QC Report
QC Report
SEMINAR REPORT
SESSION: 2022-23
Page 1
Quantum Cryptography
Quantum Cryptography
Submitted by
Guided by
Dr. A. S. Alvi
2022-2023
Page 2
Quantum Cryptography
CERTIFICATE
Quantum Cryptography
is a bonafide work and it is submitted to the Sant Gadge Baba Amravati
University, Amravati
By
Under my guidance.
Page 3
Quantum Cryptography
Acknowledgement
Roll no: 21
Page 4
Quantum Cryptography
Abstract
The advantage of quantum cryptography over traditional key exchange methods is that
the exchange of information can be shown to be secure in a very strong sense, without making
assumptions about the intractability of certain mathematical problems. Even when assuming
hypothetical eavesdroppers with unlimited computing power, the laws of physics guarantee
that the secret key exchange will be secure, given a few other assumptions. Cryptography is
the art of devising codes and ciphers, and cryptoanalysis is the art of breaking them. Cryptology
is the combination of the two. In the literature of cryptology, information to be encrypted is
known as plaintext, and the parameters of the encryption function that transforms are
collectively called a key.
Page 5
Quantum Cryptography
Table of Content
1. INTRODUCTION……………………………………………….7
o Motivation
o Objective
2. LITERATURE SURVEY……………………………………….9
3. FUNDAMENTALS & IMPLEMENTATION………………….11
o Heisenberg’s Uncertainty Principle
o Process of Quantum Coding
o Quantum Cryptography Model
o Quantum Key Distribution
o Quantum Entanglement
o Detecting Eavesdropping
4. BENEFITS AND LIMITATIONS………………………………19
o Benefits of quantum cryptography
o Limitations of quantum cryptography
5. APPLICATIONS…………………………………………………20
6. CONCLUSION…………………………………………………...21
7. FUTURE SCOPE…………………………………………………22
8. REFERENCES……………………………………………………23
Page 6
Quantum Cryptography
Chapter 1
Introduction
Cryptography is the process of encrypting and protecting data so that only the person
who has the right secret key can decrypt it. Quantum cryptography is different from traditional
cryptographic systems in that it relies on physics, rather than mathematics, as the key aspect of
its security model.
These properties make it impossible to measure the quantum state of any system without
disturbing that system.
Photons are used for quantum cryptography because they offer all the necessary
qualities needed: Their behaviour is well understood, and they are information carriers in
optical fibre cables. One of the best-known examples of quantum cryptography currently is
quantum key distribution (QKD), which provides a secure method for key exchange.
Page 7
Quantum Cryptography
1.1Motivation
Cryptographers make efforts to build more and more sophisticated means to obscure
the sensitive information which is to be transmitted. But the hackers, code breakers,
eavesdroppers work furiously to crack the systems. If either cryptographer achieve security or
the code breakers decipher the security the success will be temporary. This process of securing
the message using ciphering and breaking the system using deciphering is an endless process.
Once, this scenario is a chase in the race.
We are also faced with unprecedented challenges which the conventional cybersecurity tools
cannot help mitigate. However, in this context, the quantum cryptography techniques, or
more accurately, the quantum key distribution methods can prove to be beneficial.
1.2 Objective
1. In general, the goal of quantum cryptography is to perform tasks that are impossible
or intractable with conventional cryptography.
2. Quantum cryptography makes use of the subtle properties of quantum mechanics
such as the quantum no-cloning theorem and the Heisenberg uncertainty principle.
Unlike conventional cryptography, whose security is often based on unproven
computational assumptions, quantum cryptography has an important advantage in that
its security is often based on the laws of physics.
3. Academic, technology, and public sector organizations worldwide have
accelerated efforts to discover, develop, and implement new quantum
cryptographic algorithms.
4. The objective is to create one or more algorithms that can be reliably resistant to
quantum computing. The task is technically difficult, but not impossible.
Page 8
Quantum Cryptography
Chapter 2
Literature Survey
Smart cards, PINs, password authentication, etc., use current cryptographic techniques
and they are performing well in keeping data secure. However, the overall security of an
encryption system relies in the ability to keep cipher keys secret, but a typical human behaviour
is to write down passwords either in their inbox of mobile phone or e-mail id, this behaviour
makes security very vulnerable to attack.
Embedded systems that are installed in devices forms an integral part of the
manufacturing, health, transportation, and finance sectors, as well as the military, without
having near-flawless strong cryptographic security built into them might also be vulnerable to
well organized crime, terrorists, Quantum Cryptography using Quantum Key Distribution and
its Applications N.Sasirekha, M.Hemalatha Quantum Cryptography using Quantum Key
Distribution and its Applications 290 Published By: Blue Eyes Intelligence Engineering &
Sciences Publication Pvt. Ltd. or enemy governments[3][7].
Data hiding methodologies aim is to solve modern network security, quality of services
control, and secure communications, is also a cost-effective alternative to other means of data
security, which does not require protocol modifications.
