+ All Categories
Home > Documents > Quantum Computers

Quantum Computers

Date post: 17-Jul-2016
Category:
Upload: divil-jain
View: 222 times
Download: 3 times
Share this document with a friend
Description:
Quantum cryptography describes the use of quantum mechanical effects (in particular quantum communication and quantum computation) to perform cryptographic tasks or to break cryptographic systems.
32
Quantum Cryptography Presented By: Sarika.K II Sem M.Tech,DEC
Transcript
Page 1: Quantum Computers

Quantum Cryptography

Presented By: Sarika.K II Sem

M.Tech,DEC

Page 2: Quantum Computers

2

Introduction• The great advances made in the classical computing devices are

still not suficient to solve certain categories of problems which are beyond the classical computational model.

• As the internet spreads through the entire globe, more and more people are getting connected and important data is getting tranferred over wires, the entire system is becoming more and more vulnerable to malicious people eager to eavesdrop on secret information. Can we have a way to detect presence of such malicious people ? ?

• Yes, the solution is “Quantum cryptography”.

Page 3: Quantum Computers

3

Quantum Cryptography History

• Early 1970’s Stephen Wiesner wrote “Conjugate Coding”• 1979 Charles H. Bennett and Gilles Brassard wrote

various papers on this subject

• Basis: quantum cryptography technique make use of underlying principles of quantum mechanics and Heisenberg Uncertainity principle for ensuring secure cryptography, which is not only resitant to eavesdropping (again due to probabilistic nature of it), but also has the potential to inform the communicating parties if a conversation has been compromised.

Page 4: Quantum Computers

4

Heisenberg Uncertainty Principle• Certain pairs of physical properties are related in such a

way that measuring one property prevents the observer from knowing the value of the other.

When measuring the polarization of a photon, the choice of what direction to measure affects all subsequent measurements.

• If a photon passes through a vertical filter it will have the vertical orientation regardless of its initial

direction of polarization.

Page 5: Quantum Computers

5

Quantum computer• A quantum computer (also known as a quantum

supercomputer) is a computation device that makes direct use of quantum-mechanical phenomena, such as superposition and entanglement, to perform operations on data.

• Quantum computers are different from digital computers based on transistors. Whereas digital computers require data to be encoded into binary digits (bits), each of which is always in one of two definite states (0 or 1), quantum computation uses qubits (quantum bits), which can be in superpositions of states.

Page 6: Quantum Computers

6

• A single qubit can represent a one, a zero, or any quantum superposition of these two qubit states; moreover, a pair of qubits can be in any quantum superposition of 4 states, and three qubits in any superposition of 8

• In general, a quantum computer with n qubits can be in an arbitrary superposition of up to 2n different states simultaneously.

• Consider first a classical computer that operates on a three-bit register. The state of the computer at any time is a probability distribution over the 23=8 different three-bit strings 000, 001, 010, 011, 100, 101, 110, 111

Page 7: Quantum Computers

7

Binary information• Each photon carries one qubit of information

• Polarization can be used to represent a 0 or 1.

• In quantum computation this is called qubit.

To determine photon’s polarization the recipient must measure the polarization by ,for example, passing it through a filter.

• A user can suggest a key by sending a stream of randomly polarized photons.This sequence can be converted to a binary key

Page 8: Quantum Computers

8

Current State of Affairs

• Current fiber-based distance record: 200 km (Takesue et al)

Page 9: Quantum Computers

9

Quantum Cryptography Setup• Most widely used is the BB84 Protocol developed by IBM

• The sending apparatus consists of a green light-emitting diode, a lens, a pinhole and mirrors that provide a collimated beam of horizontally polarized light. Next, electronic devices known as Pockels Cells are used to change the original horizontal polarization to any of four standard polarization states under the users control

Page 10: Quantum Computers

10

Quantum Cryptography Setup

• The receiving apparatus contains a similar Pockels cell, which

allows the user to choose the type of polarization he will

measure. After the beam passes through hte Pockels Cell, it is

split by a calcite prism into two perpendicularly polarized

beams, which are directed into two photomultiplier tubes for

the purpose of detecting individual photons

Page 11: Quantum Computers

11

Notation

• Representation of polarized photons:– horizontally: – vertically: – diagonally: and

Page 12: Quantum Computers

12

Polarized photons• Measurement of a state not only measures but actually

transforms that state to one of the basis vectors and • If we chose the basis vectors and when measuring the

state of the photon, the result will tell us that the photon's polarization is either or , nothing in between.

ψb

a

Page 13: Quantum Computers

Photon Polarization

Vertical filter

Tilted filter at the angle

The first filter randomizes the measurements of the second filter.

13

Page 14: Quantum Computers

Polarization by a filter

• A pair of orthogonal filters such as vertical/horizontal is called a basis.

