0% found this document useful (0 votes)
113 views29 pages

Seminar Report

The technical seminar report by Syed Tarooq Afnan discusses the challenges and opportunities in quantum cryptography, emphasizing its potential for secure communications through Quantum Key Distribution (QKD). Despite facing limitations such as transmission distances and environmental sensitivity, quantum cryptography promises significant applications across various sectors. The report outlines various quantum protocols and highlights the importance of ongoing research to address the challenges posed by future quantum computing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views29 pages

Seminar Report

The technical seminar report by Syed Tarooq Afnan discusses the challenges and opportunities in quantum cryptography, emphasizing its potential for secure communications through Quantum Key Distribution (QKD). Despite facing limitations such as transmission distances and environmental sensitivity, quantum cryptography promises significant applications across various sectors. The report outlines various quantum protocols and highlights the importance of ongoing research to address the challenges posed by future quantum computing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

“Jnana Sangama”, Belagavi-590018, Karnataka

A Technical Seminar Report on

“Challenges and opportunities in quantum


cryptography”

Submitted in partial fulfillment of the requirement for the award of degree of


Bachelor of Engineering
In
Computer Science and Engineering
Submitted by

SYED TAROOQ AFNAN (4NN20CS054)


Under the Guidance of
Dr. GOWTHAM M
Assistant Professor
Dept. of CSE

Department of Computer Science and Engineering


NIE Institute of Technology, Mysuru
2023-24
NIE INSTITUTE OF TECHNOLOGY
#50(part), Hootagalli Industrial area, Koorgalli Village Mysuru-18

Department Of Computer Science and Engineering


CERTIFICATE
This is to certify that the technical seminar entitled “CHALLENGES AND
OPPORTUNITIES IN QUANTUM CRYPTOGRAPHY” is carried out by Syed Tarooq
Afnan bearing 4NN20CS054 in the partial fulfillment for the Eight semester of Bachelor of
Engineering degree in Computer Science and Engineering of the Visvesvaraya
Technological University, Belagavi during the academic year 2023-24. The technical seminar
report has been approved as it satisfies the academic requirements with respect to seminar work
prescribed for the Bachelor of Engineering Degree.

Signature of the guide Signature of the HOD


Dr. Gowtham M Dr. Usha M S
Asst. Professor, Asst. Professor & Head,
Dept. of CS & Engineering Dept. of CS & Engineering
NIEIT, Mysuru NIEIT, Mysuru
ACKNOWLEDGEMENT

We sincerely owe our gratitude to all people who helped and guided us in
completing this technical seminar.

We are thankful to Dr. Rohini Nagapadma, Principal, NIEIT, Mysuru, for having
supported us in our academic endeavors.

We are thankful to Dr. Usha M S, Associate Professor and Head, Department of


Computer Science and Engineering, NIEIT for providing us timely suggestion,
encouragement and support to complete this technical seminar.

We would like to sincerely thank our project guide, Dr. Gowtham M, Asst. Professor
in Dept. of Computer Science and Engineering for providing relevant information, valuable
guidance and encouragement to complete this technical seminar.

We would also like to thank all our teaching and non-teaching staff members of the
Department. I am grateful to my college for keeping labs open whenever required and
providing me the systems and the required software.

We are always thankful to our Parents for their valuable support and guidance in
every step. Also thank all our friends for their support and guidance throughout the
technical seminar.

We express our deepest gratitude and indebted thanks to NIEIT which has
provided us an opportunity in fulfilling our most cherished desire of reaching our goal.

Yours Sincerely,
Syed Tarooq Afnan (4NN20CS054)
ABSTRACT

Quantum cryptography represents a groundbreaking approach to secure communications,


leveraging the principles of quantum mechanics to offer theoretically unbreakable encryption.
This technology, while promising unparalleled security through Quantum Key Distribution
(QKD) and the detection of eavesdroppers, faces challenges such as limited transmission
distances, environmental sensitivity, high implementation costs, and potential vulnerabilities
posed by future quantum computers. Despite these hurdles, the opportunities for quantum
cryptography are vast, with potential applications across various sectors including
telecommunications, finance, defence and healthcare, promising a new era of secure
communication. This seminar abstract explores the balance between the inherent challenges
and the transformative opportunities of quantum cryptography, highlighting its significance in
the evolving landscape of digital security.
TABLE OF CONTENTS
ACKNOWLEDGEMENT Page No
ABSTARCT

Chapter 1 Introduction 1-4


1.1 Introduction to Quantum Cryptography 1-2
1.2 Introduction to QKD 2
1.3 Quantum Cryptography Protocols 2-4
1.4 Quantum Cryptography Basics 4

Chapter 2 Overview 5-11


2.1 Classical vs Quantum Cryptography 5-6
2.2 Fundamentals of Quantum Mechanics 6-7
2.3 Quantum States 7-9
2.4 Quantum Key Distribution 9-11

