QUANTUM KEY
DISTRIBUTION
RAMY TANNOUS
+ John Donohue
Stuff to Recall
Superposition is a relative concept
depending on a choice of mutually exclusive states
The particle is both The particle is both
“0” AND “1” “+” AND “-”
at the same time Measurement Basis at the same time
Defines which “question”
BUT I ask the particle BUT
When measured in the 0/1 basis, When measured in the +/- basis,
it will be found as it will be found as
“0” OR “1” “+” OR “-”
randomly randomly
Stuff to Recall
Measurement asks the photon a question
When forced to answer, the quantum state can change
OK, so how do we apply this?
Quantum Key Distribution
• Secret keys and the one-time pad
• The BB84 quantum protocol
• The no-cloning theorem
• Implementations of BB84
Keys and Security
Alice Bob
Secure
channel
Alice and Bob use a secure channel to share
identical copies of a key
Keys and Security
Alice Bob
Secure
channel
An eavesdropper
can see the safe,
but can’t open it
without the key
Public
channel
Keys
• In real life, the key is information (i.e. Binary string)
• Alice and Bob have the information, but the eavesdropper doesn’t
Safe Door Lock SecretCode
Secret Code
Key: The PIN Number Key:pins
Key: Which ??? to press Key: Translation back to English
Key: ???
The Caesar Cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
G H I J K L M N O P Q R S T U V W X Y Z A B C D E F
Encrypt Decrypt
HELLO NKRRU HELLO
= 6 letter shift
= NKRRU ciphertext
Big Problem!
Many apps and websites are
If you know one encrypted letter,
active that can crack theses
you know the whole message!
The Substitution Cipher
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Z T W B M Q K I N V H J U O X C S P G A R F L Y E D Random shuffle
of the alphabet
Encrypt Decrypt
HELLO IMJJX HELLO
= 26 random substitutions
= IMJJX ciphertext
Now have to test many more possibilities Context: US domestic policy
26! ~ 400 trillion trillion What could this ciphertext mean?
Still a big problem! ABCCBCCBDDB
Once we crack a piece of the puzzle,
we can crack the whole thing MISSISSIPPI
The One-Time Pad (aka Vernam cipher)
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
L M N O P Q R S T U V W X Y Z A B C D E F G H I J K
Q R S T U V W X Y Z A B C D E F G H I J K L M N O P
A different
M N O P Q R S T U V W X Y Z A B C D E F G H I J K L Caesar cipher
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C for each letter
U V W X Y Z A B C D E F G H I J K L M N O P Q R S T
Encrypt Decrypt
HELLO SUXOI HELLO
= 5 random shifts
= SUXOI ciphertext
History of One-Time Pad
• First described in 1882
• Rediscovered by
Vernam in 1917
• Widely used in the
World Wars
NSA DIANA one time pad - One-time pad - Wikipedia
The One-Time Pad
Message 01101000 Cipher 00100001
Key 01001001 Key 01001001
Cipher 00100001 Message 01101000
Key Bit
0 1 Alice and Bob share a long random binary string
0 0 1
Message Bit Encode and decode by adding mod 2 (XOR)
1 1 0
The One-Time Pad
Message 01101000 Cipher 00100001
Key 01001001 Key 01001001
Cipher 00100001 Message 01101000
8-bit key
28 possible keys
Number of possible keys = Number of possible messages
Perfectly secure!
But we’re forgetting something…
One-Time Pad Big-Time Problem
Alice Bob
EVE
How do Alice and Bob securely share the key
in the first place?
A Quantum Solution
Alice and Bob generate the key by sending
polarization-encoded photons to each other
A Quantum Solution Remember the three
polarizers?
EVE
If the eavesdropper intercepts,
they’ll disturb the polarization state
Polarization Qubits
H/V measurement A/D measurement
H for sure random
V for sure random
Encode binary “0” or “1” as a polarization state, random D for sure
with two possible bases
random A for sure
How To Measure Polarization
A polarizing beamsplitter diverts each polarization in a different direction
Putting a detector in each path works as an H/V measurement
By rotating the PBS, we can perform a D/A measurement, or any other angle
Question
Break
The BB84 Protocol
The BB84 Protocol
Step 7 Step 4
Step 1 Bob randomly chooses
Repeat and repeat until a long, random binary string is built
Alice chooses a measurement basis
“0” or “1” randomly
Step 2 Step 5
Alice chooses the Bob records the result
H/V or D/A basis randomly Step 3 of his measurement
Alice encodes the appropriate qubit
and sends it to Bob as a single photon
“0” “1”
“0” Step 6 “D/A”
Alice and Bob publicly announce which bases they used, “0”
“D/A” keeping their bit values secret
Alice’s Lab I used the I used the Bob’s Lab
“D/A” basis “D/A” basis
BB84 Example
1. Alice chooses a RANDOM bit 0 1 1 1 0 0 1 0 1
2. Alice chooses a RANDOM basis
3. Alice send the state to Bob
4. Bob measures in a RANDOM basis
R R R R
5. Bob records the bit 0 R 1 1 R 0 1 R R
6. Alice and Bob announce the basis
Alice and Bob are performing the BB84 protocol.
In some of the rounds their basis selection doesn’t match and
results in a random measurement for Bob. What should Alice
and Bob do to these cases to ensure they share the same key?
A. Discard these rounds B. Alice shares what she sent
C. XOR the random cases D. Keep them and try to correct for
errors later
E.
