SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 2 (July-Aug. 2012), PP 41-43
www.iosrjournals.org

       Quantum Cryptography Using Past-Future Entanglement
                                                    1
                                                     Smriti Jha
                                   1
                                       (Computer Science, Pune University, India)

Abstract: Quantum Entanglement is an important principle on which Quantum Key Distribution is based.
However, observations of measurements are discussed over a classical channel. Communication using
entangled states is facilitated by Quantum Teleportation and has been the basis for various protocols. The
purpose of this paper is to study the past protocols and present a security perspective on a novel quantum
protocol which modifies the process of Quantum Teleportation. This paper explores the methodology of
Quantum Teleportation and applies the concept to modern cryptographic applications.
Keywords: Entanglement, Past-Future Vacuum Entanglement, Quantum Cryptography, Quantum
Teleportation, Quantum Channel, Ekert Protocol, Qauntum Key Distribution

                                            I.          INTRODUCTION
         Quantum Cryptography’s essence lies in its use of quantum channels instead of classical channels.
These quantum channels are based on the laws of quantum-mechanics, mainly underlining Heisenberg’s
uncertainty principle, superposition principle and the EPR paradox. Over the years, various quantum protocols
have been proposed for Quantum Key Distribution (QKD), which aim to ensure secure communication of the
key between users, Alice and Bob. [1]
         In this paper, we take a brief look at the tested methods of Quantum Cryptography, their mechanism
and introduce recent research done on the subject. A security perspective is provided on the mentioned Quantum
protocol along with future scope of the same.

                             II.            HISTORY OF QUANTUM PROTOCOLS
2.1      BB84 Protocol
         BB84 protocol was proposed by Charles Bennett and Gilles Brassard in 1984 for Quantum Key
Distribution. This protocol is based on Heisenberg’s uncertainty principle and has since been of prominent use.
BB84 protocol realizes a quantum channel which transport polarized photon states from one user to another,
without making any use of entanglement. [2]
         As a prerequisite to the BB84 protocol, measurement is exercised in two different orthogonal bases.
The first orthogonal base is called the rectilinear base with horizontal axis signifying the bit 0 and vertical axis
signifying the bit 1. The second orthogonal base is the diagonal basis with 45 o as bit 0 and 135o as bit 1.
Alice and Bob communicate over this quantum channel with the purpose of fixing a common secret key. First,
Alice chooses a random number of bits, and for each bit chooses a random basis, rectilinear or diagonal. These
photons are then sent to Bob, who is unaware of the basis Alice has chosen for each bit. Bob then proceeds to
measure each photon in a random basis. After this, Alice and Bob compare with each other, over a public
channel, the bases they chose to measure each bit and discard any bit where Bob’s basis of measurement does
not match the one Alice used for that bit.
         In this scenario, if any eavesdropper, say Eve, tries to secretly spy on the channel, it would cause
detectable disturbance in the channel as she would have to measure the photon sent by Alice before sending it to
Bob. This is in conformity with the no cloning theorem which states that Eve cannot replicate a particle of
unknown state. Hence, Eve is forced to guess, which if incorrect would lead to loss of information, by
Heisenberg’s uncertainty principle with Bob having a 50-50 chance of measuring a bit value different from
Alice. This would alert both Alice and Bob and they can drop their communication for ensuring safety of
information.

2.2. Ekert’s protocol
         Artur Ekert introduced a novel approach to quantum key distribution, using entangled states and the
concept of Quantum Teleportation. In Ekert’s implementation, one source of entangled polarized photon is used
to emit pairs of photons which are split between Alice and Bob, with each receiving one photon from the
entangled pair. The rest of the process is almost similar to BB84 protocol, with Alice and Bob independently
choosing their bases of measurements and then keeping the bits which are measured on a common basis. [3]
Different angular orientations can be used for measurements, results of which are then used to determine the


                                                 www.iosrjournals.org                                     41 | Page
Quantum Cryptography Using Past-Future Entanglement
Svalue in Clauser-Horne-Shimony-Holt inequality. Any attempt by eavesdropper to spy on the communication
between Alice and Bob would destroy the entanglement shared between them and hence can be easily detected.
Entanglement is an effective way for QKD as it does not require a random number generator. Recent
experiments have achieved QKD using entangled photons proving their credibility. These attributes make
entanglement of great significance in modern quantum cryptography techniques.