Chapter 3 Implementation 12-15


3.1 Qiskit and its Components 12-13
3.2 BB84 protocol using Qiskit 13-15

Chapter4 Applications 16-17


4.1 Secure Communication 16
4.2 Data Encryption 16
4.3 Critical Infrastructure 16-17
4.4 IoT Security 17

Chapter 5 Challenges and Opportunities 18-22


5.1 Challenges in Quantum Cryptography 18-19
5.2 Scaling Quantum Cryptography 19-20
5.3 Opportunities in Quantum Cryptography 21-22

Chapter 6 Conclusion 23

Bibliography 24
Challenges and Opportunities in Quantum Cryptography 2023-24

CHAPTER 1
INTRODUCTION

1.1 Introduction to Quantum Cryptography:


Quantum cryptography is a branch of cryptography that utilizes the principles of quantum
mechanics to secure communication channels and exchange cryptographic keys. Unlike
classical cryptography, which relies on mathematical algorithms, quantum cryptography
leverages the fundamental properties of quantum mechanics, such as superposition and
uncertainty, to achieve security. In the ever-evolving landscape of cybersecurity, quantum
cryptography emerges as a beacon of promise, offering a paradigm shift in how we secure
communication and data transmission. Unlike classical cryptographic methods reliant on
complex algorithms, quantum cryptography harnesses the fundamental principles of quantum
mechanics to create cryptographic systems that are theoretically unbreakable, even in the face
of increasingly powerful computational resources. At its core, quantum cryptography leverages
the unique properties of quantum mechanics, such as superposition, entanglement, and
uncertainty, to achieve secure communication. Unlike classical bits, which can only exist in
states of 0 or 1, quantum bits or qubits can exist in multiple states simultaneously due to
superposition. This property allows for the creation of encryption keys that are inherently
random and unpredictable, providing a level of security unattainable with classical methods.
One of the most significant advancements enabled by quantum cryptography is Quantum Key
Distribution (QKD), a protocol for securely exchanging cryptographic keys between parties.
Unlike classical key exchange methods, which are vulnerable to interception, QKD detects any
eavesdropping attempts, ensuring the confidentiality and integrity of the exchanged keys.

The potential applications of quantum cryptography are vast and varied, ranging from secure
communication in government and military settings to protecting sensitive financial
transactions and personal data. As our reliance on digital communication and data transmission
continues to grow, the need for robust security measures becomes increasingly critical.
Quantum cryptography offers a path towards achieving this goal, promising secure
communication channels that are resistant to even the most advanced cyber threats. However,
despite its immense potential, quantum cryptography is not without its challenges. Practical
implementation issues, such as the limitation of transmission distances and environmental
factors affecting quantum states, present significant hurdles that must be addressed. Moreover,

Dept of CSE Page 1 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

the looming threat of quantum computers capable of breaking current cryptographic algorithms
underscores the need for ongoing research and development in this field. In conclusion,
quantum cryptography represents a groundbreaking approach to cybersecurity, offering
unparalleled security and privacy in an increasingly digital world. As research and technology
continue to advance, quantum cryptography holds the promise of revolutionizing how we
protect sensitive information and secure communication channels, ushering in a new era of
digital security.

1.2 Introduction to Quantum Key Distribution (QKD):


Quantum Key Distribution (QKD) represents a pioneering advancement in the realm of
cryptography, offering a fundamentally secure method for exchanging cryptographic keys
between two parties. At the heart of QKD lies the BB84 protocol, a groundbreaking quantum
cryptographic algorithm devised by Charles Bennett and Gilles Brassard in 1984.

Quantum Key Distribution (QKD) is a cryptographic protocol that leverages the principles of
quantum mechanics to facilitate the secure exchange of cryptographic keys between two
parties, commonly referred to as Alice and Bob. The primary objective of QKD is to establish
a secret key that can subsequently be used for encrypting and decrypting messages, ensuring
the confidentiality and integrity of communication channels. Unlike traditional cryptographic
methods, which rely on the computational complexity of mathematical algorithms, QKD
harnesses the inherent uncertainty of quantum mechanics to achieve security. By encoding
information into quantum states, typically represented by particles of light (photons), QKD
enables the detection of any attempted eavesdropping, thereby guaranteeing the secrecy of the
exchanged key.

1.3 Quantum Cryptography protocols:


Quantum cryptography encompasses various protocols designed to secure communication
channels and exchange cryptographic keys using the principles of quantum mechanics. Some
of the most prominent quantum cryptography protocols include:

1. BB84 Protocol: Developed by Charles Bennett and Gilles Brassard in 1984, the BB84
protocol is one of the earliest and most well-known quantum key distribution (QKD)
protocols. It relies on the transmission of photons with specific polarizations to encode
binary information. The protocol involves Alice randomly preparing a sequence of