The development of the Mobile Application Security System which uses a layered
security approach and strong cryptographic techniques is seen as a feasible and low-cost
solution to protect these application-based wireless networks[7]. Finally, a new concept in
Page 9
Quantum Cryptography
Quantum cryptography was first proposed by Stephen Weisner in his work "Conjugate
Coding" in the early 1970s. Conjugate coding is an extension of Random number generator[1].
In Sigact News, a proposal was published in the year 1983, and at that time two scientists
Bennet and Brassard, who were familiar with Weisner's ideas, were ready to publish their own
ideas.
In 1984, they produced the "BB84” which is the first quantum cryptography
protocol[7]. In 1991, the first experimental prototype based on this protocol was produced
which operated over a distance of 32 centimetres. During that period, the technology has been
refined and the distance may be increased to kilometres[3][6]. In June 2003, a team at the
University of Vienna transmitted entangled photons across the river Danube, through free
space. In April 2004, the first money transfer encrypted by quantum keys was experimented
between the two Austrian banks. These two buildings were 500 meters apart, and fibre optics
was fed through 1.5 kilometres of sewage system to link them together[5].
Page 10
Quantum Cryptography
Chapter 3
Quantum cryptography is a latest and advanced branch of cryptography its basis lays in
the two beliefs of quantum technicalities: Heisenberg’s uncertainty principle and principle of
photon polarization.
For in- stance, if one measures the polarization of a photon by noting that it passes through
a vertically oriented filter, the photon emerges as vertically polarized regardless of its initial
direction of polarization. If one places a second filter oriented at some angle q to the vertical,
there is a certain probability that the photon will pass through the second filter as well, and this
probability depends on the angle q. As q increases, the probability of the photon passing through
the second filter decreases until it reaches 0 at q = 90 deg (i.e., the second filter is horizontal).
When q = 45 deg, the chance of the photon passing through the second filter is precisely 1/2. This
is the same result as a stream of randomly polarized photons impinging on the second filter, so the
first filter is said to randomize the measurements of the second.
The principle of photon polarization states that, an eavesdropper cannot copy unknown qubits,
due to no-cloning theorem.
Page 11
Quantum Cryptography
Polarization by a filter
Unpolarized light enters a vertically aligned filter, which absorbs some of the light and
polarizes the remainder in the vertical direction. A second filter tilted at some angle q absorbs
some of the polarized light and transmits the rest, giving it a new polarization. A pair of
orthogonal (perpendicular) polarization states used to describe the polarization of photons, such
as horizontal/vertical, is referred to as a basis. A pair of bases are said to be conjugate bases if the
measurement of the polarization in the first basis completely randomizes the measurement in the
second basis, as in the above example with q = 45 deg. It is a fundamental consequence of the
Heisenberg Uncertainty principle that such conjugate pairs of states must exist for a quantum
system.
Page 12
Quantum Cryptography
Quantum mechanics says there is no possible measurement that will distinguish between
the 4 different polarization states, as they are not all orthogonal. The only measurement possible
is between any two orthogonal states (a basis), so for example measuring in the rectilinear basis
will give a result of horizontal or vertical. If the photon was created as horizontal or vertical
then this will measure the correct state, but if it was created as 45 or 135 then the rectilinear
measurement will instead return either horizontal or vertical at random. Furthermore, after this
measurement the photon will be polarized in the state it was measured in (horizontal or vertical),
with all information about its initial polarization lost.
Heisenberg’s uncertainty principle says that some pairs of physical properties are
related in a way that while measuring one property may prevent the person from knowing the
other simultaneously. In particular, the selection of what direction to measure affects all
successive measurements. When an unpolarized light enters a vertically aligned filter, it
absorbs some of the light and polarizes the rest in the vertical direction. A subsequent filter
tilted at some angle q absorbs some of the polarized light and transmits the rest, giving it a new
polarization. A pair of orthogonal polarization states used to express the polarization of
photons, such as horizontal/vertical, is referred to as a basis.
Page 13
Quantum Cryptography
measured. The type of measurement impacts the property of the object. This implies that a
photon can only be considered to have a particular polarization after it is measure, and that the
basis chosen for the measurement will have an impact on the polarization.
Page 14
Quantum Cryptography
Page 15
Quantum Cryptography
perhaps is the most practical quantum systems for transmission between sender and
receiver.
Page 16
Quantum Cryptography
3. Alice publicly responds in the classical channel, which bases were chosen correctly.
4. Alice and Bob discard all observations except the correctly-chosen bases.
5. The remaining observations are converted on to binary code (left-circular or horizontal
is 0, and right-circular or vertical is 1).
D. Quantum entanglement
This process can be generated by firing a laser through a crystal and splitting a single
photon into two. By disturbing the state of one will instantly disturb the other, no matter how
far apart they are. If one of the particles is measured according to the rectilinear basis and is in
vertical polarization, then the other particle will be in a vertical polarization if it is measured
according to the rectilinear basis. If, however, the second particle is measured using circular
basis, it may be found to have either left-circular or right-circular polarization. This is
extremely useful in detecting eavesdroppers.
