Sunteți pe pagina 1din 11

Quantum Key Distribution

Yet another method of generating a key.


Two major methods
BB84 E91
Alice generates entangled Device between Alice and Bob
photons: orthogonal or generates entangled photons.
diagonal. Alice and Bob read photons as
Bob reads photon as orthogonal orthogonal or diagonal.
or diagonal. They compare notes on which
They compare notes on which they chose.
they chose. Keep results from the same
Keep results from the same ones.
ones.
Information reconciliation.
• Cascade Protocol:
• Divide Key into blocks.
• Using public channel, check blocks for parity.
• If parity violated, binary search.
• If error is from previous block that matched
parity, that block has two errors.
• Recursively done, thus name.
• Errors found, yet Eve gains more knowledge.
Privacy Amplification.
• If key is found to have been compromised.
• Use a universal hash function to cut key to
shorter length.
• Shortening amount determined by amount
Eve likely has found.
Methods of Attack
• Intercept and resend.
• Man in the Middle
• Photon Number Splitting.
• Hacking.
• Denial of Service.
Intercept and Resend
• Eve reads photons sent to Bob in orthogonal
or diagonal.
• Resends photon in same state she read.
• 25% error rate found between Alice and Bob:
50% chance of right angles, if wrong, 50%
chance that Bob reads it right anyways.
• Pd=1-(3/4)n where n is number of bits.
• In order for Pd=0.999999999, n≥72.
Man in the Middle
• When there is no authentication, quantum
systems cannot tell friend or foe any better
than classical systems.
• If Alice and Bob have no shared secret, they
cannot make a secure line.
Photon number splitting
• Only works on BB84.
• Photons sent via laser pulses.
• Laser pulses are .2 photons, actual numbers
follow Poisson.
• Many 0s, some 1s, some 2+ photon pulses.
• Eve reads off singles of the 2+ photon pulses.
Hacking
• Equipment tampered with to not generate
actual random numbers.
• Trojan Horse: shine light on Alice’s emitter to
find her state.
• Faked State
• Phase remapping
• Time Shift
Denial of Service
• Without any lines of communication, no key
can be made.
• Not a security issue so much as a
communication issue.
Overall value of QKD
• Worthwhile for instantaneous generation of
key over a distance.
• Otherwise, one-use keys just as secure.
• QKD currently feasible up to 148km in fiber-
optic.
• Could be used to generate keys between
servers.
• Still subject to brute-force hacking.

S-ar putea să vă placă și