Dept of CSE Page 2 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

qubits (photons) in one of two polarization bases and sending them to Bob. Bob
measures each qubit's polarization along one of two possible bases. After comparing
measurement bases, Alice and Bob can distill a secret key from their correlated
measurement outcomes.
2. E91 Protocol: Proposed by Artur Ekert in 1991, the E91 protocol utilizes the
phenomenon of quantum entanglement to establish a secret key between two parties,
typically referred to as Alice and Bob. In the E91 protocol, Alice prepares pairs of
entangled particles (such as photons) and sends one particle to Bob while retaining the
other. Bob measures the state of his particle in randomly chosen bases. By comparing
their measurement choices, Alice and Bob can establish a secure key. The E91 protocol
provides a high level of security against eavesdropping due to the non-local correlations
inherent in entangled quantum states.
3. SARG04 Protocol: The SARG04 (Semi-Quantum Symmetric-key Authentication
Revisited) protocol is designed for authentication purposes in quantum communication
networks. Proposed by Deng, Long, and Liu in 2004, this protocol utilizes a semi-
quantum scheme, allowing classical parties to authenticate quantum messages without
possessing full quantum capabilities. It employs a quantum key distribution (QKD)
process combined with classical cryptographic techniques to ensure secure
authentication.
4. B92 Protocol: The B92 protocol, introduced by Bennett in 1992, is a simplified version
of the BB84 protocol that uses only two nonorthogonal quantum states for encoding
information. This simplification reduces the complexity of the quantum system while
still providing a secure key exchange protocol. However, the B92 protocol is more
susceptible to certain types of attacks compared to its predecessor, BB84.
5. Coherent One Way Protocol: Proposed by Bennett and Brassard in 1984, the
Coherent One Way (COW) protocol relies on the transmission of coherent states of
light to establish secure communication. It operates similarly to the BB84 protocol but
utilizes coherent states instead of single photons. The COW protocol offers advantages
in terms of implementation simplicity and efficiency but may be more susceptible to
certain types of attacks.

These protocols represent just a few examples of the diverse range of quantum cryptography
protocols developed to address specific security requirements and operational constraints. As
quantum cryptography continues to evolve, new protocols and enhancements to existing ones

Dept of CSE Page 3 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

are likely to emerge, further advancing the field's capabilities in securing communication
channels and protecting sensitive information.

1.4 Quantum Cryptography Basics:

• Qubits: The fundamental unit of quantum information is the qubit, analogous to the bit
in classical computing. Unlike a classical bit, which can be either 0 or 1, a qubit can be
in a state representing 0, 1, or both simultaneously, thanks to superposition. This allows
quantum computers to process information in a fundamentally different way from
classical computers.
• Quantum Gates: Quantum gates manipulate qubits in a quantum computer, similar to
how logical gates operate on bits in classical computing. However, quantum gates use
the principles of superposition and entanglement to perform operations on qubits,
enabling complex computations that are beyond the reach of classical computers.
Quantum gates are essential for creating quantum algorithms, including those used for
quantum cryptography and secure communications.

Dept of CSE Page 4 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

Chapter 2
OVERVIEW

2.1 Classical vs Quantum Cryptography :


1. Classical Cryptography :

• Foundation: Classical cryptography relies on complex mathematical algorithms for


encryption and decryption. It includes symmetric encryption (where the same key is
used for both encrypting and decrypting a message) and asymmetric encryption (which
involves public and private keys).
• Security Basis: The security of classical cryptographic systems is based on the
computational difficulty of certain mathematical problems, such as factoring large
prime numbers (used in RSA) or solving discrete logarithm problems (used in ECC).
The assumption is that these problems are infeasible to solve with current classical
computing capabilities within a reasonable amount of time.
• Vulnerabilities: With advancements in computing power, including the potential
development of large-scale quantum computers, many classical cryptographic systems
could become vulnerable. Algorithms that are considered secure today might be easily
broken in the future.
• Adaptability: Classical systems can be updated and new algorithms can be developed
to replace those compromised by technological advancements. However, this requires
widespread agreement and deployment, which can be logistically challenging.

2. Quantum Cryptography :
• Foundation: Quantum cryptography, specifically Quantum Key Distribution (QKD)
like the BB84 protocol, leverages the principles of quantum mechanics to secure
communication channels. It utilizes properties such as superposition and entanglement
to generate and share cryptographic keys.
• Security Basis: The security of quantum cryptography is grounded in the laws of
quantum physics rather than computational complexity. For example, any attempt to
eavesdrop on the quantum channel alters the quantum state of the particles being
observed, which can be detected by the communicating parties. This is due to the no-
cloning theorem and the principle of quantum uncertainty.

Dept of CSE Page 5 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

• Vulnerabilities: Quantum cryptography’s main challenges are not in computational


power but in physical and technical limitations, such as transmission distances and
rates, and sensitivity to environmental conditions. Current implementations of QKD
require high-quality quantum channels and sophisticated detectors, which can be
expensive and technically demanding.
• Adaptability: Quantum cryptography is inherently adaptable to threats from quantum
computing, as its security model does not rely on computational assumptions. However,
the technology to implement quantum cryptography widely is still in development,
requiring significant advances in quantum computing and communication
infrastructure.

