trondheim 2003 ntnu vadim makarov lecture in "fiberkomponenter" course, november 13, 2003...

29
Trondheim 2003 NTNU Vadim Makarov www.vad1.com/qcr/ Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Upload: albert-french

Post on 03-Jan-2016

222 views

Category:

Documents


7 download

TRANSCRIPT

Page 1: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Vadim Makarov

www.vad1.com/qcr/

Lecture in "Fiberkomponenter" course, November 13, 2003

Quantum CryptographyKvantekryptering

Page 2: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Classical information

Unchanged original

Broken original

Classical vs. quantum information

Perfect copy

Imperfect copy

Quantum information

Page 3: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Qubit: polarization stateof a single photon

Measure?

Measure?50%

50%

Page 4: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

What is the problem with classical cryptography?

Secret key cryptography Requires secure channel for key distribution

In principle every classical channel can be monitored passively

Security is mostly based on complicated non-proven algorithms

Public key cryptography Security is based on non-proven mathematical assumptions

(e.g. in RSA cipher, difficulty of factoring large numbers)

We DO know how to factorize in polynomial time! Shor’s algorithm for quantum computers. Just wait until one is built.

Breakthrough renders messages insecure retroactively

Page 5: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

The holy grail: One-time pad

The only cipher mathematically proven Requires massive amounts of key material

(key of same length as message, used only once)

m m

k k

c

Page 6: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Encoder Decoder

Open (insecure) channelBobAlice

Key

Secure channel

MessageMessage

Encoded message

Key distribution

Secret key cryptography requires secure channel for key distribution. Quantum cryptography distributes the key by transmitting quantum

states in open channel.

Page 7: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Quantum key distribution

Retained bit sequence 1 – – 1 0 0 – 1 0 0 – 1 – 0Bob’s measurement 1 0 0 1 0 0 1 1 0 0 0 1 0 0

Bob’s detection basisAlice’s bit sequence 1 0 1 1 0 0 1 1 0 0 1 1 1 0

Light source

Alice

Bob

Diagonal detector basis

Horizontal-vertical detector basis

Diagonal polarization filters

Horizontal-vertical polarization filters

Image reprinted from article: W. Tittel, G. Ribordy, and N. Gisin, "Quantum cryptography," Physics World, March 1998

NTNU

Page 8: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Sender

50%

50%

50%

50%50%

50%

Eavesdropper Receiver

"0"

"1"

"1"

"0"

Sender

"0"

"0"

"1"

"0"

"1"

"1"

"0"

"1"

"0"

"1"

"0"

"1"

Rett

Galt

Rett

Rett

Galt

Rett

Rett

Galt

Rett

Rett

Galt

Rett

Tyvlytter

Resultat av målingMottaker

Rett

RettGaltRettGalt

Rett

RettGaltRettGalt

Rett

RettGaltRettGalt

Rett

RettGaltRettGalt

Referanse

Galt

Rett

Galt

Rett

Galt

Rett

Galt

Rett

Eavesdropping with wrong reference system

Page 9: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

1

SourceD0

D1

Sender (Alice) Receiver (Bob)L1

L2

S1 S2

Transmission line

1 = 0 or 90 - "1" Reference systems:

2 = 0

2 = 90 1 = 180 or 270 - "0"

Interferometric QKD channel

Page 10: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Implementation: interferometer structure

Bob

Laser

APD

1300 nm (or 1550 nm)

Pulse Rate = 10 MHz

LineStandardSM fiber

PolarizationController

Attenuator

Alice's PC

PublicCommunicationChannel

Bob's PC

Eve's Territory

PolarizationCombiner

PolarizationCombiner

PhaseModulator 2

PolarizingSplitter

Phase Modulator 1

PM Coupler50/50

VariableDelay LinePolarizer

Variable RatioPM Coupler

PM fiber

PM fiber'1'

'0'

Alice

Page 11: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Photo 1. Alice (uncovered, no thermoisolation installed)

Page 12: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Photo 2. Bob (uncovered, no thermoisolation installed)

Page 13: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

20 GHz travelling-wave phase modulator, 1300 nm(manufacturer: Uniphase)

Page 14: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Results of electrical breakdown in the waveguide(microphotograph)

Page 15: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Real-time phase trackingin the interferometer

Due to thermal drift, interferometer needs automatic phase adjustment every few seconds.

Phase adjustment takes 0.3 s and requires no additional components, e.g. no variable attenuator.

Page 16: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Photo 4. Bob (left) and Alice (right), thermoisolation partially installed

Page 17: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

tgate down to 1ns

gate pulse rate = 20 MHz

VB

t

T=1/(gate pulse rate)

VE

Vbias

tgate-VAPD

Single-photon detector:APD in Geiger mode

APD Inside CryostatC = CAPD

DifferentialAmplifier

Transmission Lines, Z=50

Gate Pulse Generator Bias

Epitaxx APD

Page 18: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Timing resolution of photon detection

Dark counts within 5ns gate

Photon counts due to 75 ps laser pulse

FWHM 200 ps

Page 19: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Recovery from errors

Individual attacks: 15% All theoretically possible attacks: 11%(?)

QBER limit:

Eve’s information

Bob’s information

Page 20: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Distance limitation

,nm

Fiberattenuation,

dB/kmDetectors

850 2 Si, room temperature1300 0.35 Ge, -196C1550 0.2 InGaAs, 60C

Maximum link distance, km

Detector noise level (dark count probability)

00 Few %

20

70

5E-5

30

5

1550 nm

850 nm

1300 nm

Page 21: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Components of security

1. Conventional security

2. Security against quantum attacks

3. Security against Trojan horse attacks - ones that don’t deal with quantum states, but use loopholes

in optical scheme

Alice Bob

2 311

Page 22: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Practical security: large pulse attack

Alice

Line

Attenuator

Alice's PC

Eve’s Equipment

Phase Modulator

- interrogating Alice’s phase modulator with powerful external pulses(can give Eve bit values directly)

Page 23: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Typical values of reflection coefficients for different fiber-optic components(courtesy Opto-Electronics, Inc.)

Page 24: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Eavesdropping experiment

Laser

Phase Modulator

Alice 4% reflection

Vmod

OTDR

Out

In

Fine length adjustment

to get L1 = L2

L2

L1

Received OTDR pulse

Vmod, V4.1 8.20

Variable attenuator

Eve

Page 25: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Photo 3. Artem Vakhitov tunes up Eve’s setup

Page 26: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Re-keying satellites/Global key distribution network

1.9 km10 km

23.4 km

Page 27: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Quantum key distribution infiber-optic network

Multi-user key distribution

Multiplexing with telecom traffic

Alice Bob 2

Bob 1

Bob 3

Passive splitter

BobAlice28 km

Data transmitter

Data receiver

1300 nm

1550 nm 1.2 Gbit/s

WDM WDM

Page 28: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

Commercial status

Two small companies trying to sell QKD systems:

id Quantique (Geneva) 2002

MagiQ Technologies (Boston) November 2003

+ several telecom/ electronics companies, research groups keep close eye on commercializing but don't develop a production version yet.

Navajo

Page 29: Trondheim 2003 NTNU Vadim Makarov  Lecture in "Fiberkomponenter" course, November 13, 2003 Quantum Cryptography Kvantekryptering

Trondheim 2003

NTNU

DiplomaThesis

Available!

Faglærere: Dag R. Hjelme, Astrid Dyrseth