2.3.     Quantum Teleportation
         Quantum Teleportation is a technique of transporting quantum state from one location to another
without disobeying the no cloning theorem.
Alice has a quantum state that she wants to send to Bob:
                               (1)
         But she cannot send the quantum state by measuring it, as it would not give her the value of α or β, but
instead would result in the state |0> with probability |α|2 and in state |1> with probability |β|2.
         To circumvent this issue, Alice and Bob share a Bell state between each other. With the measurements
made on Alice’s quantum state and Bell state, Alice gathers two values b1 and b2 by measuring her qubits,
though her qubits are destroyed in the process. This information is passed onto Bob, who then receives the
quantum state. It is to be noted that without the classical information b1 and b2 from Alice’s end, Bob will fail to
reconstruct the desired quantum state.

                                         III.           RELATED WORK
          In a recent paper published by Carlos Sabin, Borja Peropadre, Marco del Ray, and Eduardo Martin-
Martinez from the Institute of Fundamental Physics in Madrid [4], a new kind of entanglement has been
proposed in which two qubits become entangled with each other without ever physically interacting with each
other.
          The qubit P interacts with the quantum field along an open transmission line for an interval Ton and
then, after a time-lapse Toff, the qubit F starts interacting for a time Ton in a symmetric fashion. After that, past-
future quantum correlations will have transferred to the qubits, even if the qubits do not co-exist at the same
time.
          The physicists have successfully realized this experiment using current technology. The paper puts
forward the idea of quantum teleportation “in time” where information about the quantum state of qubit P 1 is
codified in the field during time Toff and recovered in F using classical information stored in the past. Special
care has been taken in the experiments to disallow any photon exchange which could contribute in correlations,
making the qubits entangled entirely using transference of vacuum correlations. The physicists have shown that
if qubits are separated by given distance r and the interaction can be switched on and off fast enough to have
finite interaction times, then past-future entanglement is possible for qubits with constant energy gaps.
          The paper explores the example of Paula in possession of P, and another qubit P1 which she wants to
teleport to Frank. After the interaction with vacuum field is turned off at –t1, she carries out measurements on
her qubits. After t2, Frank can use the results of Paula’s measurements (stored as classical information) and
manipulate his qubit F, to transfer the state of P1 to F. The fidelity is a function of quantum correlations between
P and F. The information of P1 is coded in the field during Toff irrespective of the resultant state of qubit P after
its interaction and measurement. The information is then recovered during T on in F.

                                   IV.             PROPOSED APPLICATION
          The proposed method focuses on a security technique which is based on the Past-Future Entanglement
where the source of entanglement is neither Alice nor a third-party source which emits pairs of entangled
particles. The source of Entanglement here is the vacuum field, which is the transmission line itself.
This novel quantum protocol has presented Quantum Teleportation “in time”, which points to the fact that the
quantum state of P is transferred to F in a time interval when none of them were coupled to the field. This time
interval is denoted by Toff.
          Communication faces the possibility of an eavesdropper listening on the channel in order to decipher
the messages exchanged between two users. It is a well-known fact that one-time pad is considered the most
secure way of encryption as it has a unique key for each message, though has its own disadvantages due to long
key value.
          The Past-Future Entanglement can serve as a potential technique for Quantum Cryptography. Here P
interacts with the field for Ton before F couples to the field, there is a time interval Toff which is devoid of any
interaction occurring with the vacuum field.
          Let’s say an eavesdropper wants to spy on Alice and Bob’s communication, and interacts with the
transmission line. This would disturb the correlation as Toff requires absolutely no interacting till F is coupled to
the field. Hence, such an intrusion can be detected by the parties. Another thing of notice here is that as none of

                                                www.iosrjournals.org                                        42 | Page
Quantum Cryptography Using Past-Future Entanglement
the qubits are interacting with the vacuum field during Toff, the eavesdropper cannot have any knowledge of the
qubits, which would be eventually required to crack the encrypted key.
          In a scenario where an eavesdropper interferes with the field during Ton, it would still disturb the
entanglement, decreasing the fidelity of the quantum correlations. This would cause Alice and Bob to detect an
intrusion.
          The quantum channel has also proven to support Quantum Teleportation through time where the
classical bits stored in the field are used by qubit F to replicate the quantum state of P 1. Though classical bits can
be extracted by an eavesdropper, say Eve, she would still not know the entangled qubit F, which is required to
derive the quantum state.