3. Comparison Summary :
• Basis of Security: Classical cryptography's security is computational, while quantum
cryptography's security is based on the fundamental laws of quantum mechanics.
• Vulnerabilities: Classical cryptography faces threats from quantum computing,
whereas quantum cryptography's challenges are more about practical implementation
and physical limitations.
• Implementation and Cost: Classical cryptographic techniques are well-understood
and implemented widely at relatively low cost. Quantum cryptography, in contrast,
currently requires specialized equipment and is more expensive to deploy.

Both classical and quantum cryptography have roles to play in the future of secure
communication. While quantum cryptography offers a solution to the threat posed by quantum
computing, classical cryptography remains crucial for many applications due to its ease of use
and implementation. A hybrid approach, utilizing the strengths of each depending on the
context and requirements, might be the most pragmatic way forward.

2.2 Fundamentals of Quantum Mechanics:


Quantum Mechanics is a fundamental theory in physics that describes the physical properties
of nature at the scale of atoms and subatomic particles. Unlike classical mechanics, which
operates under the laws of motion and physical laws observable at a macroscopic level,
quantum mechanics governs the realm of the very small, where the usual rules of physics no
longer apply. It introduces a mathematical framework for understanding the behavior of

Dept of CSE Page 6 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

particles and waves on an atomic scale, providing the foundation for various modern
technologies, including quantum computing and cryptography.

Key Principles

• Superposition: This principle posits that any quantum system can exist in multiple
states or configurations simultaneously until it is observed. For instance, a quantum bit
or qubit can represent a 0, a 1, or any quantum superposition of these states, leading to
complex computational and encryption processes that are not possible with classical
bits.
• Entanglement: Quantum entanglement is a phenomenon where particles become
interconnected in such a way that the state of one (no matter the distance) can instantly
influence the state of another. This property is at the heart of quantum cryptography,
enabling unprecedented security protocols. If an eavesdropper attempts to intercept a
quantum communication, the entanglement is disturbed, and the intrusion can be
detected immediately.
• Uncertainty Principle: Articulated by Werner Heisenberg, this principle states that it
is impossible to simultaneously know both the exact position and the exact velocity of
a particle. This inherent uncertainty in quantum mechanics leads to secure
cryptographic methods where an eavesdropper cannot precisely determine the quantum
state of a system without altering it and thereby revealing their presence.

2.3 Quantum States:


A quantum state represents a set of mathematical variables that describe the properties of a
quantum system. In more technical terms, it's often represented by a wave function, denoted as
Ψ (Psi). This wave function contains all the information about the system's possible states and
how likely they are to be observed. However, unlike classical states, which give definitive
properties, a quantum state provides probabilities for the outcome of measurements of those
properties. The concept of superposition is fundamental to quantum states. A particle in a
superposition state can be in multiple states simultaneously. For instance, a qubit—the quantum
version of a classical bit—can be in a state representing 0, 1, or any combination of both until
it is measured. This doesn't mean it is 0 and 1 at the same time in the classical sense, but rather
that it exists in a state that will only resolve to 0 or 1 upon measurement.

Dept of CSE Page 7 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

When discussing quantum states, especially in the context of quantum cryptography such as
the BB84 protocol, you'll often encounter terms like "rectilinear" and "diagonal" states. These
terms refer to two different bases in which a qubit can be prepared and measured.
Understanding these bases is crucial for grasping how quantum key distribution (QKD)
protocols work, ensuring secure communication by leveraging the principles of quantum
mechanics.

• Rectilinear Basis: The rectilinear basis (also known as the computational or standard
basis) consists of two orthogonal states typically represented by |0⟩ and |1⟩. In the
context of photon polarization, which is a common physical realization for qubits in
quantum cryptography, the rectilinear basis corresponds to two perpendicular
polarization directions:

|0⟩ could represent vertical polarization.

|1⟩ could represent horizontal polarization.

This basis is called "rectilinear" because it involves straight-line orientations. In diagrams or


visualizations, these states are often depicted using arrows pointing up for |0⟩ (vertical) and
arrows pointing right for |1⟩ (horizontal).

• Diagonal Basis: The diagonal basis consists of states that are superpositions of the
rectilinear basis states, leading to two other orthogonal states typically denoted as |+⟩
and |−⟩. In the photon polarization analogy, these correspond to polarizations at 45
degrees:

|+⟩ represents polarization at a +45-degree angle.

|−⟩ represents polarization at a -45-degree (or 135-degree) angle.

This basis is termed "diagonal" because the orientations are diagonal with respect to the
rectilinear basis, bridging the gap between the vertical and horizontal. Visually, these might be
represented by arrows pointing diagonally up and to the right for |+⟩, and diagonally down and
to the right for |−⟩.

Dept of CSE Page 8 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

Figure 2.3.1 (Quantum channel with basis)

In QKD protocols like BB84, these two bases are used for encoding, transmitting, and
measuring quantum bits (qubits). The security of the protocol partly relies on the fact that a
measurement made in one basis cannot accurately predict the state of a qubit encoded in the
other basis. For example, if Alice sends a qubit encoded in a diagonal state, and Bob measures
it in the rectilinear basis, there's a 50% chance he'll incorrectly infer the state of the qubit. This
property is exploited to detect eavesdroppers, who, by measuring qubits, unavoidably introduce
errors into the communication, revealing their presence. The choice between rectilinear and
diagonal bases in quantum cryptography allows for a secure method of key distribution,
ensuring that any attempt at interception can be detected by the legitimate parties involved in
the communication. This setup takes advantage of the quantum mechanical principle that
observing or measuring a quantum system inevitably alters its state.

