Seminar Report
Seminar Report
We sincerely owe our gratitude to all people who helped and guided us in
completing this technical seminar.
We are thankful to Dr. Rohini Nagapadma, Principal, NIEIT, Mysuru, for having
supported us in our academic endeavors.
We would like to sincerely thank our project guide, Dr. Gowtham M, Asst. Professor
in Dept. of Computer Science and Engineering for providing relevant information, valuable
guidance and encouragement to complete this technical seminar.
We would also like to thank all our teaching and non-teaching staff members of the
Department. I am grateful to my college for keeping labs open whenever required and
providing me the systems and the required software.
We are always thankful to our Parents for their valuable support and guidance in
every step. Also thank all our friends for their support and guidance throughout the
technical seminar.
We express our deepest gratitude and indebted thanks to NIEIT which has
provided us an opportunity in fulfilling our most cherished desire of reaching our goal.
Yours Sincerely,
Syed Tarooq Afnan (4NN20CS054)
ABSTRACT
Chapter 6 Conclusion 23
Bibliography 24
Challenges and Opportunities in Quantum Cryptography 2023-24
CHAPTER 1
INTRODUCTION
The potential applications of quantum cryptography are vast and varied, ranging from secure
communication in government and military settings to protecting sensitive financial
transactions and personal data. As our reliance on digital communication and data transmission
continues to grow, the need for robust security measures becomes increasingly critical.
Quantum cryptography offers a path towards achieving this goal, promising secure
communication channels that are resistant to even the most advanced cyber threats. However,
despite its immense potential, quantum cryptography is not without its challenges. Practical
implementation issues, such as the limitation of transmission distances and environmental
factors affecting quantum states, present significant hurdles that must be addressed. Moreover,
the looming threat of quantum computers capable of breaking current cryptographic algorithms
underscores the need for ongoing research and development in this field. In conclusion,
quantum cryptography represents a groundbreaking approach to cybersecurity, offering
unparalleled security and privacy in an increasingly digital world. As research and technology
continue to advance, quantum cryptography holds the promise of revolutionizing how we
protect sensitive information and secure communication channels, ushering in a new era of
digital security.
Quantum Key Distribution (QKD) is a cryptographic protocol that leverages the principles of
quantum mechanics to facilitate the secure exchange of cryptographic keys between two
parties, commonly referred to as Alice and Bob. The primary objective of QKD is to establish
a secret key that can subsequently be used for encrypting and decrypting messages, ensuring
the confidentiality and integrity of communication channels. Unlike traditional cryptographic
methods, which rely on the computational complexity of mathematical algorithms, QKD
harnesses the inherent uncertainty of quantum mechanics to achieve security. By encoding
information into quantum states, typically represented by particles of light (photons), QKD
enables the detection of any attempted eavesdropping, thereby guaranteeing the secrecy of the
exchanged key.
1. BB84 Protocol: Developed by Charles Bennett and Gilles Brassard in 1984, the BB84
protocol is one of the earliest and most well-known quantum key distribution (QKD)
protocols. It relies on the transmission of photons with specific polarizations to encode
binary information. The protocol involves Alice randomly preparing a sequence of
qubits (photons) in one of two polarization bases and sending them to Bob. Bob
measures each qubit's polarization along one of two possible bases. After comparing
measurement bases, Alice and Bob can distill a secret key from their correlated
measurement outcomes.
2. E91 Protocol: Proposed by Artur Ekert in 1991, the E91 protocol utilizes the
phenomenon of quantum entanglement to establish a secret key between two parties,
typically referred to as Alice and Bob. In the E91 protocol, Alice prepares pairs of
entangled particles (such as photons) and sends one particle to Bob while retaining the
other. Bob measures the state of his particle in randomly chosen bases. By comparing
their measurement choices, Alice and Bob can establish a secure key. The E91 protocol
provides a high level of security against eavesdropping due to the non-local correlations
inherent in entangled quantum states.
3. SARG04 Protocol: The SARG04 (Semi-Quantum Symmetric-key Authentication
Revisited) protocol is designed for authentication purposes in quantum communication
networks. Proposed by Deng, Long, and Liu in 2004, this protocol utilizes a semi-
quantum scheme, allowing classical parties to authenticate quantum messages without
possessing full quantum capabilities. It employs a quantum key distribution (QKD)
process combined with classical cryptographic techniques to ensure secure
authentication.
4. B92 Protocol: The B92 protocol, introduced by Bennett in 1992, is a simplified version
of the BB84 protocol that uses only two nonorthogonal quantum states for encoding
information. This simplification reduces the complexity of the quantum system while
still providing a secure key exchange protocol. However, the B92 protocol is more
susceptible to certain types of attacks compared to its predecessor, BB84.
