H0324143

www.iosrjournals.org

IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 2 (July-Aug. 2012), PP 41-43
www.iosrjournals.org

       Quantum Cryptography Using Past-Future Entanglement
                                                    1
                                                     Smriti Jha
                                   1
                                       (Computer Science, Pune University, India)

Abstract: Quantum Entanglement is an important principle on which Quantum Key Distribution is based.
However, observations of measurements are discussed over a classical channel. Communication using
entangled states is facilitated by Quantum Teleportation and has been the basis for various protocols. The
purpose of this paper is to study the past protocols and present a security perspective on a novel quantum
protocol which modifies the process of Quantum Teleportation. This paper explores the methodology of
Quantum Teleportation and applies the concept to modern cryptographic applications.
Keywords: Entanglement, Past-Future Vacuum Entanglement, Quantum Cryptography, Quantum
Teleportation, Quantum Channel, Ekert Protocol, Qauntum Key Distribution

                                            I.          INTRODUCTION
         Quantum Cryptography’s essence lies in its use of quantum channels instead of classical channels.
These quantum channels are based on the laws of quantum-mechanics, mainly underlining Heisenberg’s
uncertainty principle, superposition principle and the EPR paradox. Over the years, various quantum protocols
have been proposed for Quantum Key Distribution (QKD), which aim to ensure secure communication of the
key between users, Alice and Bob. [1]
         In this paper, we take a brief look at the tested methods of Quantum Cryptography, their mechanism
and introduce recent research done on the subject. A security perspective is provided on the mentioned Quantum
protocol along with future scope of the same.

                             II.            HISTORY OF QUANTUM PROTOCOLS
2.1      BB84 Protocol
         BB84 protocol was proposed by Charles Bennett and Gilles Brassard in 1984 for Quantum Key
Distribution. This protocol is based on Heisenberg’s uncertainty principle and has since been of prominent use.
BB84 protocol realizes a quantum channel which transport polarized photon states from one user to another,
without making any use of entanglement. [2]
         As a prerequisite to the BB84 protocol, measurement is exercised in two different orthogonal bases.
The first orthogonal base is called the rectilinear base with horizontal axis signifying the bit 0 and vertical axis
signifying the bit 1. The second orthogonal base is the diagonal basis with 45 o as bit 0 and 135o as bit 1.
Alice and Bob communicate over this quantum channel with the purpose of fixing a common secret key. First,
Alice chooses a random number of bits, and for each bit chooses a random basis, rectilinear or diagonal. These
photons are then sent to Bob, who is unaware of the basis Alice has chosen for each bit. Bob then proceeds to
measure each photon in a random basis. After this, Alice and Bob compare with each other, over a public
channel, the bases they chose to measure each bit and discard any bit where Bob’s basis of measurement does
not match the one Alice used for that bit.
         In this scenario, if any eavesdropper, say Eve, tries to secretly spy on the channel, it would cause
detectable disturbance in the channel as she would have to measure the photon sent by Alice before sending it to
Bob. This is in conformity with the no cloning theorem which states that Eve cannot replicate a particle of
unknown state. Hence, Eve is forced to guess, which if incorrect would lead to loss of information, by
Heisenberg’s uncertainty principle with Bob having a 50-50 chance of measuring a bit value different from
Alice. This would alert both Alice and Bob and they can drop their communication for ensuring safety of
information.

2.2. Ekert’s protocol
         Artur Ekert introduced a novel approach to quantum key distribution, using entangled states and the
concept of Quantum Teleportation. In Ekert’s implementation, one source of entangled polarized photon is used
to emit pairs of photons which are split between Alice and Bob, with each receiving one photon from the
entangled pair. The rest of the process is almost similar to BB84 protocol, with Alice and Bob independently
choosing their bases of measurements and then keeping the bits which are measured on a common basis. [3]
Different angular orientations can be used for measurements, results of which are then used to determine the


                                                 www.iosrjournals.org                                     41 | Page
Quantum Cryptography Using Past-Future Entanglement
Svalue in Clauser-Horne-Shimony-Holt inequality. Any attempt by eavesdropper to spy on the communication
between Alice and Bob would destroy the entanglement shared between them and hence can be easily detected.
Entanglement is an effective way for QKD as it does not require a random number generator. Recent
experiments have achieved QKD using entangled photons proving their credibility. These attributes make
entanglement of great significance in modern quantum cryptography techniques.