                                                V.            CONCLUSION
        This paper has explored the security applications of the novel quantum protocol with respect to Past-
Future Entanglement. Future Scope of the method lies in practical realization of Past-Future Entanglement and
making it accessible. The paper is only focused on the security applications of the quantum channel, which can
be equally applied in various other quantum information processing tasks. Another field of research could be
implementation in device independent quantum cryptography.

                                                         REFERENCES
[1]    Lomonaco, S., J., "A Quick Glance at Quantum Cryptography", November, 1998. http://xxx.lanl.gov/abs/quant-ph/9811056.
[2]    Bennett, C. H. and Brassard, G., "Quantum Cryptography: Public key distribution and coin tossing.", International Conference on
       Computers, Systems & Signal Processing, Bangalore, India, 10-12 December 1984, pp. 175-179
[3]    Ekert, A. K., "Quantum cryptography based on Bell's theorem", Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661 -
       663M
[4]    Carlos Sabín, Borja Peropadre, Marco del Rey, Eduardo Martín-Martínez, “Extracting Past-Future Vacuum Correlations Using
       Circuit QED”, Phys. Rev. Lett. 109, 033602




                                                 www.iosrjournals.org                                                      43 | Page

Contenu connexe

Tendances

Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstractKalluri Madhuri
 
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic InflationG. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic InflationSEENET-MTP
 
Y. H. Presentation
Y. H. PresentationY. H. Presentation
Y. H. Presentationyamen78
 
Mehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics DilemmasMehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics Dilemmasknowdiff
 
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...ijcsta
 
NNBAR SESAPS PRESENTATION FINAL
NNBAR SESAPS PRESENTATION FINALNNBAR SESAPS PRESENTATION FINAL
NNBAR SESAPS PRESENTATION FINALJoshua Barrow
 
FIESTA: French Initiative for Electronic Simulations with Thousands of Atoms
FIESTA:  French Initiative for Electronic Simulations with Thousands of AtomsFIESTA:  French Initiative for Electronic Simulations with Thousands of Atoms
FIESTA: French Initiative for Electronic Simulations with Thousands of AtomsClaudio Attaccalite
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
 

Tendances (14)

Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
1538545
15385451538545
1538545
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic InflationG. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
 
Y. H. Presentation
Y. H. PresentationY. H. Presentation
Y. H. Presentation
 
Mehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics DilemmasMehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics Dilemmas
 
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...
 
1808.03183
1808.031831808.03183
1808.03183
 
NNBAR SESAPS PRESENTATION FINAL
NNBAR SESAPS PRESENTATION FINALNNBAR SESAPS PRESENTATION FINAL
NNBAR SESAPS PRESENTATION FINAL
 
820439
820439820439
820439
 
FIESTA: French Initiative for Electronic Simulations with Thousands of Atoms
FIESTA:  French Initiative for Electronic Simulations with Thousands of AtomsFIESTA:  French Initiative for Electronic Simulations with Thousands of Atoms
FIESTA: French Initiative for Electronic Simulations with Thousands of Atoms
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
 

En vedette (8)

C0361419
C0361419C0361419
C0361419
 
A0120105
A0120105A0120105
A0120105
 
E0363638
E0363638E0363638
E0363638
 
B0120610
B0120610B0120610
B0120610
 
H0114044
H0114044H0114044
H0114044
 
I0114549
I0114549I0114549
I0114549
 
H0124246
H0124246H0124246
H0124246
 
A0140107
A0140107A0140107
A0140107
 

Similaire à H0324143

Quantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementIOSR Journals
 
EPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFEPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFarankaila
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdfRichard Gill
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONijcisjournal
 
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdfQuantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdfKienBuiXuan3
 