5. Coherent One Way Protocol: Proposed by Bennett and Brassard in 1984, the
Coherent One Way (COW) protocol relies on the transmission of coherent states of
light to establish secure communication. It operates similarly to the BB84 protocol but
utilizes coherent states instead of single photons. The COW protocol offers advantages
in terms of implementation simplicity and efficiency but may be more susceptible to
certain types of attacks.
These protocols represent just a few examples of the diverse range of quantum cryptography
protocols developed to address specific security requirements and operational constraints. As
quantum cryptography continues to evolve, new protocols and enhancements to existing ones
are likely to emerge, further advancing the field's capabilities in securing communication
channels and protecting sensitive information.
• Qubits: The fundamental unit of quantum information is the qubit, analogous to the bit
in classical computing. Unlike a classical bit, which can be either 0 or 1, a qubit can be
in a state representing 0, 1, or both simultaneously, thanks to superposition. This allows
quantum computers to process information in a fundamentally different way from
classical computers.
• Quantum Gates: Quantum gates manipulate qubits in a quantum computer, similar to
how logical gates operate on bits in classical computing. However, quantum gates use
the principles of superposition and entanglement to perform operations on qubits,
enabling complex computations that are beyond the reach of classical computers.
Quantum gates are essential for creating quantum algorithms, including those used for
quantum cryptography and secure communications.
Chapter 2
OVERVIEW
2. Quantum Cryptography :
• Foundation: Quantum cryptography, specifically Quantum Key Distribution (QKD)
like the BB84 protocol, leverages the principles of quantum mechanics to secure
communication channels. It utilizes properties such as superposition and entanglement
to generate and share cryptographic keys.
• Security Basis: The security of quantum cryptography is grounded in the laws of
quantum physics rather than computational complexity. For example, any attempt to
eavesdrop on the quantum channel alters the quantum state of the particles being
observed, which can be detected by the communicating parties. This is due to the no-
cloning theorem and the principle of quantum uncertainty.
3. Comparison Summary :
• Basis of Security: Classical cryptography's security is computational, while quantum
cryptography's security is based on the fundamental laws of quantum mechanics.
• Vulnerabilities: Classical cryptography faces threats from quantum computing,
whereas quantum cryptography's challenges are more about practical implementation
and physical limitations.
• Implementation and Cost: Classical cryptographic techniques are well-understood
and implemented widely at relatively low cost. Quantum cryptography, in contrast,
currently requires specialized equipment and is more expensive to deploy.
Both classical and quantum cryptography have roles to play in the future of secure
communication. While quantum cryptography offers a solution to the threat posed by quantum
computing, classical cryptography remains crucial for many applications due to its ease of use
and implementation. A hybrid approach, utilizing the strengths of each depending on the
context and requirements, might be the most pragmatic way forward.
particles and waves on an atomic scale, providing the foundation for various modern
technologies, including quantum computing and cryptography.
Key Principles
• Superposition: This principle posits that any quantum system can exist in multiple
states or configurations simultaneously until it is observed. For instance, a quantum bit
or qubit can represent a 0, a 1, or any quantum superposition of these states, leading to
complex computational and encryption processes that are not possible with classical
bits.
• Entanglement: Quantum entanglement is a phenomenon where particles become
interconnected in such a way that the state of one (no matter the distance) can instantly
influence the state of another. This property is at the heart of quantum cryptography,
enabling unprecedented security protocols. If an eavesdropper attempts to intercept a
quantum communication, the entanglement is disturbed, and the intrusion can be
detected immediately.
• Uncertainty Principle: Articulated by Werner Heisenberg, this principle states that it
is impossible to simultaneously know both the exact position and the exact velocity of
a particle. This inherent uncertainty in quantum mechanics leads to secure
cryptographic methods where an eavesdropper cannot precisely determine the quantum
state of a system without altering it and thereby revealing their presence.
When discussing quantum states, especially in the context of quantum cryptography such as
the BB84 protocol, you'll often encounter terms like "rectilinear" and "diagonal" states. These
terms refer to two different bases in which a qubit can be prepared and measured.
Understanding these bases is crucial for grasping how quantum key distribution (QKD)
protocols work, ensuring secure communication by leveraging the principles of quantum
mechanics.
• Rectilinear Basis: The rectilinear basis (also known as the computational or standard
basis) consists of two orthogonal states typically represented by |0⟩ and |1⟩. In the
context of photon polarization, which is a common physical realization for qubits in
quantum cryptography, the rectilinear basis corresponds to two perpendicular
polarization directions:
• Diagonal Basis: The diagonal basis consists of states that are superpositions of the
rectilinear basis states, leading to two other orthogonal states typically denoted as |+⟩
and |−⟩. In the photon polarization analogy, these correspond to polarizations at 45
degrees:
This basis is termed "diagonal" because the orientations are diagonal with respect to the
rectilinear basis, bridging the gap between the vertical and horizontal. Visually, these might be
represented by arrows pointing diagonally up and to the right for |+⟩, and diagonally down and
to the right for |−⟩.
