Quantum Cryptography and Its Implications

First International Conference on Modern Communication & Computing Technologies (MCCT'14)
(Short Paper / WiP)
Quantum Cryptography and Its Implications
Ghulam Abbas Lashari, Muhammad Irshad Nazeer
Department of Computer Science, Sukkur IBA, airport road sukkur, Sindh-Pakistan
{ghulam.abbas, irshad.nazeer} @iba-suk.edu.pk
Abstract. Due to technological advancements in computing technology current
cryptographic methods need improvements for reliable data transfer. There are
so many cryptographic techniques which have been implemented to serve the
error free dissemination of data: symmetric and asymmetric. These conventional techniques have many issues such as secure key exchange, authentication etc,
these issues need to be resolved. Therefore, scientists have introduced another
method for secure data transmission that is Quantum Cryptography. This paper
describes the need of Quantum Cryptography in comparison with currently
working classical cryptography. Meanwhile, it also explains the working principle of quantum cryptography, quantum key distribution protocols (BB84), and
analysis of key distribution protocols.
Keywords: Quantum Cryptography, Quantum Key Distribution (QKD), Qubits.
1
Introduction
Cryptography is the way to transmit messages between two parties using an insecure
channel so that no one can intercept it. During communication process the sender
sends a message to receiver by applying suitable encryption techniques and receiver
decrypts the message by applying decryption. The attacker can only intercept the
message if he knows the key. So to maintain confidentiality and to avoid any kind of
modification with data one should make secure key exchange Error! Reference
source not found..
RSA is known as a public key cryptography algorithm which is considered as the
most secure algorithm. The security of RSA depends on the difficulty of factoring
large prime numbers. Richard Feynman suggested that binary information can be
represented by photons and the properties of these particles such as polarizations can
be exploited to encode and transmit information Error! Reference source not
found.. Kristo explains that quantum computers are very fast as compared to classical
computers Error! Reference source not found.. Quantum computers use Shor’s
algorithm which can factor two large prime numbers to decrypt information encrypted
by RSA [9]. So, there is a drastic need of a secure and efficient key distribution tech-
26-28 February, 2014, NawabShah, Pakistan
First International Conference on Modern Communication & Computing Technologies (MCCT'14)
(Short Paper / WiP)
nique to meet the growing need of privacy. This paper describes Quantum Cryptography in comparison with currently working classical cryptography, quantum key distribution protocols, and analysis of key distribution protocols.
2
Quantum Cryptography
In the quantum communication unit of quantum information is the photon or quantum
bit (qubit).It has two values 0 or 1. Electromagnetic waves exhibit the phenomenon of
polarization. A polarization filter is used which allows only light of a specified
polarization direction to pass. A photon either will or will not pass through a
polarization filter, but if it emerges it will be aligned with the filter regardless of its
initial state. A photon detector can be used to determine the photon’s polarization to
know the possibility whether it will pass through the filter [5].The foundation of
quantum cryptography lies in the Heisenberg uncertainty principle which states that
the position and momentum of a photon can’t be determined simultaneously. In
particular, when we measure the polarization of a photon particle the choice of what
direction to observe the effect all measurements [4].
According to no-cloning-theorem two identical copies of two unknown quantum
states are very difficult. So, there is no chance for an attacker to measure the quantum
state [3] [4]. Quantum channel and the public channel in quantum cryptography are
used. The Quantum channel is used to transmit quantum bits whereas public channel
is used to carry messages from sender to the receiver and to check error in quantum
channel. BB84 protocol proposed by Bennett and Brassard in 1984 is the most widely
accepted QKD protocol. The other protocols BBM92, B92 and E91 are newer and
faster than BB84, but these all require highly accurate detectors. Still BB84 is very
popular in QKD protocols.
2.1
Quantum Key Distribution Protocol (BB84)
BB84 protocol uses the properties of polarized photons for secure key distribution.
Error! Reference source not found. shows an example of key distribution using
BB84 protocols.
Fig. 1. , An example of the key establishment by the BB84 protocol [5] [3]
26-28 February, 2014, NawabShah, Pakistan
First International Conference on Modern Communication & Computing Technologies (MCCT'14)
(Short Paper / WiP)
In figure 1(a) Alice and Bob want to share information by establishing a secret key.
When Alice and Bob establish a new key they define the type of polarization by two
words: rectilinear and diagonal. In rectilinear, photons with horizontal polarization 00
means bit 0 and photons with vertical polarization 900 means bit 1. In diagonal,
photons with polarization -450 means bit 0 and photons with polarization 450 means
bit 1. Bob can only measure photons with 00 and 900 with the help of the detector on
the rectilinear basis and with -450 and 450 in diagonal basis. If there is a mismatch of
polarization the photons will be lost as shown in figure1 (a). First of all Alice sends a
string of bits to Bob encoded by polarized photons randomly on a quantum channel
by rectilinear or diagonal basis. Bob gets those strings of bits by perfect detection, by
randomly selecting rectilinear or diagonal basis. Bob informs to Alice that which
basis he used for receiving those bits. Bob only discloses the basis he used but the
information of the measurement is kept secret. Alice verifies whether Bob has chosen
the right basis or not. The new key will be that set of bit for which Bob has chosen the
correct basis [3] [1] [2]. In figure 1(a) the first photon is detected perfectly and is the
first bit of the new key. In the second and third bit Bob has chosen wrong basis so
these two bits will be rejected and the key will not include these bits. The fourth bit is
detected correctly and can be the part of the key. The algorithm describes that the key
should include only half bits sent by Alice [3]. To get the information transferred
between Alice and Bob Eve must have information about polarization of photons
using any of the basis rectilinear or diagonal. Eve chooses the basis randomly and if it
is not the correct basis, the polarization will be changed. In figure1 (b) the first bit has
a vertical polarization, but Eve obtained that bit using a diagonal basis and now the
photon’s polarization is 450. . But when Bob measures this photon has horizontal
polarization and the decoded bit is 0, even though Alice and Bob selected the same
rectilinear basis, but bob got the wrong result, which is not the same as Alice sent.
