What is quantum cryptography? (풀잎스쿨 14기)

Let’s talk about quantum cryptography focused on quantum key distribution.

This page is based on a presentation, Quantum Cryptography, and a book, Quantum Computing Explained (translated in Korean). Please check the presentation if you do not have enough time to read this whole page. Then shall we start?

1. Key distribution

Key distribution is important in cryptography. The key is a main thing to encrypt and decrypt messages.

There is an easy example to understand how a key works: Caesar cipher. This one has a same key to encrypt and decrypt. If you want to encrypt a message, just plus the key value to each character. Minus the key value to decrypt. The picture below shows how this method works where the key value is 3.

Caesar

Alice send EDG to Bob. Bob will know the key is 3 and get the real message, BAD, right away. At first, Eve cannot understand Alice’s message. However, she will know somehow what the key is while analysing messages and it is true this encryption is really easy to break: just use brute forcing with random key values in 1 to 25. (Alphabet length is 26.)

Therefore, we should use more difficult encryption that is hardly breakable.

2. RSA: use mathematical algorithms

rsa

RSA is a public-key cryptosystem, so it uses two keys. Encrypt the message with public key and decrypt it with private key. I will skip the details because it is not the main part. If you want to know how to generate these two keys, please check my til: RSA algorithm.

3. Quantum key distribution: use quantum mechanics

qkd

Quantum key distribution (QKD) uses not only quantum communication but also classical one. The former is for QKD and the latter is for comparing base each other. These base are different on each protocol. There are three protocols: BB84, B92, and B91. All the protocols are based on three principles: (1) no-cloning theorem, (2) wave function collapse, and (3) irreversibility of measurement.

(1) BB84

슬라이드10

Alice and Bob choose between two bases for each qubit and compare their base. If their base are different, remove the result of that position. The remaining result is a final key called shifted key. After they make shifted keys, they should compare that two keys are same. If error rate is too high, send a new quantum key again. (High error means Eve transformed the quantum key with measurement while distributing.)

(2) B92

슬라이드11

The number of base in B92 protocol is same as BB84, but the result states are divided simply 2, not 4. It is much simple than previous one because Alice and Bob do not have to compare their base. In this protocol, only Bob send positions of |1> and |1'> after his measurement.

(3) B91

슬라이드12

B91 use two bell states as bases. It is same as BB84 at comparing base and the number of result states is same as B92. The results are exactly same each other after removing the positions which base are different. (So this one is the simplest!)

References


‘본 포스팅은 모두의연구소(home.modulabs.co.kr) 풀잎스쿨에서 진행된 ‘QML 이해를 위한 QC 입문(Part1)’ 과정 내용을 공유 및 정리한 자료입니다.’


💬 Any comments and suggestions will be appreciated.

Leave a comment