• A pair of bases is conjugate if the measurement in the first basis completely randomizes the measurements in the second basis.

• As in the previous slide example for =45deg.

14

Page 15: Quantum Computers

16

The Main contribution of Quantum Cryptography.

• It solved the key distribution problem.• Unconditionally secure key distribution method

proposed by:• Charles Bennett and Gilles Brassard in 1984.• The method is called BB84.• Once key is securely received it can be used to

encrypt messages transmitted by conventional channels.

Page 16: Quantum Computers

17

BB84• Set-up

– Alice• Has the ability to create qubits in two orthogonal bases

– Bob• Has the ability to measure qubits in those two bases.

Page 17: Quantum Computers

BB84

• Alice– Encodes her information randomly in one

of the two bases…• For example,

Basis A Basis B

ᅵ 0〉 = 0 ᅵ +〉 = 0

ᅵ 1〉 = 1 ᅵ -〉 = 1

18

Page 18: Quantum Computers

19

BB84

Alice prepares 16 bits0101100010101100

in the following bases,BAABAABAAAABBBBA

Thus the following states are sent to Bob:+10-10+0101+--+0

Page 19: Quantum Computers

20

BB84

Then Alice and Bob compare their measurement bases, not the results, via a public channel.

Alice’s bits 0101100010101100Alice’s bases BAABAABAAAABBBBAStates sent +10-10+0101+--+0Bob’s bases ABAABAAABABBBBABBob’s results 1-00-0+0+0-+--1+

Page 20: Quantum Computers

22

BB84

• So Bob and Alice are left with 7 useable bits out of 16

_ _ 0 _ _ 0 _ 0 _ 0_ 0 1 1 _ _

These bits will be the shared key they use for encryption.

Page 21: Quantum Computers

23

Quantum Cryptography: The BB84 Portocol Ingredients: 1) One photon no copying,

2) Two non orthonormal bases sets 3) Insecure classical channel; Internet

What it does: Secure distribution of a key, can't be used to send messagesHow it works:

50% correlated Physikalische Blätter 55, 25 (1999)

Page 22: Quantum Computers

24

Alice Sends Polarizations

Bob randomly chooses measurement

Bob records the results

They Check the results

This then becomes the key

Page 23: Quantum Computers

25

BB84

• Now enter Eve… She wants to spy on Alice and Bob.

• So she intercepts the bit stream from Alice, measures it, and prepares a new bit stream to Bob based on her measurements…

Page 24: Quantum Computers

26

BB84

So how do we know when Eve is being nosy?

Well… Eve doesn’t know what bases to measure in, so she would have to measure randomly and 50% of the time she will be wrong…

Page 25: Quantum Computers

27

Eavesdropping• Eve has to randomly select basis for her measurement• Her basis will be wrong in 50% of the time.• Whatever basis Eve chose she will measure 1 or 0• When Eve picks the wrong basis, there is 50% chance that

she'll measure the right value of the bit• E.g. Alice sends a photon with state corresponding to 1 in the

{,} basis. Eve picks the {, } basis for her measurement which this time happens to give a 1 as result, which is correct.

Page 26: Quantum Computers

28

Eves problem

• Eve has to re-send all the photons to Bob • Will introduce an error, since Eve don't know

the correct basis used by Alice • Bob will detect an increased error rate• Still possible for Eve to eavesdrop just a few

photons, and hope that this will not increase the error to an alarming rate. If so, Eve would have at least partial knowledge of the key.

Page 27: Quantum Computers

29

Detecting eavesdropping

• When Alice and Bob need to test for eavesdropping• By randomly selecting a number of bits from the key and

compute its error rate• Error rate < Emax assume no eavesdropping

• Error rate > Emax assume eavesdropping(or the channel is unexpectedly noisy)Alice and Bob should then discard the whole key and start over

Page 28: Quantum Computers

30

Pros

• Nearly Impossible to steal• Detect if someone is listening• “Secure”

Page 29: Quantum Computers

31

Cons

• Price limits length – Normally just for a local network about 10km – Record set by Los Almos is 31 miles– Longer length, signal is absorbed, noise increased

• Availability• Compete with traditional networks

– If was a straight pipe, distance could be limitless

Page 30: Quantum Computers

32

Conclusion

Quantum cryptography is very useful tool for exchange of keys

Actual transmission of data is done with classical algorithms

Alice & Bob can find out when Eve tries to eavesdrop.

Page 31: Quantum Computers

33

References• Wikipedia -The free encyclopedia

• Ppt of Introduction to Quantum Cryptography- Dr. Janusz Kowalik,IEEE talk,Seattle, February 9,2005

• Introduction to quantum computing and crypto:– qubit.org– “Quantum Computing and Communications”,- introductory

technical article on NIST

Page 32: Quantum Computers

34

Thank You


Recommended