© Robert Ciesla 2020
R. CieslaEncryption for Organizations and Individualshttps://doi.org/10.1007/978-1-4842-6056-2_11

11. Quantum Cryptography

Robert Ciesla1 
(1)
HELSINKI, Finland
 

In this chapter we’ll explore more of some of the most essential components of quantum-based cryptography, including the grandparent of quantum key distribution protocols, the formidable BB84. You’ll see some familiar concepts and names, but you will probably also encounter several new ideas.

On Quantum Key Distribution (QKD)

We’ll now probe into some of the most important concepts related to quantum cryptography, including quantum key distribution (QKD). Do note that QKD is not the same as quantum encryption; it is instead a very effective auxiliary technique for securing keys/passwords. Current implementations of QKD are to be used in tandem with well-established classical algorithms, such as the AES.

A number of transmission protocols exist for QKD. We’ll next discuss some of these protocols in detail.

Let’s Go with Light

Quantum communications can be implemented using several varieties of quantum particles, including ions, atoms, and light (i.e., photons). Out of these, unit light tends to interact with matter to the smallest degree as photons are massless. This makes photons the optimal choice of transfer unit when it comes to tackling the issue of decoherence (as discussed in Chapter 10). Light, however, does sometimes disperse over time; a few of those important photons may never arrive at their intended destination. How these losses affect quantum communications is largely dependent on which protocol is being used (Scarani et al. 2009).

BB84

Developed all the way back in 1984 by Charles Bennett and Gilles Brassard, the BB84 was the first cryptographic protocol that allowed legitimate parties to detect eavesdropping during message transmission. It uses Heisenberg’s uncertainty principle, which as you might remember from Chapter 9 states that quantum-based data can’t be measured without disturbing it.

The information sent using BB84 is encoded in the polarization of photons. Polarization refers to the geometrical orientation of the oscillations in (light)waves; the property is expressed in degrees, for example, 90° (see Figure 11-1). Optical fiber is a typical carrier medium for this approach.
../images/490218_1_En_11_Chapter/490218_1_En_11_Fig1_HTML.jpg
Figure 11-1

The oscillation patterns of photons can be altered using polarizer devices

Polarization can be performed either on a rectilinear or diagonal basis in BB84 (see Figure 11-2). The sender side chooses which basis/approach to use for each bit and informs the receiver; this stage is called key sifting . Often a nonsecure conventional channel of communication is used with the BB84 for negotiation and sifting purposes.
../images/490218_1_En_11_Chapter/490218_1_En_11_Fig2_HTML.jpg
Figure 11-2

Bits can be encoded in the polarization states of a photon in the BB84 protocol. The black arrows denote the rectilinear basis

Now, let’s do some key sifting and simulate a small quantum transmission between two parties, Adramicia-Alphonsine and Biniyaamzawed. Whenever these two share bases and measurements, they form parts of the secret key (see Table 11-1).
Table 11-1

A small sifted key. The plus sign denotes a rectilinear basis, while X refers to the diagonal one

Adramicia-Alphonsine’s bit

1

1

0

0

0

1

1

1

Adramicia-Alphonsine’s basis

+

X

+

X

X

+

X

+

Adramicia-Alphonsine’s polarization

90°

45°

135°

45°

90°

45°

Biniyaamzawed’s basis

+

X

+

X

+

X

+

+

Biniyaamzawed’s measurement

90°

45°

90°

135°

90°

45°

Shared bits

(i.e., the secret password/key)

1

1

 

0

   

1

Key sifting is often performed on a more or less open channel such as the Internet. Although it might sound risky, malicious actors cannot often use sifting-related communications to gain information on any keys/passwords transmitted using QKD.

The no-cloning theorem (see Chapter 10) guarantees information can’t be duplicated in this realm. Also, any eavesdropping on channels using the BB84 protocol will result in an increased rate of quantum errors; this will let the legitimate parties know they are being spied upon.

B92

Developed by Charles Bennett of BB84 fame, the B92 is basically an optimized version of his previous protocol. Instead of four polarized states, the B92 offers just two (Ouchao, Jakimi 2018). Transmission of the basis (i.e., rectilinear or diagonal) used in the sifting stage is also not needed in B92. While easier to implement than the BB84, the newer protocol is thought to be less secure.