Now if Alice and Bob compare the part of the key they will be sure that the
eavesdropper is trying to obtain the key. Eve can change the quantum state which is
easily detected, but according to no-cloning theorem she can’t clone the unknown
state of the photon, hence the BB84 provides secure key distribution [3].
3
Challenges in QC and Possible Solutions
Quantum cryptography is not so common and less people know about its issues.
Various types of attacks have been studied in the domain of quantum communication:
side-channel attacks, channel loss attacks, untrusted source attacks, man-in-themiddle attack, etc [2]. The two intercept/resend and beam-splitting attacks are very
serious in quantum cryptography [9]. In 2007 experts in MIT discovered “energymomentum co-entanglement” attack on BB84. An attack on a commercial system was
a time-shift attack in 2008 was discovered. In 2010, QKD system based on BB84 was
completely broken. Random number generators should also be designed purely so that
the attacker can’t detect the basis correctly. The problems in QKD systems occur due
to the inefficiency of detectors [66] [5] [1] [2]. By comparing a portion of the key we
compute the quantum bit error rate (QBER) using the following formula [3].
26-28 February, 2014, NawabShah, Pakistan
First International Conference on Modern Communication & Computing Technologies (MCCT'14)
(Short Paper / WiP)
(1)
According to the estimated error, sender and receiver delete the compared part of the
key and if the QBER is low enough, they apply key distillation process. If the error
rate is greater than given threshold limit, key distillation process is used [3]. Sender
and receiver should divide the key into blocks and apply parity on each block. After
the parity check, both parties should reject one bit from each block to give partial
knowledge to the attacker about the key. With the key distillation process, the key is
reduced; Therefore users are sure that they have a secure key [3] [5]. Quantum privacy amplification in [1] [6], can make the existing quantum system more secure.
4
Security Analysis of QKD Protocols
There should be a probabilistic function that shows the status of the key whether
eavesdropper has seen or modified it. There comes a nice question that how many bits
should be extracted to know the status of the key. To answer this question two J(k)
and S(k) introduced by Hartley and Shannon can be used[3] [5].
(2),
where the number of uncovered bits k, length of
the key n and natural logarithm are used.
Fig. 2. Measure of Security [3]
Fig. 3. Measure of Entropy [3]
26-28 February, 2014, NawabShah, Pakistan
First International Conference on Modern Communication & Computing Technologies (MCCT'14)
(Short Paper / WiP)
In figure2 J (k) shows that with the comparison of first 20 percent of bit security
increases, but when we look at the last 30 percent of bits, there is small improvement.
(3), where number of
The second function is:
uncovered bits k, length of the key n and natural logarithm are used.
In figure3, it shows that we must uncover approximately 37 percent of the bits of
key. The basic and advanced security graphs show the percentage number of bits of
distributed key to uncover. The system is secure for personal and commercial use and
for critical applications such as banks, police and military usage respectively.
5
Conclusion
Due to vulnerability in classical cryptography, quantum based security
mechanism is the best answer to attackers. In this paper Quantum key distribution
protocols have been discussed and Error analysis has been made to get the secure key.
Some challenges are associated with QKD protocols, but the work is going on to
resolve those issues. Quantum systems also face some issue of inefficient photo
detectors, random number generators and repeaters, etc. In the future, the main focus
is on integration of quantum systems with existing communication standards.
References
1. Krishnan, Aravind. "An overview of quantum wireless communication using quantum
cryptography." Emerging Trends in Robotics and Communication Technologies
(INTERACT), 2010 International Conference on. IEEE, 2010.
2. Stipcevic, Mario. "How secure is quantum cryptography?." MIPRO, 2012 Proceedings of
the 35th International Convention. IEEE, 2012.
3. Niemiec, Marcin, and Andrzej R. Pach. "The measure of security in quantum cryptography." Global Communications Conference (GLOBECOM), 2012 IEEE. IEEE, 2012.
4. Imre, Sandor. "Quantum communications: explained for communication engineers."
Communications Magazine, IEEE 51.8 (2013).
5. Niemiec, Marcin, and Andrzej R. Pach. "Management of security in quantum cryptography." Communications Magazine, IEEE 51.8 (2013).
6. Pinto A. N. , Silva N. A. , Almeida Á. J. , and Muga N. J.: Using Quantum Technologies
to Improve Fiber Optic Communication Systems, IEEE Communications Magazine – (august 2013).
7. Humble, Travis S. "Quantum security for the physical layer." Communications Magazine,
IEEE 51.8 (2013).
8. Vittorio, Salvatore. "Quantum cryptography: Privacy through uncertainty." released October (2002).
9. Kristo, Joshua. "Superposition And Encryption: The Implications Of Quantum Computing
On Information Security." (2012).
26-28 February, 2014, NawabShah, Pakistan