2.4 Quantum Key Distribution (QKD):

Quantum Key Distribution (QKD) is a cutting-edge method for securing communication,


leveraging the principles of quantum mechanics to ensure the secure exchange of
cryptographic keys between two parties, commonly referred to as Alice and Bob. The process
allows them to detect any presence of an eavesdropper, Eve, attempting to intercept or listen
in on their communication. A well-known protocol for QKD is the BB84 protocol, developed
by Charles Bennett and Gilles Brassard in 1984.

Dept of CSE Page 9 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

1. Encoding
• Alice's Preparation: Alice prepares a sequence of qubits (quantum bits) to send to
Bob. Each qubit is encoded in one of two bases, chosen at random: the rectilinear basis
(with states |0⟩ and |1⟩) or the diagonal basis (with states |+⟩ and |-⟩). For each qubit,
she also randomly chooses one of the two possible states within the selected basis for
encoding.

2. Transmission
• Sending Qubits: Alice sends the prepared sequence of qubits to Bob through a
quantum communication channel.

3. Measurement
• Bob's Measurement: Without knowing Alice's choice of basis for each qubit, Bob
randomly chooses a basis (either rectilinear or diagonal) to measure each incoming
qubit. He records the outcome of his measurements and the basis used for each.

4. Basis Reconciliation
• Sharing the Basis: After Bob has measured all the qubits, Alice and Bob communicate
over a classical channel (which can be public) to share the bases used for each qubit,
without revealing the actual measurement outcomes.
• Discarding Mismatched Bases: Alice and Bob discard any bits from their records
where they used different bases, keeping only the bits where they happened to choose
the same basis. Ideally, if there was no interference, these bits should match.

5. Error Rate Estimation


• Sample Comparison: To check for the presence of eavesdropping, Alice and Bob
compare a random subset of their remaining bits over the classical channel. If the error
rate (the percentage of mismatched bits) is above a certain threshold, they assume the
presence of an eavesdropper and abort the key generation process.
• Discarding Sampled Bits: The bits used for error rate estimation are discarded to
ensure they're not used in the final key, as they've been revealed publicly.

Dept of CSE Page 10 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

6. Key Generation
• Final Key: If the error rate is below the threshold, indicating that no eavesdropping is
detected, the remaining, unrevealed bits form the shared secret key. This key can then
be used for secure communication using classical cryptographic methods.

Figure 2.4.1 (Transmission using QKD)

Dept of CSE Page 11 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

Chapter 3
IMPLEMENTATION

3.1 Qiskit and its Components:


Qiskit is an open-source quantum computing software development framework
provided by IBM. It allows users to design quantum circuits, simulate them, and run them on
actual quantum computers provided by IBM Quantum Experience. Below, the key components
and concepts related to Qiskit that were utilized in the BB84 protocol example are:

1. Qiskit Modules:
• Terra: The foundation of Qiskit that provides the tools to compose quantum programs
at the level of circuits and pulses.
• Aer: Simulates quantum circuits and provides the backend support for running these
simulations. It's designed to be highly configurable and to emulate the behavior of real
quantum hardware.
• Ignis: Offers tools for quantum hardware verification, noise characterization, and error
correction.
• Aqua: Built on top of Terra and provides higher-level algorithms for quantum
computing applications, such as quantum machine learning and quantum chemistry
(Note: Aqua has been deprecated and its functionalities are being integrated into the
other components).

2. Quantum Circuit:
• The basic structure for creating quantum algorithms in Qiskit. It consists of qubits
(quantum bits) for processing quantum information and classical bits for storing
measurement results.

3. Gates and Measurement:


• X Gate: A quantum gate that flips the state of a qubit, equivalent to the classical NOT
gate.
• Hadamard (H) Gate: Puts a qubit into a superposition state, making it equally likely
to be measured as 0 or 1 if it was initially in the 0 state.

Dept of CSE Page 12 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

• Measurement: The process of collapsing a qubit’s quantum state to a classical bit. In


Qiskit, measurements are added to the circuit to read the state of qubits at the end of
computation.

4. Backend:
• The backend represents the quantum device or simulator that will execute the quantum
circuits. Aer.get_backend('qasm_simulator') is used to simulate a quantum circuit
that includes measurements.

5. Executing a Circuit:
• execute: A function in Qiskit used to run circuits on a specified backend. It can take
parameters like the number of shots, which is the number of times the circuit is run to
get statistical outcomes.
• shots: Represents how many times the quantum circuit is executed. More shots result
in more data to statistically analyze the results.
• memory: When set to True, the individual results of each shot are returned, allowing
for a detailed examination of the measurements.