In QKD protocols like BB84, these two bases are used for encoding, transmitting, and
measuring quantum bits (qubits). The security of the protocol partly relies on the fact that a
measurement made in one basis cannot accurately predict the state of a qubit encoded in the
other basis. For example, if Alice sends a qubit encoded in a diagonal state, and Bob measures
it in the rectilinear basis, there's a 50% chance he'll incorrectly infer the state of the qubit. This
property is exploited to detect eavesdroppers, who, by measuring qubits, unavoidably introduce
errors into the communication, revealing their presence. The choice between rectilinear and
diagonal bases in quantum cryptography allows for a secure method of key distribution,
ensuring that any attempt at interception can be detected by the legitimate parties involved in
the communication. This setup takes advantage of the quantum mechanical principle that
observing or measuring a quantum system inevitably alters its state.
1. Encoding
• Alice's Preparation: Alice prepares a sequence of qubits (quantum bits) to send to
Bob. Each qubit is encoded in one of two bases, chosen at random: the rectilinear basis
(with states |0⟩ and |1⟩) or the diagonal basis (with states |+⟩ and |-⟩). For each qubit,
she also randomly chooses one of the two possible states within the selected basis for
encoding.
2. Transmission
• Sending Qubits: Alice sends the prepared sequence of qubits to Bob through a
quantum communication channel.
3. Measurement
• Bob's Measurement: Without knowing Alice's choice of basis for each qubit, Bob
randomly chooses a basis (either rectilinear or diagonal) to measure each incoming
qubit. He records the outcome of his measurements and the basis used for each.
4. Basis Reconciliation
• Sharing the Basis: After Bob has measured all the qubits, Alice and Bob communicate
over a classical channel (which can be public) to share the bases used for each qubit,
without revealing the actual measurement outcomes.
• Discarding Mismatched Bases: Alice and Bob discard any bits from their records
where they used different bases, keeping only the bits where they happened to choose
the same basis. Ideally, if there was no interference, these bits should match.
6. Key Generation
• Final Key: If the error rate is below the threshold, indicating that no eavesdropping is
detected, the remaining, unrevealed bits form the shared secret key. This key can then
be used for secure communication using classical cryptographic methods.
Chapter 3
IMPLEMENTATION
1. Qiskit Modules:
• Terra: The foundation of Qiskit that provides the tools to compose quantum programs
at the level of circuits and pulses.
• Aer: Simulates quantum circuits and provides the backend support for running these
simulations. It's designed to be highly configurable and to emulate the behavior of real
quantum hardware.
• Ignis: Offers tools for quantum hardware verification, noise characterization, and error
correction.
• Aqua: Built on top of Terra and provides higher-level algorithms for quantum
computing applications, such as quantum machine learning and quantum chemistry
(Note: Aqua has been deprecated and its functionalities are being integrated into the
other components).
2. Quantum Circuit:
• The basic structure for creating quantum algorithms in Qiskit. It consists of qubits
(quantum bits) for processing quantum information and classical bits for storing
measurement results.
4. Backend:
• The backend represents the quantum device or simulator that will execute the quantum
circuits. Aer.get_backend('qasm_simulator') is used to simulate a quantum circuit
that includes measurements.
5. Executing a Circuit:
• execute: A function in Qiskit used to run circuits on a specified backend. It can take
parameters like the number of shots, which is the number of times the circuit is run to
get statistical outcomes.
• shots: Represents how many times the quantum circuit is executed. More shots result
in more data to statistically analyze the results.
• memory: When set to True, the individual results of each shot are returned, allowing
for a detailed examination of the measurements.
Alice randomly chooses a basis (either Z or X, represented here as 0 or 1) to encode each bit.
If she chooses the Z-basis (standard computational basis) and the bit is 1, she applies an X
(NOT) gate to flip the qubit state to |1>. For the X-basis, she applies a Hadamard (H) gate to
prepare the qubit in a superposition, and if the bit is 1, she also flips it with an X gate. The
barrier is used as a visual aid and has no effect on the actual logic.
Bob independently chooses his measurement bases without knowing Alice's choices. If he
decides on the X-basis, he applies a Hadamard gate before measuring. The qubits are then
The generated secret key, stored in the key list, is printed to the console.
Overall, this part of the code simulates Bob's measurements on the qubits prepared by Alice,
applies appropriate gates for measurement in the chosen bases, executes the quantum circuit to
obtain measurement outcomes, and extracts a secret key based on matching measurement bases
between Alice and Bob.