2.3.     Quantum Teleportation
         Quantum Teleportation is a technique of transporting quantum state from one location to another
without disobeying the no cloning theorem.
Alice has a quantum state that she wants to send to Bob:
                               (1)
         But she cannot send the quantum state by measuring it, as it would not give her the value of α or β, but
instead would result in the state |0> with probability |α|2 and in state |1> with probability |β|2.
         To circumvent this issue, Alice and Bob share a Bell state between each other. With the measurements
made on Alice’s quantum state and Bell state, Alice gathers two values b1 and b2 by measuring her qubits,
though her qubits are destroyed in the process. This information is passed onto Bob, who then receives the
quantum state. It is to be noted that without the classical information b1 and b2 from Alice’s end, Bob will fail to
reconstruct the desired quantum state.

                                         III.           RELATED WORK
          In a recent paper published by Carlos Sabin, Borja Peropadre, Marco del Ray, and Eduardo Martin-
Martinez from the Institute of Fundamental Physics in Madrid [4], a new kind of entanglement has been
proposed in which two qubits become entangled with each other without ever physically interacting with each
other.
          The qubit P interacts with the quantum field along an open transmission line for an interval Ton and
then, after a time-lapse Toff, the qubit F starts interacting for a time Ton in a symmetric fashion. After that, past-
future quantum correlations will have transferred to the qubits, even if the qubits do not co-exist at the same
time.
          The physicists have successfully realized this experiment using current technology. The paper puts
forward the idea of quantum teleportation “in time” where information about the quantum state of qubit P 1 is
codified in the field during time Toff and recovered in F using classical information stored in the past. Special
care has been taken in the experiments to disallow any photon exchange which could contribute in correlations,
making the qubits entangled entirely using transference of vacuum correlations. The physicists have shown that
if qubits are separated by given distance r and the interaction can be switched on and off fast enough to have
finite interaction times, then past-future entanglement is possible for qubits with constant energy gaps.
          The paper explores the example of Paula in possession of P, and another qubit P1 which she wants to
teleport to Frank. After the interaction with vacuum field is turned off at –t1, she carries out measurements on
her qubits. After t2, Frank can use the results of Paula’s measurements (stored as classical information) and
manipulate his qubit F, to transfer the state of P1 to F. The fidelity is a function of quantum correlations between
P and F. The information of P1 is coded in the field during Toff irrespective of the resultant state of qubit P after
its interaction and measurement. The information is then recovered during T on in F.

                                   IV.             PROPOSED APPLICATION
          The proposed method focuses on a security technique which is based on the Past-Future Entanglement
where the source of entanglement is neither Alice nor a third-party source which emits pairs of entangled
particles. The source of Entanglement here is the vacuum field, which is the transmission line itself.
This novel quantum protocol has presented Quantum Teleportation “in time”, which points to the fact that the
quantum state of P is transferred to F in a time interval when none of them were coupled to the field. This time
interval is denoted by Toff.
          Communication faces the possibility of an eavesdropper listening on the channel in order to decipher
the messages exchanged between two users. It is a well-known fact that one-time pad is considered the most
secure way of encryption as it has a unique key for each message, though has its own disadvantages due to long
key value.
          The Past-Future Entanglement can serve as a potential technique for Quantum Cryptography. Here P
interacts with the field for Ton before F couples to the field, there is a time interval Toff which is devoid of any
interaction occurring with the vacuum field.
          Let’s say an eavesdropper wants to spy on Alice and Bob’s communication, and interacts with the
transmission line. This would disturb the correlation as Toff requires absolutely no interacting till F is coupled to
the field. Hence, such an intrusion can be detected by the parties. Another thing of notice here is that as none of