6. Result and Analysis:


• Results: After execution, the results can be analyzed to get the quantum state
measurements or other forms of output data.
• plot_histogram: A utility from Qiskit's visualization tools that can graphically
represent the outcome probabilities of different quantum states.

3.2 Implementing BB84 Protocol in Python using Qiskit :


The BB84 protocol is a quantum key distribution scheme developed in 1984 by Charles Bennett
and Gilles Brassard. It allows two parties, Alice and Bob, to create a shared, secret key over an
insecure channel, which can then be used for secure communication. The security of the
protocol is based on the principles of quantum mechanics, specifically the no-cloning theorem
and the Heisenberg uncertainty principle.

Dept of CSE Page 13 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

Alice randomly chooses a basis (either Z or X, represented here as 0 or 1) to encode each bit.
If she chooses the Z-basis (standard computational basis) and the bit is 1, she applies an X
(NOT) gate to flip the qubit state to |1>. For the X-basis, she applies a Hadamard (H) gate to
prepare the qubit in a superposition, and if the bit is 1, she also flips it with an X gate. The
barrier is used as a visual aid and has no effect on the actual logic.

Bob independently chooses his measurement bases without knowing Alice's choices. If he
decides on the X-basis, he applies a Hadamard gate before measuring. The qubits are then

Dept of CSE Page 14 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

measured. encoding_circuit.measure(range(10),range(10)) adds measurement


operations to the quantum circuit for all 10 qubits. The measurement outcomes will be stored
in corresponding classical bits.The quantum circuit is then executed on the Qiskit Aer simulator
using execute. Since the aim is to generate a single instance of the key, it's done with only one
shot (shots=1). The memory=True argument is used to retrieve the individual measurement
outcomes. results.get_memory()[0] retrieves the measurement outcomes from the
simulation results. Each outcome corresponds to the measurement result of a qubit.

• For each qubit index i in the range 0 to 9:


o If Alice's basis matches Bob's basis (alice_bases[i] == bob_bases[i]), it
implies that Alice and Bob measured the qubit in the same basis.
o In this case, the measurement outcome (measured_bits[i]) is appended to the
key list.

The generated secret key, stored in the key list, is printed to the console.

Overall, this part of the code simulates Bob's measurements on the qubits prepared by Alice,
applies appropriate gates for measurement in the chosen bases, executes the quantum circuit to
obtain measurement outcomes, and extracts a secret key based on matching measurement bases
between Alice and Bob.

Dept of CSE Page 15 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

Chapter 4

APPLICATIONS OF QUANTUM CRYPTOGRAPHY

4.1 Secure Communication:


Quantum cryptography serves as a formidable tool in ensuring secure communication across
various domains, ranging from government and military operations to commercial transactions.
By harnessing the principles of quantum mechanics, particularly the properties of superposition
and entanglement, quantum cryptography enables the exchange of cryptographic keys with
unprecedented security guarantees. Unlike classical cryptographic methods, which rely on
computational complexity, quantum cryptography leverages the fundamental laws of physics
to detect any interception or tampering attempts. This ensures that communication channels
remain confidential, authentic, and resistant to eavesdropping attacks. Secure communication
facilitated by quantum cryptography has profound implications for safeguarding sensitive
information, protecting privacy, and maintaining trust in digital interactions.

4.2 Data Encryption:


In addition to facilitating secure communication, quantum cryptography plays a crucial role in
data encryption, ensuring the confidentiality and integrity of sensitive information. Quantum
encryption techniques leverage quantum key distribution (QKD) protocols to generate and
exchange encryption keys that are theoretically unbreakable by any computational means,
including future advancements in quantum computing. This enables organizations to protect
financial transactions, intellectual property, personal data, and other critical information assets
from unauthorized access or manipulation. Quantum encryption offers a robust defense against
sophisticated cyber threats, providing a foundation for building resilient cybersecurity
architectures in an increasingly interconnected and digitized world.

4.3 Critical Infrastructure:


Quantum cryptography can secure the communication networks underlying critical
infrastructure, such as power grids, transportation systems, and healthcare networks. These
infrastructure systems are essential for the functioning of modern societies and are increasingly
reliant on digital communication for their operation and management. By implementing
quantum cryptographic solutions, organizations can mitigate the risk of cyberattacks targeting

Dept of CSE Page 16 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

critical infrastructure, which could have far-reaching consequences, including disruptions to


essential services, financial losses, and threats to public safety. Quantum cryptography
provides a means to establish secure and resilient communication channels, safeguarding the
integrity and availability of critical infrastructure assets.

