability that two corresponding bits of the rejected keys of Alice and Bob are respectively
Alice's measurement result by the operator A1 and Bob's measurement result by the operator B2 . According to
the same reasoning we search for P a, c and P(b, c).
The two PCs are connected by an Ethernet link representing the authenticated classic channel. For the quantum
channel, it is represented by an optical fiber. We have integrated the EPR source at the transmitter, only one
detector is needed at the receiver. It's a balanced homodyne detector
30 QBER
20
10
0
0 50 100 150
Time (ns)
30
Key Generation
20
Bits/symbol
10
0
0 50 100 150
time (ns)
The values shown in this table reflect the sequential logic of our system. Indeed, each step is highly dependent
on the previous one, from which comes the need to use an FSM (Finite State Machine) to control this sequence
of events and the transition from one state to another. The use of Look Up Tables (LUTs) and Flip Flops is due
to the use of logical operators (XoR, Comparator, etc.) during the implementation of the system.
4. Conclusion
In this research work, we proposed an algorithm of the EPR protocol, the first quantum key distribution protocol
with entangled variables. We implemented this algorithm on an FPGA platform where we used the Nexys4 DDR
board.
We didn't talk about the eavesdropping strategy. We also used a pseudo-random number generator instead of a
true one. In principle we are working with continuous variables, but, as we explicated, we have to resort to
discrete variables once we attained reconciliation phase.
Quantum key distribution protocols using entangled variables take advantage of quantum mechanics
principles, especially quantum entanglement, to ensure the unconditional security of the communication process,
even in the presence of a spy.
Acknowledgment
This work is supported by Electronics and Microelectronics Laboratory, Sciences Faculty of Monastir-
Tunisia (code: LR99ES30) and National Engineering School of Tunis-Tunisia, Communication System
Department.
The first author thanks Mr. Tayari Lassaad, Master computer scientist of industrial systems at the Higher
Institute of Technological Studies Gabes-Tunisia, who provides Nexys4 board.
References
1. David Kahn, The Codebreakers: A Comprehensive History of Secret Communication from Ancient Times to the
Internet, Revised and Updated, New York, Scribner, 1996.
2. Josef SMOLKA, « PLANCK MAX - (1858-1947) », Encyclopædia Universalis [en ligne], viewed on December
07, 2017. URL: http://www.universalis.fr/encyclopedie/max-planck/
3. Erwin Schrödinger, Quantum physics and representation of the world. Le Seuil, coll. "Science Points", 1992, 184 p.
French translation of two popular articles: The current situation in quantum mechanics (1935), Science and humanism -
The physics of our time (1951).
4. Stephen Wiesner. Conjugate coding. Sigact News, 15(1) :78–88, 1983. Written around 1969-1970, this article was
published only in 1983.
5. Charles H. Bennett and Gilles Brassard. Quantum cryptography: public-key distribution and coin tossing. In
Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing pages 175–179. IEEE,
1984.
6. A. Einstein, B. Podolsky, N. Rosen, “Can quantum-mechanical description of physical reality be considered
complete ?”, Physical Review Letters, vol. 47, pp. 777-780, 1935.
7. J. S. Bell, Introduction to the hidden variable question, Proceedings of the International School of Physics Enrico
Fermi, Course IL, Foundations of Quantum Mechanics (1971), 171-181.
8. J. S. Bell, On the Einstein Podolsky Rosen Paradox, Physics 1 (1964), 195.
9. Artur K. Ekert : Quantum Cryptography Based on Bell’s Theorem. Phys. Rev. Lett., 67(6):661–663, August 1991.
10. Gilles Brassard and Louis Salvail. Secret-key reconciliation by public discussion. In Advances in cryptology –
Eurocrypt’93, number 765 in Lecture Notes in Computer Science, pages 411–423, New-York, 1993. Springer Verlag.
11. Charles H. Bennett, Gilles Brassard, Claude Crépeau, and Ueli M. Maurer. Generalized privacy amplification.
IEEE Transactions on Information Theory, 41(6) :1915– 1935, November 1995. Available at
http://www.crypto.ethz.ch/~maurer/publications.html.
12. https://reference.digilentinc.com/reference/programmable-logic/nexys-4-ddr/reference-manual
13. W. Liang et Jing Long, « A cryptographic algorithm based on Linear Feedback Shift Register », Computer
Application and System Modeling (ICCASM), 2010 International Conference on, 22-24 October 2010
14. M. Koutsoupia, E. Kalligeros and X. Kavousianos, LFSR-based test-data compression with self-stoppable seeds,
Design, Automation & Test in Europe Conference & Exhibition, 20-24 April 2009, p. 1482-1487 .
15. J.A. Reeds and J.A. Sloane, Shift Register Synthesis (Modulo m), SIAM Journal on Computing, August 1985, p.
505-513.
16. Gilles Van Assche, Jean Cardinal et Nicolas J. Cerf : Reconciliation of a Quantum-Distributed Gaussian Key. IEEE
Trans. Inf. Theory, 50(2):394–400, February 2004.
APPENDIX 1
APPENDIX 2
Fig2. Simulation of EPR protocol with ISim tool. We estimated the length of the final key to be 15 bits.