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...ijcisjournal
 
Il teletrasporto dell'energia quantistica
Il teletrasporto dell'energia quantisticaIl teletrasporto dell'energia quantistica
Il teletrasporto dell'energia quantisticaDario Caliendo
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationYi-Hsueh Tsai
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpointijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanicalijcisjournal
 
The general theory of space time, mass, energy, quantum gravity
The general theory of space time, mass, energy, quantum gravityThe general theory of space time, mass, energy, quantum gravity
The general theory of space time, mass, energy, quantum gravityAlexander Decker
 
The general theory of space time, mass, energy, quantum gravity
The general theory of space time, mass, energy, quantum gravityThe general theory of space time, mass, energy, quantum gravity
The general theory of space time, mass, energy, quantum gravityAlexander Decker
 
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONIJNSA Journal
 

Similaire à H0324143 (20)

Quantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future Entanglement
 
EPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFEPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDF
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
 
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdfQuantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
 
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum
QuantumQuantum
Quantum
 
Quantum Teleportation : Theory and Experiment
Quantum Teleportation : Theory and ExperimentQuantum Teleportation : Theory and Experiment
Quantum Teleportation : Theory and Experiment
 
Il teletrasporto dell'energia quantistica
Il teletrasporto dell'energia quantisticaIl teletrasporto dell'energia quantistica
Il teletrasporto dell'energia quantistica
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and Communication
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
 
Teleportation
TeleportationTeleportation
Teleportation
 
The general theory of space time, mass, energy, quantum gravity
The general theory of space time, mass, energy, quantum gravityThe general theory of space time, mass, energy, quantum gravity
The general theory of space time, mass, energy, quantum gravity
 
The general theory of space time, mass, energy, quantum gravity
The general theory of space time, mass, energy, quantum gravityThe general theory of space time, mass, energy, quantum gravity
The general theory of space time, mass, energy, quantum gravity
 
Report_amit
Report_amitReport_amit
Report_amit
 
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
 

Plus de iosrjournals (20)

G0145458
G0145458G0145458
G0145458
 
G0135059
G0135059G0135059
G0135059
 
G0123541
G0123541G0123541
G0123541
 
G0113839
G0113839G0113839
G0113839
 
F0144153
F0144153F0144153
F0144153
 
F0134249
F0134249F0134249
F0134249
 
F0122934
F0122934F0122934
F0122934
 
F0112937
F0112937F0112937
F0112937
 
E0143640
E0143640E0143640
E0143640
 
E0133641
E0133641E0133641
E0133641
 
E0112128
E0112128E0112128
E0112128
 
D0142635
D0142635D0142635
D0142635
 
D0133235
D0133235D0133235
D0133235
 
D0121720
D0121720D0121720
D0121720
 
D0111420
D0111420D0111420
D0111420
 
C0141625
C0141625C0141625
C0141625
 
C0132131
C0132131C0132131
C0132131
 
C0121116
C0121116C0121116
C0121116
 
B0140815
B0140815B0140815
B0140815
 
B0130820
B0130820B0130820
B0130820
 

Dernier

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Dernier (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

