Quantum Cryptography
Quantum Cryptography
Quantum Computing
(PCCCS571)
Bachelor of Technology
in
Manoj Nandi
Enrolment no: 12022002002163
November, 2024
Quantum Cryptography: The Future of Secure Communication
This report provides a comprehensive overview of quantum cryptography, exploring its
fundamentals, protocols, security implications, and potential applications. Beginning with a
foundational introduction to quantum mechanics and cryptography, the document delves
into the core principles of quantum key distribution (QKD), outlining how it enables secure
communication through the manipulation of quantum properties. We then examine various
QKD protocols and their practical implementations, addressing the security advantages and
challenges associated with this emerging technology. Finally, the report explores
advancements in quantum cryptography research and its promising applications across
diverse industries, concluding with a forward-looking perspective on its future impact on
secure communication.
References Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002).
Cryptography, on the other hand, deals with the techniques for secure communication, focusing on
protecting information from unauthorized access, modification, or disruption. Traditional
cryptographic methods rely on mathematical algorithms, while quantum cryptography leverages the
peculiar properties of quantum systems.
At the intersection of these two fields lies quantum cryptography, which leverages quantum
mechanics to create unbreakable encryption schemes. Unlike classical cryptography, where security
relies on the computational complexity of mathematical problems, quantum cryptography offers
inherent security based on the laws of physics. This fundamental shift in security paradigm opens up
exciting possibilities for future communication networks.
References Nielsen, M. A., & Chuang, I. L. (2010).
In a typical QKD protocol, the sender (Alice) transmits quantum states to the receiver (Bob) using
photons, which can be polarized in different directions. By measuring the polarization of received
photons, Bob can decipher the key shared with Alice. Any eavesdropping attempt by an adversary
(Eve) will introduce errors in the measured states, alerting Alice and Bob to the intrusion. This
detection mechanism ensures the integrity of the shared key.
QKD offers several advantages over traditional key distribution methods. It is inherently secure, as
any eavesdropping attempt leaves an indelible mark on the quantum state. It also allows for dynamic
key generation, ensuring that the key is fresh and constantly updated. QKD is particularly well-suited
for applications where high security is paramount, such as financial transactions, military
communication, and sensitive data transmission.
References Bennett, C. H., & Brassard, G. (1984).
• BB84: Proposed by Charles Bennett and Gilles Brassard in 1984, the BB84 protocol utilizes
four different polarization states for photons. Alice randomly sends photons in one of these
states, and Bob measures them using a randomly chosen basis. By comparing the results,
Alice and Bob can establish a secret key, while any eavesdropping attempt would be
detected.
• B92: Introduced by Charles Bennett in 1992, the B92 protocol simplifies the BB84 protocol by
using only two polarization states. This protocol is more efficient but slightly less secure than
BB84.
• Ekert: Proposed by Artur Ekert in 1991, the Ekert protocol leverages the phenomenon of
quantum entanglement to generate a shared key. This protocol utilizes two entangled
photons, where the measurement of one photon determines the state of the other. Any
eavesdropping attempt will disturb the entanglement, making it detectable.
• Financial transactions: QKD can enhance the security of financial transactions by ensuring
the confidentiality and integrity of sensitive data exchanged between parties. Banks and
financial institutions are exploring the potential of QKD for secure communication channels.
• Government and military applications: Governments and military organizations are actively
exploring QKD for securing critical communication networks and sensitive data
transmissions, especially in situations where traditional encryption methods may be
compromised.
Security Aspects:
• Forward secrecy: QKD ensures forward secrecy, meaning that even if the key is compromised
at some point, past communications remain secure. This is because the key is constantly
updated, making it impossible for an eavesdropper to decipher past messages.
Challenges:
• Distance limitations: Current QKD implementations are limited by the distance over which
quantum states can be transmitted without significant degradation. This is due to the
inherent loss of photons in fiber optic cables. Research is ongoing to develop new
technologies for extending QKD distances.
• Cost and complexity: Implementing QKD systems can be relatively expensive and complex,
requiring specialized equipment and expertise. This cost barrier is a major obstacle for
widespread adoption of quantum cryptography.
• Development of new QKD protocols: Researchers are constantly working on developing new
QKD protocols that are more efficient, secure, and robust against potential attacks. This
includes exploring novel quantum states and encoding techniques.
These advancements are paving the way for practical and widespread adoption of quantum
cryptography, making secure communication a reality across various industries. As research
progresses, we can expect even more innovative solutions and applications to emerge.
• Financial services: Quantum cryptography can secure financial transactions, ensuring the
confidentiality and integrity of sensitive data, such as account information and transaction
details. This can reduce the risk of fraud, identity theft, and financial loss.
• Healthcare: Quantum cryptography can protect sensitive patient data and medical records,
ensuring privacy and confidentiality in telemedicine and electronic health records. This is
crucial for maintaining patient trust and protecting sensitive information.
• Supply chain management: Quantum cryptography can secure supply chains by protecting
data related to product origin, transportation, and delivery. This can improve transparency
and accountability, reducing the risk of counterfeiting and product tampering.
The potential applications of quantum cryptography extend far beyond these examples, with
research and development continuously exploring new possibilities. As quantum cryptography
matures and becomes more accessible, we can expect its impact to be felt across numerous sectors,
revolutionizing how we secure information and communicate.
While challenges such as distance limitations, cost, and integration need to be addressed, ongoing
research and development are rapidly advancing the field. New QKD protocols, technologies for
extending QKD distances, and integration strategies are emerging, paving the way for practical and
widespread adoption of quantum cryptography.
As quantum cryptography matures, its impact will be felt across various industries, from financial
services and healthcare to government, telecommunications, and e-commerce. It has the potential
to secure critical infrastructure, protect sensitive data, and enable new possibilities for secure
communication. The future of quantum cryptography is promising, with ongoing advancements
driving its evolution towards a secure communication landscape for the digital age.
Date: 25/11/24
Place: Institute of Engineering & Management, Kolkata
MANOJ NANDI
Department of
CSE