They can simply discard them
Try RSA instead with no consequence to security
BB84 Example
0 1 1 1 0 0 1 0 1
Basis Reconciliation
Alice and Bob discard all bits
where their bases didn’t match
This leaves them with the secret key
01101
R R R R
What if there’s
an eavesdropper? 0 R 1 1 R 0 1 R R
0 1 1 1 0 0 1 0 1
R R R R
0 1 R 1 R 0 R R 1
R R R R R R
0 R R 1 R 0 R R R
Catching Eve
• If Alice and Bob make truly random basis choices,
Eve will guess wrong half the time
• Half of the time Eve guesses wrong, they will introduce an
error
• Therefore, an always-present eavesdropper
will introduce an error rate of 25%!
What is the approximate probability that an eavesdropper can
measure 100 qubits without introducing a single error?
A. One in 100 B. One in one million
C. One in one billion D. One in one trillion
E. Absolute 0%
Error Estimation and Correction
Parity Check
See if addition of neighbouring bits
(modulo 2)
matches over the whole string
1 0 0 1 1 0 1 0 0 1 0 1 “Raw” Key “Raw” Key 1 0 0 1 1 0 1 1 0 1 0 1
Communicate Publicly
1 0 1 0 1 0 0 0
Discard sets with errors
0 0 1 0 0 1 & 0 0 1 0 0 1
One bit from each
correct set
0 0 1 0 0 1 to maintain secrecy 0 0 1 0 0 1
Final Key Final Key
Privacy Amplification
What if the eavesdropper didn’t measure every time?
Could they have some partial information?
How do we distinguish that possibility from systematic errors?
• We must assume that all errors come from a potential eavesdropper!
• If the error rate is greater than 11%, no secret key is possible*
• If smaller than 11%, we can keep shrinking the key via parity checks
until Eve has no information about the key left
• The higher the error rate, the less key we get to keep at the end of the day
Examples:
With an error rate of 4% and a 2,000 bit raw key, we can keep ~750 secret bits
With an error rate of 8% and a 2,000 bit raw key, we can keep ~100 secret bits
*proof a bit complicated, see Shor & Preskill, Phys. Rev. Lett 85, 441 (2000).
A Loophole?
• Alice and Bob are generating a random key which they will use
to encrypt future secret messages
• The only quantum part is the qubit transmission,
all the rest is classical post-processing
• But what if Eve can make a copy of the bits?
The No-Cloning Theorem
There exists no unitary
which can create a
perfect copy of
an unknown quantum state
W.K. Wootters & W.H. Zurek,
Nature 299, 802
(1982)
What will our “cloning machine” do
if given the state |+⟩?
A. |+⟩|+⟩
B. |+⟩|−⟩
C. |0⟩|0⟩ + |1⟩|1⟩ / 2 D. |0⟩|1⟩ + |1⟩|0⟩ / 2
E. None of the above
The No-Cloning Theorem
There exists no unitary
which can create a
perfect copy of
an unknown quantum state
W.K. Wootters & W.H. Zurek,
Nature 299, 802
(1982)
The Heart of QKD
Measurement Disturbance The No-Cloning Theorem
When we measure a quantum state,
we disturb it
Assumptions, classical channel is authenticated
(Eve can’t pretend to be Alice or Bob)
So what do we need in the lab?
• Single photon sources
• Very difficult
• Often use a very weak laser, which has a single photon on average
• Single photon detectors
• Getting better and better, but expensive
• Sometimes possible to hack, ruining security
• Ways to control photon polarization
• Half-wave plates for polarization rotations, polarizing beam-splitters for measurement
• Or encode qubits in an entirely different degree of freedom, like time
• A channel for single photons
• Can use optical fiber, just like telecommunications
• Can use free-space channels or even satellite links
Hacking QKD
QKD security is guaranteed by the laws of physics!
But compromised by the reality of engineering
“unconditionally secure against any
eavesdropper who happened to be deaf.” (G.
Brassard, 2006)
The Original QKD Demonstration
The Photon-Number Splitting Attack
• The easiest way to make photons: a weak laser beam
LASER
• Impossible to always have one photon using this scheme
• Multi photons = same polarization state
• Eve can take advantage to learn the bit without disturbing!
The Photon-Number Splitting Attack
Number
Measurement Storage
ALICE BOB
EVE
Laser 0
1
Logic
1. Alice sends a pulse, with average photon number < 1
2. Eve counts photons in the pulse
a) If photons = 1, Eve blocks the pulse
b) If photons > 1, Eve stores one and sends the rest to Bob
3. When Alice and Bob communicate basis information, Eve measures her stored photons in the correct basis and gets
all information
4. If loss introduced by Eve < expected system loss, Alice and Bob notice nothing
The Decoy State Protocol
Number
Measurement
ALICE BOB
EVE
Laser 0
1
Logic
1. Alice now sends pulses of different average photon number
2. Eve still blocks pulses with only one photon, meaning she selectively blocks pulses with lower average photon
number!
3. By comparing how many pulses arrive for different sizes of pulses, Alice and Bob can detect the photon number
splitting attack
Detector Control Attack
EVE
Bob
evilBob
Alice 1 1
1 1
• If Eve can control Bob’s detectors, they can make sure
Bob always sees the same results as them
• Most if not all photon detectors could be vulnerable
Is this level really the problem?
Business Insider 2018 Jan 16,
“A password for the Hawaii emergency agency was hiding in a public photo, written on a Post-it note.”
Well, maybe someday…
Quantum Key Distribution
Try the simulator
by St. Andrew’s University
st-Andrews.ac.uk/physics/quvis
Quantum Cryptography (B92)
Many slides stolen from:
- Evan Meyer-Scott
- Electra Eleftheriadou
- Martin Laforest
Other types of protocols
• Six state
• Three bases instead of only two
• How does this help?
• Time bin
• Different encoding
• Do not always have to use polarization
• Entanglement based
• Why not add more Quantum?
There is much more to QKD