H0324143

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 2 (July-Aug. 2012), PP 41-43 www.iosrjournals.org Quantum Cryptography Using Past-Future Entanglement 1 Smriti Jha 1 (Computer Science, Pune University, India) Abstract: Quantum Entanglement is an important principle on which Quantum Key Distribution is based. However, observations of measurements are discussed over a classical channel. Communication using entangled states is facilitated by Quantum Teleportation and has been the basis for various protocols. The purpose of this paper is to study the past protocols and present a security perspective on a novel quantum protocol which modifies the process of Quantum Teleportation. This paper explores the methodology of Quantum Teleportation and applies the concept to modern cryptographic applications. Keywords: Entanglement, Past-Future Vacuum Entanglement, Quantum Cryptography, Quantum Teleportation, Quantum Channel, Ekert Protocol, Qauntum Key Distribution I. INTRODUCTION Quantum Cryptography’s essence lies in its use of quantum channels instead of classical channels. These quantum channels are based on the laws of quantum-mechanics, mainly underlining Heisenberg’s uncertainty principle, superposition principle and the EPR paradox. Over the years, various quantum protocols have been proposed for Quantum Key Distribution (QKD), which aim to ensure secure communication of the key between users, Alice and Bob. [1] In this paper, we take a brief look at the tested methods of Quantum Cryptography, their mechanism and introduce recent research done on the subject. A security perspective is provided on the mentioned Quantum protocol along with future scope of the same. II. HISTORY OF QUANTUM PROTOCOLS 2.1 BB84 Protocol BB84 protocol was proposed by Charles Bennett and Gilles Brassard in 1984 for Quantum Key Distribution. This protocol is based on Heisenberg’s uncertainty principle and has since been of prominent use. BB84 protocol realizes a quantum channel which transport polarized photon states from one user to another, without making any use of entanglement. [2] As a prerequisite to the BB84 protocol, measurement is exercised in two different orthogonal bases. The first orthogonal base is called the rectilinear base with horizontal axis signifying the bit 0 and vertical axis signifying the bit 1. The second orthogonal base is the diagonal basis with 45 o as bit 0 and 135o as bit 1. Alice and Bob communicate over this quantum channel with the purpose of fixing a common secret key. First, Alice chooses a random number of bits, and for each bit chooses a random basis, rectilinear or diagonal. These photons are then sent to Bob, who is unaware of the basis Alice has chosen for each bit. Bob then proceeds to measure each photon in a random basis. After this, Alice and Bob compare with each other, over a public channel, the bases they chose to measure each bit and discard any bit where Bob’s basis of measurement does not match the one Alice used for that bit. In this scenario, if any eavesdropper, say Eve, tries to secretly spy on the channel, it would cause detectable disturbance in the channel as she would have to measure the photon sent by Alice before sending it to Bob. This is in conformity with the no cloning theorem which states that Eve cannot replicate a particle of unknown state. Hence, Eve is forced to guess, which if incorrect would lead to loss of information, by Heisenberg’s uncertainty principle with Bob having a 50-50 chance of measuring a bit value different from Alice. This would alert both Alice and Bob and they can drop their communication for ensuring safety of information. 2.2. Ekert’s protocol Artur Ekert introduced a novel approach to quantum key distribution, using entangled states and the concept of Quantum Teleportation. In Ekert’s implementation, one source of entangled polarized photon is used to emit pairs of photons which are split between Alice and Bob, with each receiving one photon from the entangled pair. The rest of the process is almost similar to BB84 protocol, with Alice and Bob independently choosing their bases of measurements and then keeping the bits which are measured on a common basis. [3] Different angular orientations can be used for measurements, results of which are then used to determine the www.iosrjournals.org 41 | Page
  • 2. Quantum Cryptography Using Past-Future Entanglement Svalue in Clauser-Horne-Shimony-Holt inequality. Any attempt by eavesdropper to spy on the communication between Alice and Bob would destroy the entanglement shared between them and hence can be easily detected. Entanglement is an effective way for QKD as it does not require a random number generator. Recent experiments have achieved QKD using entangled photons proving their credibility. These attributes make entanglement of great significance in modern quantum cryptography techniques. 