Applications of Quantum Cryptography - QKD: Cs551/851 Yptography Pplications Istro Mike Mcnett
Applications of Quantum Cryptography - QKD: Cs551/851 Yptography Pplications Istro Mike Mcnett
Cryptography – QKD
CS551/851CRyptographyApplicationsBistro
Mike McNett
6 April 2004
To detect eavesdropping:
• Bob only makes the same kind of measurement as Alice about
half the time. Given that the P(B detector fails) = 0.5, you would
expect about 5 out of 20 usable shared digits to remain.
• A B: reveals 50% (randomly) of the shared digits.
• B A: reveals his corresponding check digits.
• If > 25% of the check digits are wrong, Alice and Bob know that
somebody (Eve) was listening to their exchange.
• MagiQ. Whitepaper:
http://www.magiqtech.com/registration/MagiQWhitePaper.
pdf
• Satellite-based QKD:
http://ej.iop.org/links/q68/BKUvFWVrm756,uxc76lU,Q/nj21
82.pdf
Pros & Cons
• Nearly Impossible to steal
• Detect if someone is listening
• “Secure”
• Distance Limitations
• Availability
– vulnerable to DOS
– keys can’t keep up with plaintext
Questions?
• Back to Richard!