The Six-State Protocol (SSP)

Based on BB84, the six-state protocol operates on six states of polarization (on three orthogonal bases), instead of the four found in BB84 (see Figure 11-3). Eavesdropping on an implementation of the SSP produces a high rate of error, making unmasking malicious actors very effective. Although this approach is among the most secure protocols, it carries with it additional risks of data loss.
../images/490218_1_En_11_Chapter/490218_1_En_11_Fig3_HTML.jpg
Figure 11-3

The three bases and six states of polarization of the SSP represented with a Bloch sphere

The Ekert Protocol (E91)

The Ekert protocol uses quantum entanglement with a central source between two parties to transmit messages simultaneously; a currently known practical source could be a satellite in orbit. The photons used in the protocol are entangled and assigned with randomized polarization.

The Einstein–Podolsky–Rosen paradox (EPR paradox) is a thought experiment devised in 1935 basically stating that quantum mechanics were in fact considered an incomplete paradigm. The quantum properties of entanglement and superposition in particular were thought to be in conflict with classical physics . The Ekert protocol actually provides a functional framework for putting the theoretical physics outlined in the EPR paradox into practice (Ilic 2007).

Continuous-Variable (CV) Protocols

The previously introduced protocols have been discrete variable in nature in which information is carried by single, or entangled, photons. A continuous-variable (CV) protocol is a different approach in which amplitudes, instead of individual photons, are measured. The photon counter units in discrete-variable protocols slow down the proceedings a tad and are not needed with continuous-variable protocols. Although generally faster during operation, CV protocols tend to produce more errors (Scarani et al. 2009).

Shor’s (Factoring) Algorithm

Some encryption schemes previously thought of as impenetrable are meeting their matches. One such scenario unfolded when Peter Shor’s factoring algorithm emerged in 1994, which is bad news for public-key cryptographic approaches such as the RSA. Shor’s algorithm was devised to discover prime factors of arbitrary numbers.

In practice, Shor’s algorithm consists of two phases; the first of which may be performed on a classical computer. In 2001 IBM built a seven-qubit quantum computer and with it successfully demonstrated the second part of Shor’s algorithm.

Now, are algorithms like the RSA in peril? Not really. For its 2048-bit variety at least, we would need a quantum computer of several hundred qubits to make the wait palatable. In addition, even if we managed to create such a computer, the issue of decoherence remains; as discussed in the previous chapter, qubits eventually lose their luster with their quantum properties. And we can forget about a classical supercomputer working on cracking the RSA with its several trillion year time frame.

Quantum Coin Flipping

Sometimes you can’t be sure that the receiving end of quantum communications is the intended one. Quantum coin flipping is a protocol for two parties who do not trust each other. The technique is being researched for secure authentication (i.e., fingerprinting) purposes as some stages in a typical QKD process involve nonsecure channels of communication. An approach where quantum coin flipping is executed after QKD is performed has been proposed; this would thwart most attempts at a man-in-the-middle attack (Rass et al. 2009).

In Closing

After finishing this chapter, you will have learned the following:
  • Which established protocols exist for quantum key distribution (QKD) , in particular the BB84 and the basics of its workings

  • What key sifting means

  • The significance of Shor’s algorithm and quantum coin flipping

In the next chapter we’ll delve much deeper into the fascinating theme of quantum-based cryptography. There are still many concepts left to unearth in quantum key distribution alone, for one.

References

B. Ouchao, A. Jakimi. International Journal of Advanced Engineering, Management and Science, June 2018. Performance Evaluation of Secure Key Distribution Based on the B92 Protocol.

Scarani, Bechmann-Pasquinucci et al. Rev.Mod.Phys. 81, 2009. The Security of Practical Quantum Key Distribution.

Ilic, Nikolina J. Phy 334, 2007. The Ekert Protocol.

S. Rass, P. Schartner, M. Greiler. 2009 IEEE International Conference on Communications. Quantum Coin-Flipping-Based Authentication.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.183.172