2.3. Quantum Teleportation Quantum Teleportation is a technique of transporting quantum state from one location to another without disobeying the no cloning theorem. Alice has a quantum state that she wants to send to Bob: (1) But she cannot send the quantum state by measuring it, as it would not give her the value of α or β, but instead would result in the state |0> with probability |α|2 and in state |1> with probability |β|2. To circumvent this issue, Alice and Bob share a Bell state between each other. With the measurements made on Alice’s quantum state and Bell state, Alice gathers two values b1 and b2 by measuring her qubits, though her qubits are destroyed in the process. This information is passed onto Bob, who then receives the quantum state. It is to be noted that without the classical information b1 and b2 from Alice’s end, Bob will fail to reconstruct the desired quantum state. III. RELATED WORK In a recent paper published by Carlos Sabin, Borja Peropadre, Marco del Ray, and Eduardo Martin- Martinez from the Institute of Fundamental Physics in Madrid [4], a new kind of entanglement has been proposed in which two qubits become entangled with each other without ever physically interacting with each other. The qubit P interacts with the quantum field along an open transmission line for an interval Ton and then, after a time-lapse Toff, the qubit F starts interacting for a time Ton in a symmetric fashion. After that, past- future quantum correlations will have transferred to the qubits, even if the qubits do not co-exist at the same time. The physicists have successfully realized this experiment using current technology. The paper puts forward the idea of quantum teleportation “in time” where information about the quantum state of qubit P 1 is codified in the field during time Toff and recovered in F using classical information stored in the past. Special care has been taken in the experiments to disallow any photon exchange which could contribute in correlations, making the qubits entangled entirely using transference of vacuum correlations. The physicists have shown that if qubits are separated by given distance r and the interaction can be switched on and off fast enough to have finite interaction times, then past-future entanglement is possible for qubits with constant energy gaps. The paper explores the example of Paula in possession of P, and another qubit P1 which she wants to teleport to Frank. After the interaction with vacuum field is turned off at –t1, she carries out measurements on her qubits. After t2, Frank can use the results of Paula’s measurements (stored as classical information) and manipulate his qubit F, to transfer the state of P1 to F. The fidelity is a function of quantum correlations between P and F. The information of P1 is coded in the field during Toff irrespective of the resultant state of qubit P after its interaction and measurement. The information is then recovered during T on in F. IV. PROPOSED APPLICATION The proposed method focuses on a security technique which is based on the Past-Future Entanglement where the source of entanglement is neither Alice nor a third-party source which emits pairs of entangled particles. The source of Entanglement here is the vacuum field, which is the transmission line itself. This novel quantum protocol has presented Quantum Teleportation “in time”, which points to the fact that the quantum state of P is transferred to F in a time interval when none of them were coupled to the field. This time interval is denoted by Toff. Communication faces the possibility of an eavesdropper listening on the channel in order to decipher the messages exchanged between two users. It is a well-known fact that one-time pad is considered the most secure way of encryption as it has a unique key for each message, though has its own disadvantages due to long key value. The Past-Future Entanglement can serve as a potential technique for Quantum Cryptography. Here P interacts with the field for Ton before F couples to the field, there is a time interval Toff which is devoid of any interaction occurring with the vacuum field. Let’s say an eavesdropper wants to spy on Alice and Bob’s communication, and interacts with the transmission line. This would disturb the correlation as Toff requires absolutely no interacting till F is coupled to the field. Hence, such an intrusion can be detected by the parties. Another thing of notice here is that as none of www.iosrjournals.org 42 | Page
  • 3. Quantum Cryptography Using Past-Future Entanglement the qubits are interacting with the vacuum field during Toff, the eavesdropper cannot have any knowledge of the qubits, which would be eventually required to crack the encrypted key. In a scenario where an eavesdropper interferes with the field during Ton, it would still disturb the entanglement, decreasing the fidelity of the quantum correlations. This would cause Alice and Bob to detect an intrusion. The quantum channel has also proven to support Quantum Teleportation through time where the classical bits stored in the field are used by qubit F to replicate the quantum state of P 1. Though classical bits can be extracted by an eavesdropper, say Eve, she would still not know the entangled qubit F, which is required to derive the quantum state. V. CONCLUSION This paper has explored the security applications of the novel quantum protocol with respect to Past- Future Entanglement. Future Scope of the method lies in practical realization of Past-Future Entanglement and making it accessible. The paper is only focused on the security applications of the quantum channel, which can be equally applied in various other quantum information processing tasks. Another field of research could be implementation in device independent quantum cryptography. REFERENCES [1] Lomonaco, S., J., "A Quick Glance at Quantum Cryptography", November, 1998. http://xxx.lanl.gov/abs/quant-ph/9811056. [2] Bennett, C. H. and Brassard, G., "Quantum Cryptography: Public key distribution and coin tossing.", International Conference on Computers, Systems & Signal Processing, Bangalore, India, 10-12 December 1984, pp. 175-179 [3] Ekert, A. K., "Quantum cryptography based on Bell's theorem", Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661 - 663M [4] Carlos Sabín, Borja Peropadre, Marco del Rey, Eduardo Martín-Martínez, “Extracting Past-Future Vacuum Correlations Using Circuit QED”, Phys. Rev. Lett. 109, 033602 www.iosrjournals.org 43 | Page