                                                www.iosrjournals.org                                        42 | Page
Quantum Cryptography Using Past-Future Entanglement
the qubits are interacting with the vacuum field during Toff, the eavesdropper cannot have any knowledge of the
qubits, which would be eventually required to crack the encrypted key.
          In a scenario where an eavesdropper interferes with the field during Ton, it would still disturb the
entanglement, decreasing the fidelity of the quantum correlations. This would cause Alice and Bob to detect an
intrusion.
          The quantum channel has also proven to support Quantum Teleportation through time where the
classical bits stored in the field are used by qubit F to replicate the quantum state of P 1. Though classical bits can
be extracted by an eavesdropper, say Eve, she would still not know the entangled qubit F, which is required to
derive the quantum state.

                                                V.            CONCLUSION
        This paper has explored the security applications of the novel quantum protocol with respect to Past-
Future Entanglement. Future Scope of the method lies in practical realization of Past-Future Entanglement and
making it accessible. The paper is only focused on the security applications of the quantum channel, which can
be equally applied in various other quantum information processing tasks. Another field of research could be
implementation in device independent quantum cryptography.

                                                         REFERENCES
[1]    Lomonaco, S., J., "A Quick Glance at Quantum Cryptography", November, 1998. http://xxx.lanl.gov/abs/quant-ph/9811056.
[2]    Bennett, C. H. and Brassard, G., "Quantum Cryptography: Public key distribution and coin tossing.", International Conference on
       Computers, Systems & Signal Processing, Bangalore, India, 10-12 December 1984, pp. 175-179
[3]    Ekert, A. K., "Quantum cryptography based on Bell's theorem", Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661 -
       663M
[4]    Carlos Sabín, Borja Peropadre, Marco del Rey, Eduardo Martín-Martínez, “Extracting Past-Future Vacuum Correlations Using
       Circuit QED”, Phys. Rev. Lett. 109, 033602




                                                 www.iosrjournals.org                                                      43 | Page

Recomendados

Quantum cryptography por
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
6.5K vistas15 diapositivas
Quantum cryptography por
Quantum cryptographyQuantum cryptography
Quantum cryptographyNishant Bhardwaj
568 vistas18 diapositivas
Quantum cryptography por
Quantum cryptographyQuantum cryptography
Quantum cryptographyHimanshu Shekhar
1.3K vistas12 diapositivas
Quantum Cryptography por
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
5.6K vistas40 diapositivas
quantumcrypto por
quantumcryptoquantumcrypto
quantumcryptonit jalandhar
882 vistas25 diapositivas
Post quantum cryptography por
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
2.4K vistas35 diapositivas

Más contenido relacionado

La actualidad más candente

Quantum cryptography a modern cryptographic security por
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
1.6K vistas8 diapositivas
1538545 por
15385451538545
1538545ssuserf5429e
56 vistas181 diapositivas
Quantum Cryptography and Possible Attacks-slide por
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
3.9K vistas36 diapositivas
Quantum Cryptography abstract por
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstractKalluri Madhuri
1.7K vistas1 diapositiva
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation por
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic InflationG. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic InflationSEENET-MTP
804 vistas25 diapositivas

La actualidad más candente(14)

