SlideShare une entreprise Scribd logo
1  sur  13
Quantum Cryptography:Public key distributionand coin tossing Charles H.Bennett Gilles Brassard International Conference on Computers, Systems & Signal Processing,1984 Speaker:陳君翰 Quantum Information Security Lab Professor: Tzonelih Hwang
Outline Background Introduction BB84 Protocol Conclusion
Background Quantum Cryptography: Public key Distribution Charles H. Bennett, Gilles Brassard International Conference on Computers, Systems & Signal Processing,1984 First Quantum key distribution protocol
Introduction Quantum cryptosystem:Base on property of quantum:1.The uncertainty of measurement2.Nocloning theory
BB84 Protocol Bit:0 Bit:1 ,[object Object],R Base 0 ° 90 ° D Base 45 ° -45 ° Quantum channel: with the property of quantum. Classical channel: authentic channel
BB84 Protocol concept QB(T) B’ Alice T’= T= B’= B= B’’=Correct bases of B’ Randomly choose half of B’’ to discuss with Alice Bob [P(B’’(1)),V(B’’(1))]………….[P(B’’(N/4)),V(B’’(N/4))] Verify ok or eavesdroppers exist
Case 1:No eavesdroppers 1  0  1  0  1  1  1  1 D R D R D R D R Alice 1  0 1  0  1 1 1 1D DDDR RRR1    2     3    4     5    6    7   8  1  0 1  101  0 1D RD R  D R D R1    2     3    4      5    6    7    8  1  0 1  1  0 1  0 1D R D R  D R D R1    2     3    4      5    6    7    8  1  0 1  0  1 1 1 1D DDDR RRR1    2     3    4     5    6    7   8 1,3,6,8 Position 1,3,6,8  are the same base Randomly choose numbers to discuss with Alice Bob (6,1),(8,1) ok
Case 2:Have eavesdroppers Assume use D base 1  0  1  0  1  1  1  1 D R D R D R D R Alice 1  0 1  0  1 1 1 1D DDDR RRR1    2     3    4     5    6    7   8  1  0 1  111 10D RD R  D R D R1    2     3    4      5    6    7    8  1  0 1  1  1 1  1 0D R D R  D R D R1    2     3    4      5    6    7    8 1  0 1  0  1 1 1 1D DDDR RRR1    2     3    4     5    6    7   8 1  0 1  0  1 1 1 1D DDDR RRR1    2     3    4     5    6    7   8 1  0 1  1  1 1  1 0D R D R  D R D R1    2     3    4      5    6    7    8 1,3,6,8 Bob Eve (6,1),(8,0) Eavesdropper exist!
Analysis BB84 Protocol Probability of eavesdropper : 1 bit: N bit: When N ↑,it’s easier to detect eavesdroppers exist or not.
Analysis BB84 Protocol Cont. Qubit efficient: N bits B’ Alice Correct bases of B’ (R,R)    (D,D)   (R,D) (D,R) N/2 bits (R,R)    (D,D)   (R,D) (D,R) Discussion Security/Not security Bob N/4 bits to discuss N/4 bits as key
Qubit efficiency: Utilization is only 25%!
Conclusion Advantages: Without exchanging information initially. Eavesdroppers can be detected. Disadvantages: Low utilization Photons may be lost in transmitting
                 Thank you

Contenu connexe

Tendances

Parity bits
Parity bitsParity bits
Parity bits
mrhaken
 

Tendances (20)

8051 serialp port
8051 serialp port8051 serialp port
8051 serialp port
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides
 
DATA TRANSFER SCHEMES OF 8085
DATA TRANSFER SCHEMES OF 8085DATA TRANSFER SCHEMES OF 8085
DATA TRANSFER SCHEMES OF 8085
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
 
Error Correction And Hamming Code Ibrar
Error Correction And Hamming Code IbrarError Correction And Hamming Code Ibrar
Error Correction And Hamming Code Ibrar
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Clock divider by 3
Clock divider by 3Clock divider by 3
Clock divider by 3
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Dc ch11 : routing in switched networks
Dc ch11 : routing in switched networksDc ch11 : routing in switched networks
Dc ch11 : routing in switched networks
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Stop And Wait
Stop And WaitStop And Wait
Stop And Wait
 
BOOTP and DHCP.ppt
BOOTP and DHCP.pptBOOTP and DHCP.ppt
BOOTP and DHCP.ppt
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Parity bits
Parity bitsParity bits
Parity bits
 
information theory
information theoryinformation theory
information theory
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

陳君翰 BB84 0718

  • 1. Quantum Cryptography:Public key distributionand coin tossing Charles H.Bennett Gilles Brassard International Conference on Computers, Systems & Signal Processing,1984 Speaker:陳君翰 Quantum Information Security Lab Professor: Tzonelih Hwang
  • 2. Outline Background Introduction BB84 Protocol Conclusion
  • 3. Background Quantum Cryptography: Public key Distribution Charles H. Bennett, Gilles Brassard International Conference on Computers, Systems & Signal Processing,1984 First Quantum key distribution protocol
  • 4. Introduction Quantum cryptosystem:Base on property of quantum:1.The uncertainty of measurement2.Nocloning theory
  • 5.
  • 6. BB84 Protocol concept QB(T) B’ Alice T’= T= B’= B= B’’=Correct bases of B’ Randomly choose half of B’’ to discuss with Alice Bob [P(B’’(1)),V(B’’(1))]………….[P(B’’(N/4)),V(B’’(N/4))] Verify ok or eavesdroppers exist
  • 7. Case 1:No eavesdroppers 1 0 1 0 1 1 1 1 D R D R D R D R Alice 1 0 1 0 1 1 1 1D DDDR RRR1 2 3 4 5 6 7 8 1 0 1 101 0 1D RD R D R D R1 2 3 4 5 6 7 8 1 0 1 1 0 1 0 1D R D R D R D R1 2 3 4 5 6 7 8 1 0 1 0 1 1 1 1D DDDR RRR1 2 3 4 5 6 7 8 1,3,6,8 Position 1,3,6,8 are the same base Randomly choose numbers to discuss with Alice Bob (6,1),(8,1) ok
  • 8. Case 2:Have eavesdroppers Assume use D base 1 0 1 0 1 1 1 1 D R D R D R D R Alice 1 0 1 0 1 1 1 1D DDDR RRR1 2 3 4 5 6 7 8 1 0 1 111 10D RD R D R D R1 2 3 4 5 6 7 8 1 0 1 1 1 1 1 0D R D R D R D R1 2 3 4 5 6 7 8 1 0 1 0 1 1 1 1D DDDR RRR1 2 3 4 5 6 7 8 1 0 1 0 1 1 1 1D DDDR RRR1 2 3 4 5 6 7 8 1 0 1 1 1 1 1 0D R D R D R D R1 2 3 4 5 6 7 8 1,3,6,8 Bob Eve (6,1),(8,0) Eavesdropper exist!
  • 9. Analysis BB84 Protocol Probability of eavesdropper : 1 bit: N bit: When N ↑,it’s easier to detect eavesdroppers exist or not.
  • 10. Analysis BB84 Protocol Cont. Qubit efficient: N bits B’ Alice Correct bases of B’ (R,R) (D,D) (R,D) (D,R) N/2 bits (R,R) (D,D) (R,D) (D,R) Discussion Security/Not security Bob N/4 bits to discuss N/4 bits as key
  • 12. Conclusion Advantages: Without exchanging information initially. Eavesdroppers can be detected. Disadvantages: Low utilization Photons may be lost in transmitting
  • 13. Thank you