Chapter 4
Chapter 5
2. Environmental Sensitivity:
Quantum systems are highly sensitive to environmental factors such as temperature
fluctuations, electromagnetic interference, and mechanical vibrations. These external
disturbances can degrade the performance of quantum devices, leading to errors in quantum
operations and compromising the security of quantum cryptographic protocols. Achieving
stable and robust quantum communication in real-world environments requires sophisticated
error-correction techniques and the development of quantum hardware resilient to
environmental noise. Additionally, efforts are underway to establish standardized protocols for
characterizing and mitigating environmental effects on quantum systems to ensure the
reliability and security of quantum cryptography in diverse operating conditions.
2. Quantum Internet:
The concept of a quantum internet represents the next frontier in quantum communication,
enabling the seamless exchange of quantum information between nodes interconnected by
quantum links. Unlike classical internet protocols, which rely on classical bits to transmit
information, a quantum internet leverages the principles of quantum mechanics to enable
quantum communication and computation tasks that are impossible with classical networks. A
quantum internet infrastructure would support a wide range of applications, including secure
quantum key distribution, quantum teleportation, and distributed quantum computing. Building
a quantum internet requires the development of scalable quantum communication protocols,
robust quantum error correction techniques, and the integration of quantum repeaters to extend
the range of quantum links. While significant challenges remain, including the development of
reliable quantum memories and quantum repeater nodes, progress in this area holds the
potential to revolutionize communication and computation in the quantum era.
3. Quantum Computers:
Quantum computers represent both a challenge and an opportunity for scaling quantum
cryptography. On one hand, the development of large-scale quantum computers poses a
potential threat to the security of existing quantum cryptographic protocols, as these powerful
machines could theoretically break encryption schemes based on currently hard mathematical
problems. On the other hand, quantum computers also offer the possibility of enhancing the
performance and security of quantum cryptography through the development of new quantum-
resistant encryption algorithms and protocols. Research in post-quantum cryptography aims to
identify and standardize cryptographic primitives that remain secure in the presence of
quantum adversaries. Additionally, quantum computers can be used to optimize and accelerate
various aspects of quantum cryptography, including quantum key generation, quantum error
correction, and quantum network routing. As quantum computing technology matures, it is
essential to continue advancing the field of quantum cryptography to ensure the security and
resilience of communication networks in the quantum era.
1. Finance:
Quantum cryptography revolutionizes financial security by offering unbreakable encryption
keys through techniques like quantum key distribution (QKD). In an era of digital financial
services like online banking and mobile payments, protecting sensitive financial information
from cyber threats is paramount. In finance, quantum cryptography can improve the security
and speed of transactions and enable new services and products. By embracing quantum
cryptography, financial institutions can bolster cybersecurity measures, safeguarding customer
assets and fostering trust in the financial system.
2. Healthcare:
Quantum cryptography presents a transformative opportunity for healthcare data security and
privacy. With vast amounts of sensitive patient information, ensuring robust measures to
prevent unauthorized access is critical. Quantum cryptography encrypts and securely transmits
healthcare data, ensuring compliance with regulations like HIPAA. This technology enhances
the security of medical data, facilitates secure telemedicine consultations, and drives
advancements in personalized medicine. Healthcare can benefit from enhanced confidentiality
and integrity of medical data, as well as easier sharing and collaboration.
3.Defense:
Quantum cryptography offers unparalleled security for defense and military communication
networks. With operations relying heavily on secure channels to safeguard national security
interests, quantum cryptographic methods like QKD provide unmatched security. Integration
into defense systems ensures the confidentiality and integrity of sensitive information, while
facilitating the development of quantum-resistant encryption algorithms to combat emerging
threats. Defense systems can use quantum cryptography to secure communication and
coordination of military operations.
4.Telecommunications:
In the telecommunications sector, quantum cryptography enhances the security and reliability
of communication networks. With the rise of digital communication services, protecting data
integrity and confidentiality is paramount. Quantum cryptographic techniques provide robust
encryption for data transmitted over telecommunications networks, protecting against cyber
threats and interception. Incorporating quantum cryptography solutions offers enhanced
security features to customers and drives innovation in developing quantum-resistant
encryption standards for future threats.
Chapter 6
CONCLUSION
BIBLIOGRAPHY
• https://www.sciencedirect.com/topics/engineering/quantum-cryptography
• https://en.wikipedia.org/wiki/Quantum_key_distribution
• https://quside.com/how-does-quantum-key-distribution-qkd-work/
• https://link.springer.com/chapter/10.1007/978-3-642-05019-0_22
• https://ieeexplore.ieee.org/document/9726722
• https://research.aimultiple.com/quantum-cryptography/