Académique Documents
Professionnel Documents
Culture Documents
Presented by:-
CONTENTS
MOTIVATION INVENTORS FUNDAMENTAL BB84 PROTOCOL DETECTING EAVESDROPPING PROS & CONS CURRENT STATE OF AFFAIRS FUTURE PROSPECTS CONCLUSION
Motivation
Age of Information
Information is valuable Protecting that Information
INVENTION
of The BB84 QKD protocol
THE INVENTORS
Fundamentals
Measurement causes perturbation No Cloning Theorem Thus, measuring the qubit in the wrong basis destroys the information.
a z e r t
a z e r t u i p q s d f g h j k l m w x c v s z
a z e r t
f g h j k l m w x
g h j k l m w x c v b / s z
a z e r t y u i o p q s d f g h j k l m w x c v b n ? . / s
a z e r t
a z e r t y u
a z e r t y u i o p
a z e r t y u i o p q s d
a z e r t y u i o p
BB84 PROTOCOL
u i o p q s d f g h j k l m w x n ? . / s z g h j k l m w x c
a z e r t y u
a z e r t
Alice
a z e r t y u i o p q s d f g h j k l
a z e r t y
a z e r t
a z e R q s d
a z e r t y
Bob
f g h j k l m w . / s z
g h j k l m w x c v b n ? . / s z
SET UP
a z e r t y u i o p q s d f g h j k l m w x c v b n ? . / s
a z e r t y u i o p q s d f g h j k l m w x
a z e r t y u i o p q s d f g h j k l m w x c z
a z e r t y u i o p q S b n ? . / s z
a z e r t y u i o p q s d f g h j k l m w
BB84 PROTOCOL
Alice
Encodes her information randomly in one of the two bases
For example,
Basis A Basis B 0= 0 --= 0 /= 1 |= 1
BB84 PROTOCOL
BAABAABAAAABBBBA
in the above bases
0101100010101100
15
BB84 PROTOCOL
Alices bits
0101100010101100
Bobs bases ABAABAAABABBBBAB Bobs results /|00|0-0-0|-||/Then Alice and Bob compare their measurement bases, not the results, via a public channel.
16
17
BB84 PROTOCOL
Bob receives the stream of qubits and measures each one in a random basis:
ABAABAAABABBBBAB
So he gets, **0**0*0*0*-||** Then Alice and Bob compare their measurement bases, not the results, via a public channel.
18
BB84 PROTOCOL
These bits will be the shared key they use for encryption.
BB84 PROTOCOL
Now enter Eve She wants to spy on Alice and Bob. So she intercepts the bit stream from Alice, measures it, and prepares a new bit stream to Bob based on her measurements So how do we know when Eve is being nosy? Well Eve doesnt know what bases to measure in, so she would have to measure randomly and 50% of the time she will be wrong Eve is found in the errors!
WHY ???
Detecting eavesdropping
When Alice and Bob need to test for eavesdropping
By randomly selecting a number of bits from the key and compute its error rate
Error rate > Emax assume eavesdropping (or the channel is unexpectedly noisy) Alice and Bob should then discard the whole key and start over
Distance Limitations
Current fiber- QC providers -: Commercial Commercial Demonstrated free-space link: 10 km basedquantum key distance id Quantique, Geneva Switzerland. MagiQ km record: 200 Technologies, NY City distribution NEC Tokyo (Takesue et al) exist products
QinetiQ
Future Prospects
Ground-to-satellite, satellite-to-satellite links General improvement with evolving qubit-handling techniques, new detector technologies
CONCLUSION
The ability to detect eavesdropping ensures secure exchange of the key The use of one-time-pads ensures security Equipment can only be used over short distances Equipment is complex and expensive