4.4 Internet of Things (IoT) Security:


The Internet of Things (IoT) presents a vast array of interconnected devices, from smart home
appliances to industrial sensors, revolutionizing various industries. However, the proliferation
of IoT devices also brings significant security challenges, including the risk of data breaches
and cyberattacks. Quantum cryptography emerges as a promising solution to bolster the
security of IoT ecosystems by providing unbreakable encryption keys through quantum key
distribution (QKD) protocols. By leveraging quantum principles such as superposition and
entanglement, IoT devices can establish secure communication channels, ensuring the
confidentiality and integrity of data transmitted within IoT networks. Quantum cryptography
not only enhances the security of IoT deployments but also enables secure authentication and
access control mechanisms for IoT devices. With quantum cryptographic techniques integrated
into IoT security frameworks, organizations can enforce stringent access policies and prevent
unauthorized manipulation of IoT data. This ensures the reliability and trustworthiness of IoT-
enabled services and applications across diverse industries, including healthcare,
transportation, energy, and manufacturing. As IoT continues to evolve, the adoption of
quantum cryptographic solutions will play a pivotal role in safeguarding sensitive data and
mitigating emerging threats in the interconnected world of IoT.

Dept of CSE Page 17 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

Chapter 5

CHALLENGES AND OPPORTUNITIES

5.1 Challenges in Quantum Cryptography:


1. Distance Limitations:
One of the primary challenges facing quantum cryptography is the limitation on transmission
distances for quantum signals. Quantum communication channels, typically implemented
using optical fibers or free-space links, suffer from signal degradation over long distances due
to factors such as attenuation and dispersion. As a result, the effective range of quantum key
distribution (QKD) protocols is currently limited to a few hundred kilometers using
conventional fiber-optic cables. To overcome this challenge, researchers are exploring
alternative approaches, including satellite-based quantum communication, which offers the
potential for global-scale quantum networks capable of secure communication over vast
distances.

2. Environmental Sensitivity:
Quantum systems are highly sensitive to environmental factors such as temperature
fluctuations, electromagnetic interference, and mechanical vibrations. These external
disturbances can degrade the performance of quantum devices, leading to errors in quantum
operations and compromising the security of quantum cryptographic protocols. Achieving
stable and robust quantum communication in real-world environments requires sophisticated
error-correction techniques and the development of quantum hardware resilient to
environmental noise. Additionally, efforts are underway to establish standardized protocols for
characterizing and mitigating environmental effects on quantum systems to ensure the
reliability and security of quantum cryptography in diverse operating conditions.

Dept of CSE Page 18 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

3. Cost and Complexity:


Implementing quantum cryptography systems involves significant costs and complexity,
posing barriers to widespread adoption. Quantum hardware, including single-photon sources,
detectors, and quantum memories, remains expensive and technologically challenging to
manufacture at scale. Moreover, deploying and maintaining quantum communication
infrastructure requires specialized expertise and resources, further contributing to the overall
cost and complexity of quantum cryptographic deployments. Addressing these challenges will
require continued advancements in quantum technology, as well as efforts to streamline
manufacturing processes and develop user-friendly solutions that enable broader accessibility
and affordability of quantum cryptographic systems.

4. Quantum Computer Threat:


While quantum cryptography offers unparalleled security against classical cryptographic
attacks, it is not immune to threats posed by quantum computers. Large-scale quantum
computers have the potential to break existing quantum cryptographic protocols, such as those
based on the discrete logarithm and integer factorization problems. As quantum computing
technology advances, the cryptographic community must develop and deploy quantum-
resistant encryption algorithms capable of withstanding attacks from quantum adversaries.
This requires proactive research and standardization efforts to identify and implement post-
quantum cryptographic primitives that can maintain the security of quantum communication
networks in the face of emerging quantum threats. Additionally, quantum key distribution
protocols must evolve to adapt to the changing threat landscape posed by quantum computers,
ensuring the long-term security of quantum cryptography in the quantum era.

5.2 Scaling Quantum Cryptography:


1. Satellite-based QKD:
Satellite-based quantum key distribution (QKD) holds great promise for overcoming the
distance limitations inherent in terrestrial quantum communication networks. By leveraging
the unique capabilities of satellites to establish quantum links between ground stations
separated by vast distances, satellite-based QKD enables secure communication on a global
scale. This approach offers several advantages, including the ability to establish secure
communication channels over long distances, spanning continents and oceans, without the need
for costly and complex infrastructure. Furthermore, satellite-based QKD can provide secure

Dept of CSE Page 19 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

communication coverage to remote or inaccessible regions where traditional terrestrial


networks are impractical or unavailable. While significant progress has been made in
demonstrating the feasibility of satellite-based QKD, continued research and development
efforts are needed to address technical challenges and optimize the performance of satellite
quantum communication systems for real-world deployment.

2. Quantum Internet:
The concept of a quantum internet represents the next frontier in quantum communication,
enabling the seamless exchange of quantum information between nodes interconnected by
quantum links. Unlike classical internet protocols, which rely on classical bits to transmit
information, a quantum internet leverages the principles of quantum mechanics to enable
quantum communication and computation tasks that are impossible with classical networks. A
quantum internet infrastructure would support a wide range of applications, including secure
quantum key distribution, quantum teleportation, and distributed quantum computing. Building
a quantum internet requires the development of scalable quantum communication protocols,
robust quantum error correction techniques, and the integration of quantum repeaters to extend
the range of quantum links. While significant challenges remain, including the development of
reliable quantum memories and quantum repeater nodes, progress in this area holds the
potential to revolutionize communication and computation in the quantum era.