Quantum cryptography a modern cryptographic security por Kamal Diwakar
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar1.6K vistas
Quantum Cryptography and Possible Attacks-slide por Arinto Murdopo
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
Arinto Murdopo3.9K vistas
Quantum Cryptography abstract por Kalluri Madhuri
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
Kalluri Madhuri1.7K vistas
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation por SEENET-MTP
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic InflationG. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
SEENET-MTP804 vistas
Y. H. Presentation por yamen78
Y. H. PresentationY. H. Presentation
Y. H. Presentation
yamen78381 vistas
Mehran Shaghaghi: Quantum Mechanics Dilemmas por knowdiff
Mehran Shaghaghi: Quantum Mechanics DilemmasMehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics Dilemmas
knowdiff1.5K vistas
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on... por ijcsta
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...
Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on...
ijcsta418 vistas
NNBAR SESAPS PRESENTATION FINAL por Joshua Barrow
NNBAR SESAPS PRESENTATION FINALNNBAR SESAPS PRESENTATION FINAL
NNBAR SESAPS PRESENTATION FINAL
Joshua Barrow27 vistas
FIESTA: French Initiative for Electronic Simulations with Thousands of Atoms por Claudio Attaccalite
FIESTA:  French Initiative for Electronic Simulations with Thousands of AtomsFIESTA:  French Initiative for Electronic Simulations with Thousands of Atoms
FIESTA: French Initiative for Electronic Simulations with Thousands of Atoms
Claudio Attaccalite467 vistas
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04 por IJNSA Journal
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
IJNSA Journal11 vistas

Destacado

C0361419 por
C0361419C0361419
C0361419iosrjournals
1K vistas6 diapositivas
A0120105 por
A0120105A0120105
A0120105iosrjournals
255 vistas5 diapositivas
E0363638 por
E0363638E0363638
E0363638iosrjournals
140 vistas3 diapositivas
B0120610 por
B0120610B0120610
B0120610iosrjournals
704 vistas5 diapositivas
H0114044 por
H0114044H0114044
H0114044iosrjournals
612 vistas5 diapositivas
I0114549 por
I0114549I0114549
I0114549iosrjournals
1.4K vistas5 diapositivas

Similar a H0324143

Quantum Cryptography Using Past-Future Entanglement por
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementIOSR Journals
147 vistas3 diapositivas
EPR pairs and applications into QIS Poster PDF por
EPR pairs and applications into QIS Poster PDFEPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFarankaila
108 vistas1 diapositiva
Quantum Cryptography presentation por
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
17.8K vistas21 diapositivas
Gull talk London.pdf por
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdfRichard Gill
67 vistas29 diapositivas
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION por
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONijcisjournal
280 vistas13 diapositivas
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf por
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdfQuantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdfKienBuiXuan3
4 vistas15 diapositivas

Similar a H0324143(20)

Quantum Cryptography Using Past-Future Entanglement por IOSR Journals
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future Entanglement
IOSR Journals147 vistas
EPR pairs and applications into QIS Poster PDF por arankaila
EPR pairs and applications into QIS Poster PDFEPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDF
arankaila108 vistas
Quantum Cryptography presentation por Kalluri Madhuri
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
Kalluri Madhuri17.8K vistas
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION por ijcisjournal
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
ijcisjournal280 vistas
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf por KienBuiXuan3
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdfQuantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
Quantum_Remote_Entanglement_for_Medium-Free_Secure.pdf
KienBuiXuan34 vistas
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm... por ijcisjournal
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
ijcisjournal55 vistas
Il teletrasporto dell'energia quantistica por Dario Caliendo
Il teletrasporto dell'energia quantisticaIl teletrasporto dell'energia quantistica
Il teletrasporto dell'energia quantistica
Dario Caliendo22.3K vistas
Quantum Entanglement - Cryptography and Communication por Yi-Hsueh Tsai
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and Communication
Yi-Hsueh Tsai1.2K vistas
Cryptography from Quantum Mechanical Viewpoint por ijcisjournal
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
ijcisjournal5 vistas
Cryptography from quantum mechanical por ijcisjournal
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
ijcisjournal388 vistas
The general theory of space time, mass, energy, quantum gravity por Alexander Decker
The general theory of space time, mass, energy, quantum gravityThe general theory of space time, mass, energy, quantum gravity
The general theory of space time, mass, energy, quantum gravity
Alexander Decker437 vistas
The general theory of space time, mass, energy, quantum gravity por Alexander Decker
The general theory of space time, mass, energy, quantum gravityThe general theory of space time, mass, energy, quantum gravity
The general theory of space time, mass, energy, quantum gravity
Alexander Decker231 vistas
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION por IJNSA Journal
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATIONINTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
INTEGRATING IDENTITY-BASED CRYPTOGRAPHY IN IMS SERVICE AUTHENTICATION
IJNSA Journal7 vistas
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES por IJNSA Journal
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATESQUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
QUANTUM THREE-PASS PROTOCOL: KEY DISTRIBUTION USING QUANTUM SUPERPOSITION STATES
IJNSA Journal33 vistas

