Problems On Quantum Crypto
Problems On Quantum Crypto
Problem: Alice wants to send a secure message to Bob using the BB84 protocol.
Alice chooses the following random bits to send: 1100. She decides to encode
these bits using the BB84 protocol with the following bases:
For the first bit (1), she uses the Z-basis (standard basis).
For the second bit (1), she uses the X-basis (Hadamard basis).
For the third bit (0), she uses the Z-basis.
For the fourth bit (0), she uses the X-basis.
Alice wants to send the bits 1100. She encodes them using the BB84 protocol
with the following bases:
o For the 1st qubit, Bob measures in the Z-basis. Since Alice also used
the Z-basis, Bob’s measurement will directly give the bit value.
Thus, Bob will measure ∣1⟩
o For the 2nd qubit, Bob measures in the X-basis. Alice encoded it in
the X-basis, so Bob’s measurement will yield a result of 1 with a
50% probability. Thus, Bob’s result is 111.
o For the 3rd qubit, Bob measures in the Z-basis. Alice encoded it in
the Z-basis, so Bob’s measurement will directly give the bit value.
Thus, Bob will measure ∣0⟩
o For the 4th qubit, Bob measures in the X-basis. Alice also encoded
it in the X-basis, so Bob’s measurement will yield a result of 0 with
a 50% probability. Thus, Bob’s result is 000.
o 1st bit: 1
o 2nd bit: 1 (with 50% probability)
o 3rd bit: 0
o 4th bit: 0 (with 50% probability)
Problem 2:
Problem: Suppose Alice and Bob have performed the BB84 protocol and have
shared a quantum key. After the key is established, they compare a portion of
their bits to estimate the error rate. They find that out of 1000 bits, 20 bits differ
between Alice's and Bob's results.
Alice and Bob compare their bit strings after key distribution. Out of 1000 bits,
they find 20 bits differ.
Error Rate=20/1000×100%=2%
If the error rate is higher than expected (typically close to 0% in the absence
of eavesdropping), this could indicate the presence of an eavesdropper or
other issues in the transmission.
Problem: Alice and Bob are using the BB84 protocol to establish a secure key.
An eavesdropper, Eve, tries to intercept and measure the qubits being sent from
Alice to Bob. Eve chooses a random basis for each qubit she intercepts.
1. If Eve uses the Z-basis for 60% of the qubits and the X-basis for 40% of
the qubits, what is the probability that she correctly guesses the basis Alice
used for each qubit?
2. How does Eve's choice of bases affect the security of the BB84 protocol?
Eve uses the Z-basis for 60% of the qubits and the X-basis for 40% of the qubits.
Eve guesses the basis used by Alice with the following probabilities:
o Probability of correct basis match when Eve uses Z-basis (Alice also
uses Z-basis) = 0.6.
o Probability of correct basis match when Eve uses X-basis (Alice also
uses X-basis) = 0.4.
Problem: In the BB84 protocol, Alice sends 100 qubits to Bob. Each qubit is
encoded in either the Z-basis or the X-basis, with each basis chosen randomly and
with equal probability.
1. What is the probability that Bob measures a qubit in the same basis as Alice
for any given qubit?
2. If Alice and Bob find that they have successfully shared 80% of the qubits
(the rest being discarded due to basis mismatches or errors), what is the
expected number of qubits for which the basis matches?
Alice and Bob are using the BB84 protocol. Alice sends 100 qubits.
Since Alice and Bob each choose the basis randomly, the probability that
Bob measures in the same basis as Alice for any given qubit is:
Probability=1/2
If Alice and Bob share 100 qubits, and each qubit is measured with the
same basis with probability 0.5:
Problem: After running the BB84 protocol, Alice and Bob end up with the
following bit strings:
Alice and Bob decide to compare their bits using the BB84 protocol's key sifting
and error correction procedures.
Error Rate=3/8×100%=37.5%
To correct these errors, Alice and Bob can use an error correction algorithm
like the Cascade protocol or other error-correcting codes, which will help
reconcile their bit strings.