3. Quantum Computers:
Quantum computers represent both a challenge and an opportunity for scaling quantum
cryptography. On one hand, the development of large-scale quantum computers poses a
potential threat to the security of existing quantum cryptographic protocols, as these powerful
machines could theoretically break encryption schemes based on currently hard mathematical
problems. On the other hand, quantum computers also offer the possibility of enhancing the
performance and security of quantum cryptography through the development of new quantum-
resistant encryption algorithms and protocols. Research in post-quantum cryptography aims to
identify and standardize cryptographic primitives that remain secure in the presence of
quantum adversaries. Additionally, quantum computers can be used to optimize and accelerate
various aspects of quantum cryptography, including quantum key generation, quantum error
correction, and quantum network routing. As quantum computing technology matures, it is
essential to continue advancing the field of quantum cryptography to ensure the security and
resilience of communication networks in the quantum era.

Dept of CSE Page 20 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

5.3 Opportunities in Quantum Cryptography:


Despite the challenges, quantum cryptography also offers numerous opportunities to various
industries, such as finance, healthcare, defense, and telecommunications. The widespread
adoption of quantum cryptography can create new industries, jobs, and economic opportunities,
contributing to global technological leadership and competitiveness

1. Finance:
Quantum cryptography revolutionizes financial security by offering unbreakable encryption
keys through techniques like quantum key distribution (QKD). In an era of digital financial
services like online banking and mobile payments, protecting sensitive financial information
from cyber threats is paramount. In finance, quantum cryptography can improve the security
and speed of transactions and enable new services and products. By embracing quantum
cryptography, financial institutions can bolster cybersecurity measures, safeguarding customer
assets and fostering trust in the financial system.

2. Healthcare:
Quantum cryptography presents a transformative opportunity for healthcare data security and
privacy. With vast amounts of sensitive patient information, ensuring robust measures to
prevent unauthorized access is critical. Quantum cryptography encrypts and securely transmits
healthcare data, ensuring compliance with regulations like HIPAA. This technology enhances
the security of medical data, facilitates secure telemedicine consultations, and drives
advancements in personalized medicine. Healthcare can benefit from enhanced confidentiality
and integrity of medical data, as well as easier sharing and collaboration.

3.Defense:
Quantum cryptography offers unparalleled security for defense and military communication
networks. With operations relying heavily on secure channels to safeguard national security

Dept of CSE Page 21 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

interests, quantum cryptographic methods like QKD provide unmatched security. Integration
into defense systems ensures the confidentiality and integrity of sensitive information, while
facilitating the development of quantum-resistant encryption algorithms to combat emerging
threats. Defense systems can use quantum cryptography to secure communication and
coordination of military operations.

4.Telecommunications:
In the telecommunications sector, quantum cryptography enhances the security and reliability
of communication networks. With the rise of digital communication services, protecting data
integrity and confidentiality is paramount. Quantum cryptographic techniques provide robust
encryption for data transmitted over telecommunications networks, protecting against cyber
threats and interception. Incorporating quantum cryptography solutions offers enhanced
security features to customers and drives innovation in developing quantum-resistant
encryption standards for future threats.

Dept of CSE Page 22 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

Chapter 6

CONCLUSION

Quantum cryptography emerges as a transformative force in the realm of cybersecurity,


offering unparalleled opportunities for securing communication networks and safeguarding
sensitive data across various industries. Through the innovative application of quantum
mechanics principles, particularly quantum key distribution (QKD) protocols, quantum
cryptography provides robust security guarantees, ensuring the confidentiality, integrity, and
authenticity of information transmission. While challenges such as distance limitations,
environmental sensitivity, and the threat of quantum computers persist, ongoing research and
development efforts are actively addressing these obstacles. As organizations embrace
quantum cryptographic solutions, they stand poised to fortify their defenses against cyber
threats, foster trust in digital transactions, and usher in a new era of secure communication in
the quantum age. In conclusion, quantum cryptography holds immense promise for
revolutionizing cybersecurity and enabling secure communication in the quantum era. By
harnessing the power of quantum mechanics, organizations can bolster their defenses against
cyber threats and ensure the confidentiality, integrity, and availability of critical information
assets. As quantum cryptography continues to evolve, it will play a pivotal role in shaping the
future of cybersecurity and digital trust.

Dept of CSE Page 23 NIEIT, Mysore


Challenges and Opportunities in Quantum Cryptography 2023-24

BIBLIOGRAPHY
• https://www.sciencedirect.com/topics/engineering/quantum-cryptography
• https://en.wikipedia.org/wiki/Quantum_key_distribution
• https://quside.com/how-does-quantum-key-distribution-qkd-work/
• https://link.springer.com/chapter/10.1007/978-3-642-05019-0_22
• https://ieeexplore.ieee.org/document/9726722
• https://research.aimultiple.com/quantum-cryptography/

Dept of CSE Page 24 NIEIT, Mysore

You might also like