Más de iosrjournals

G0145458 por
G0145458G0145458
G0145458iosrjournals
455 vistas5 diapositivas
G0135059 por
G0135059G0135059
G0135059iosrjournals
423 vistas10 diapositivas
G0123541 por
G0123541G0123541
G0123541iosrjournals
473 vistas7 diapositivas
G0113839 por
G0113839G0113839
G0113839iosrjournals
379 vistas2 diapositivas
F0144153 por
F0144153F0144153
F0144153iosrjournals
1K vistas13 diapositivas
F0134249 por
F0134249F0134249
F0134249iosrjournals
498 vistas8 diapositivas

Último

Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
144 vistas12 diapositivas
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue por
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueShapeBlue
93 vistas15 diapositivas
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... por
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
138 vistas18 diapositivas
20231123_Camunda Meetup Vienna.pdf por
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
50 vistas73 diapositivas
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITShapeBlue
166 vistas8 diapositivas
DRBD Deep Dive - Philipp Reisner - LINBIT por
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
140 vistas21 diapositivas

Último(20)

Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... por ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 vistas
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue por ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue93 vistas
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... por ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue138 vistas
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue166 vistas
DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 vistas
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... por ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue146 vistas
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... por ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue154 vistas
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T por ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue112 vistas
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool por ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 vistas
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue123 vistas
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp90 vistas
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue por ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue179 vistas
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue197 vistas
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue181 vistas
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue por ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue222 vistas
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue163 vistas
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 vistas