The procedures for a transfer are similar to the original process described earlier, where
Alice sends polarized photons to Bob, who in turn measures the photons using randomly
selected states. A photon generator is placed between Alice and Bob so that pairs of entangled
photons with the same polarization go to Alice and Bob at the same time. Then both sender
and receiver measure the signals with randomly varying bases, and record the result and the
time received. After comparing the bases, they keep those that are the same and discard the bits
measured with different bases. They can then test for errors using the algorithms described in
the previous section.
Page 17
Quantum Cryptography
D. Detecting eavesdropping
To detect the eavesdrop; polarization of the photon is to be measured. The key concept
is that it is impossible to measure the polarization of the photon without destroying it. So, if
Eve intercepts the signal, she will have to send new photons to the receiver so that she may not
be detected about her presence. However, she will inevitably introduce errors, since she doesn't
know the state and polarization. So, Alice and Bob can check for errors by revealing a random
subset of their generated sequence and comparing it publicly. If they are not satisfied with the
error rate, they can set up a different channel. This ensures that while Alice and Bob cannot
stop Eve from listening in, they would always know that she is there.
In entangled photon transfer method can also be used for this purpose. According to
physics law, a change in the polarization of one photon in a pair will affect the other one, no
matter how far apart they are. In order to eavesdrop, Eve would have to detect one of the
photons and measure it, thus destroying half of the pair. This act will end the quantum
relationship of the two members of the pair, which is very easy to detect by Alice and Bob, and
impossible to reverse for Eve. Without revealing the specific results of their measurements, the
sender and the receiver can talk publicly and see where intervention has occurred[3].
Page 18
Quantum Cryptography
Chapter 4
Detects eavesdropping. If a third-party attempts to read the encoded data, then the
quantum state changes, modifying the expected outcome for the users.
Offers multiple methods for security. There are numerous quantum cryptography
protocols used. Some, like QKD, for example, can combine with classical
encryption methods to increase security.
Potential downsides and limitations that come with quantum cryptography include the
following:
Range. The maximum range of quantum cryptography has typically been around
400 to 500 km, with the exception of Terra Quantum, as noted below.
Page 19
Quantum Cryptography
Chapter 5
Applications
Quantum encryption already protects both sensitive national security information in the public
sector and financial information in the private sector. Its security is tested and proven. Here are
some current and near-future applications of quantum cryptography.
Switzerland has been using quantum cryptography to conduct secure online voting in
federal and regional elections.
Secure communications with satellites and astronauts.
A Smart Power Grid implemented by America.
Quantum Internet
Page 20
Quantum Cryptography
Chapter 6
Conclusion
It is hard to see practical implementation of this technology today, given its limitations.
But with future breakthroughs in Quantum transmission, Quantum computing and Quantum
cryptography, it may just provide us with a truly secure communication means.
It is concluded that to transmit sensitive information between two or more points, some
stronger technique is needed. It’s sure that Quantum key distribution and other quantum
encryption methods will allow us to secure sensitive information more effectively in the future.
Quantum encryption is a powerful and positive step in the right direction, toward a future in
which we can feel more secure about how and what we share. Thus, we can also expect
considerable feedback from QKD into basic physics, which leads to a new perspective on the
foundations of quantum mechanics.
Page 21
Quantum Cryptography
Chapter 7
Future Scope
Security for cyberspace in the future Internet should be guaranteed as it is the collection
of all information systems and the information environment for human survival. For the
growing security problem in cyberspace, quantum cryptography becomes the first
consideration.
With the potential to become the cornerstone technology in the future of data security,
it won’t be long before we see corporations and government agencies adopting quantum
cryptography to greatly advance their capabilities and day-to-day operations. However, it
remains essential that quantum-resistant public-key cryptography becomes available within the
near future in order for us to maintain existing levels of information security within the age of
quantum computing. Unlike other existing security solutions, quantum cryptography is secure
from all future advances in mathematics and computing.
Page 22
Quantum Cryptography
References
[1] Wiesner, Stephen., 1983. “Conjugate coding”. ACM Sigact News 15.1:78-88.
[3] Harrison, David M., 2001. “Quantum Teleportation, Information and Cryptography.”
http://www.upscale.utoronto.ca/GeneralInterest/Harrison/QuantTeleport.html.
[4] Knight, Will., 2004. “Entangled photons secure money transfer.” Newscientist.com.
http://www.newscientist.com/news/news.jsp?id=ns99994914.
[7] Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., “Quantum Cryptography”, Reviews of
Modern Physics, vol. 74, January 2002, pp. 146-195.
http://www.gapoptique.unige.ch/Publications/Pdf/QC.pdf
[8] Martinez-Mateo, Jesus, David Elkouss, and Vicente Martin. “Key reconciliation for
High Quantum Cryptography using Quantum Key Distribution and its Applications 294
Published by: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.
Performance quantum key distribution.” Scientific reports 3 (2013).
[9] C.H. Bennett and G. Brassard. 1984 Quantum Cryptography: Public Key Distribution
And Coin Tossing. In Proc. IEEE Int. Conf. on Comp.,Sys. And Signal Process., pages
175-179, Bangalore.
[10] A.K. Ekert. Quantum Cryptography Based on Bell’s Theorem. Phys. Rev.
Lett.67(6):661-663,1991.
Page 23