C191: Quantum Cryptographycs191/fa10/notes/qcrypto.pdf · BB84 Protocol for Key Distribution Repeat...

Post on 14-Mar-2018

216 views 4 download

transcript

C191: Quantum Cryptography

Umesh V. Vazirani

2

How to agree on a secret key?

3

Quantum Crypto Setup

4

RSA: Public-key Cryptography

Alice Bob

• Alice publishes public key = (N, e).

• N = PQ, with P, Q primes known only to Alice.Her private key is d: de = 1 mod (P-1)(Q-1)

• Ed = mde = m (mod N)

• Eavesdropper Eve doesn’t know d, and cannot decrypt.

message mE= me mod N

Decrypts: m = Ed

• Unconditional security

• Quantum factoring breaks RSA!

• Has been implemented using today’s technology

• Measurement disturbs the system

- detect eavesdropper

Why Quantum Cryptography?

6

7

Photon Polarization

• The polarization of a photon is a direction in the plane normal to the direction of propagation.

• The polarization of a photon is a qubit.

• A polarizing filter blocks photons whose polarization is perpendicular to the orientation of the filter and transmits photons whose polarization is aligned with the orientation of the filter.

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28