H0324143

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 2 (July-Aug. 2012), PP 41-43 www.iosrjournals.org Quantum Cryptography Using Past-Future Entanglement 1 Smriti Jha 1 (Computer Science, Pune University, India) Abstract: Quantum Entanglement is an important principle on which Quantum Key Distribution is based. However, observations of measurements are discussed over a classical channel. Communication using entangled states is facilitated by Quantum Teleportation and has been the basis for various protocols. The purpose of this paper is to study the past protocols and present a security perspective on a novel quantum protocol which modifies the process of Quantum Teleportation. This paper explores the methodology of Quantum Teleportation and applies the concept to modern cryptographic applications. Keywords: Entanglement, Past-Future Vacuum Entanglement, Quantum Cryptography, Quantum Teleportation, Quantum Channel, Ekert Protocol, Qauntum Key Distribution I. INTRODUCTION Quantum Cryptography’s essence lies in its use of quantum channels instead of classical channels. These quantum channels are based on the laws of quantum-mechanics, mainly underlining Heisenberg’s uncertainty principle, superposition principle and the EPR paradox. Over the years, various quantum protocols have been proposed for Quantum Key Distribution (QKD), which aim to ensure secure communication of the key between users, Alice and Bob. [1] In this paper, we take a brief look at the tested methods of Quantum Cryptography, their mechanism and introduce recent research done on the subject. A security perspective is provided on the mentioned Quantum protocol along with future scope of the same. II. HISTORY OF QUANTUM PROTOCOLS 2.1 BB84 Protocol BB84 protocol was proposed by Charles Bennett and Gilles Brassard in 1984 for Quantum Key Distribution. This protocol is based on Heisenberg’s uncertainty principle and has since been of prominent use. BB84 protocol realizes a quantum channel which transport polarized photon states from one user to another, without making any use of entanglement. [2] As a prerequisite to the BB84 protocol, measurement is exercised in two different orthogonal bases. The first orthogonal base is called the rectilinear base with horizontal axis signifying the bit 0 and vertical axis signifying the bit 1. The second orthogonal base is the diagonal basis with 45 o as bit 0 and 135o as bit 1. Alice and Bob communicate over this quantum channel with the purpose of fixing a common secret key. First, Alice chooses a random number of bits, and for each bit chooses a random basis, rectilinear or diagonal. These photons are then sent to Bob, who is unaware of the basis Alice has chosen for each bit. Bob then proceeds to measure each photon in a random basis. After this, Alice and Bob compare with each other, over a public channel, the bases they chose to measure each bit and discard any bit where Bob’s basis of measurement does not match the one Alice used for that bit. In this scenario, if any eavesdropper, say Eve, tries to secretly spy on the channel, it would cause detectable disturbance in the channel as she would have to measure the photon sent by Alice before sending it to Bob. This is in conformity with the no cloning theorem which states that Eve cannot replicate a particle of unknown state. Hence, Eve is forced to guess, which if incorrect would lead to loss of information, by Heisenberg’s uncertainty principle with Bob having a 50-50 chance of measuring a bit value different from Alice. This would alert both Alice and Bob and they can drop their communication for ensuring safety of information. 2.2. Ekert’s protocol Artur Ekert introduced a novel approach to quantum key distribution, using entangled states and the concept of Quantum Teleportation. In Ekert’s implementation, one source of entangled polarized photon is used to emit pairs of photons which are split between Alice and Bob, with each receiving one photon from the entangled pair. The rest of the process is almost similar to BB84 protocol, with Alice and Bob independently choosing their bases of measurements and then keeping the bits which are measured on a common basis. [3] Different angular orientations can be used for measurements, results of which are then used to determine the www.iosrjournals.org 41 | Page
  • 2. Quantum Cryptography Using Past-Future Entanglement Svalue in Clauser-Horne-Shimony-Holt inequality. Any attempt by eavesdropper to spy on the communication between Alice and Bob would destroy the entanglement shared between them and hence can be easily detected. Entanglement is an effective way for QKD as it does not require a random number generator. Recent experiments have achieved QKD using entangled photons proving their credibility. These attributes make entanglement of great significance in modern quantum cryptography techniques. 2.3. Quantum Teleportation Quantum Teleportation is a technique of transporting quantum state from one location to another without disobeying the no cloning theorem. Alice has a quantum state that she wants to send to Bob: (1) But she cannot send the quantum state by measuring it, as it would not give her the value of α or β, but instead would result in the state |0> with probability |α|2 and in state |1> with probability |β|2. To circumvent this issue, Alice and Bob share a Bell state between each other. With the measurements made on Alice’s quantum state and Bell state, Alice gathers two values b1 and b2 by measuring her qubits, though her qubits are destroyed in the process. This information is passed onto Bob, who then receives the quantum state. It is to be noted that without the classical information b1 and b2 from Alice’s end, Bob will fail to reconstruct the desired quantum state. III. RELATED WORK In a recent paper published by Carlos Sabin, Borja Peropadre, Marco del Ray, and Eduardo Martin- Martinez from the Institute of Fundamental Physics in Madrid [4], a new kind of entanglement has been proposed in which two qubits become entangled with each other without ever physically interacting with each other. The qubit P interacts with the quantum field along an open transmission line for an interval Ton and then, after a time-lapse Toff, the qubit F starts interacting for a time Ton in a symmetric fashion. After that, past- future quantum correlations will have transferred to the qubits, even if the qubits do not co-exist at the same time. The physicists have successfully realized this experiment using current technology. The paper puts forward the idea of quantum teleportation “in time” where information about the quantum state of qubit P 1 is codified in the field during time Toff and recovered in F using classical information stored in the past. Special care has been taken in the experiments to disallow any photon exchange which could contribute in correlations, making the qubits entangled entirely using transference of vacuum correlations. The physicists have shown that if qubits are separated by given distance r and the interaction can be switched on and off fast enough to have finite interaction times, then past-future entanglement is possible for qubits with constant energy gaps. The paper explores the example of Paula in possession of P, and another qubit P1 which she wants to teleport to Frank. After the interaction with vacuum field is turned off at –t1, she carries out measurements on her qubits. After t2, Frank can use the results of Paula’s measurements (stored as classical information) and manipulate his qubit F, to transfer the state of P1 to F. The fidelity is a function of quantum correlations between P and F. The information of P1 is coded in the field during Toff irrespective of the resultant state of qubit P after its interaction and measurement. The information is then recovered during T on in F. IV. PROPOSED APPLICATION The proposed method focuses on a security technique which is based on the Past-Future Entanglement where the source of entanglement is neither Alice nor a third-party source which emits pairs of entangled particles. The source of Entanglement here is the vacuum field, which is the transmission line itself. This novel quantum protocol has presented Quantum Teleportation “in time”, which points to the fact that the quantum state of P is transferred to F in a time interval when none of them were coupled to the field. This time interval is denoted by Toff. Communication faces the possibility of an eavesdropper listening on the channel in order to decipher the messages exchanged between two users. It is a well-known fact that one-time pad is considered the most secure way of encryption as it has a unique key for each message, though has its own disadvantages due to long key value. The Past-Future Entanglement can serve as a potential technique for Quantum Cryptography. Here P interacts with the field for Ton before F couples to the field, there is a time interval Toff which is devoid of any interaction occurring with the vacuum field. Let’s say an eavesdropper wants to spy on Alice and Bob’s communication, and interacts with the transmission line. This would disturb the correlation as Toff requires absolutely no interacting till F is coupled to the field. Hence, such an intrusion can be detected by the parties. Another thing of notice here is that as none of www.iosrjournals.org 42 | Page
  • 3. Quantum Cryptography Using Past-Future Entanglement the qubits are interacting with the vacuum field during Toff, the eavesdropper cannot have any knowledge of the qubits, which would be eventually required to crack the encrypted key. In a scenario where an eavesdropper interferes with the field during Ton, it would still disturb the entanglement, decreasing the fidelity of the quantum correlations. This would cause Alice and Bob to detect an intrusion. The quantum channel has also proven to support Quantum Teleportation through time where the classical bits stored in the field are used by qubit F to replicate the quantum state of P 1. Though classical bits can be extracted by an eavesdropper, say Eve, she would still not know the entangled qubit F, which is required to derive the quantum state. V. CONCLUSION This paper has explored the security applications of the novel quantum protocol with respect to Past- Future Entanglement. Future Scope of the method lies in practical realization of Past-Future Entanglement and making it accessible. The paper is only focused on the security applications of the quantum channel, which can be equally applied in various other quantum information processing tasks. Another field of research could be implementation in device independent quantum cryptography. REFERENCES [1] Lomonaco, S., J., "A Quick Glance at Quantum Cryptography", November, 1998. http://xxx.lanl.gov/abs/quant-ph/9811056. [2] Bennett, C. H. and Brassard, G., "Quantum Cryptography: Public key distribution and coin tossing.", International Conference on Computers, Systems & Signal Processing, Bangalore, India, 10-12 December 1984, pp. 175-179 [3] Ekert, A. K., "Quantum cryptography based on Bell's theorem", Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661 - 663M [4] Carlos Sabín, Borja Peropadre, Marco del Rey, Eduardo Martín-Martínez, “Extracting Past-Future Vacuum Correlations Using Circuit QED”, Phys. Rev. Lett. 109, 033602 www.iosrjournals.org 43 | Page