Quantum Cryptography A Review
Quantum Cryptography A Review
Indian Journal of Science and Technology, Vol 10(3), DOI: 10.17485/ijst/2017/v10i3/110635, January 2017 ISSN (Online) : 0974-5645
Abstract
Background/Objectives: The preferment from conventional computing to quantum computing has created new
challengesinthefieldofcryptography.Thecryptographicalgorithmswhichensuredintractabilityinconventionalcomput-
ingsurfacesseriouschallengeinquantumcomputing.Methods/Statistical Analysis:Byapplyingthequantummechanics
quantumcryptographycanbeusedtounrestrictedlyforreliabledatacommunications.Findings:Thecryptographycur-
rently in use, known as conventional cryptography, depends absolutely on the hardness of the mathematical concepts.
Ellipticalcurvecryptographytodayknownasmoderncryptographyisusedextensivelyforsecuringfinancialtransactions.
Advancesinquantumcomputing,caneasilybreakthissecuritybyreversecomputingkeysfasterthantheconventional
computers.Application/Improvements:Thispaperisanattempttoreviewfundamentalsofquantumcryptographytoas
torepresentitineasiestpossiblewayforanovicedemonstratingquantumonetimepad.
Keywords:ConventionalCryptography,DensityMatrix,QuantumCryptography,QuantumOneTimePad
long key, a key as long as the plain text. Practically it is cryptography is achievable over shorter distance. In the
very difficult to deal with long keys from implementa- next section we discuss the concept of quantum encryp-
tion perspective. In 1940, the seminal paper of Shannon15 tion with the help of quantum one time pad.
changed the way to look at cryptography. He put forth a
very fundamental idea of Information Theoretic Security
i.e., the cipher text should not reveal the information 3. Classical and Qubits
about the plain text. Cryptography was thereafter viewed
3.1 Classical Bits
as more applied stream of mathematics and information
theory. Since then several cryptographic algorithms were The classical information is represented using classical
proposed. To make OTP practical the stream ciphers were bits i.e. 0 and 1. Classical cryptography works on classi-
introduced. The basic idea behind stream ciphers was to cal bits. Quantum cryptography works on quantum bits
pseudorandom key instead of random key. Stream cipher also called as qubits. A qubit can be in a superposition
cannot be termed as perfectly secure because the key size between zero and one. Qubits are different from classical
is small. As we know from OTP that for being perfectly bits for e.g. they cannot be copied.
secure the key length must be greater than or equal to The reason that the quantum cryptography needs to
the message being encrypted. Thus the security of the be dealt separately from the classical cryptography is that
stream cipher lies with the pseudorandom generator the information represented in both is different.
which needs to hold the property of being unpredictable. Referring to the various sources of quantum cryptog-
Symmetric algorithms were being used mostly DES19 raphy as listed in references below, the next section is an
made its own place in the history. However, the limita- attempt to put forth essential of qubit.
tions of symmetric key gave birth to the concept of public
key cryptography9. 3.2 Qubits
These algorithms were based on integer factorization Before we see qubit, a special way to write vectors known
or discrete logarithms or elliptical curves and also efforts as “bra-ket” notation needs to be understood. Let be
were made to propose algorithms based on two hard the vector, then we write to denote a vector in
problems. The well-known example of integer factoriza- a two dimensional vector space. For example, the “ket” of
tion based algorithm is RSA10, proposed in 1978 based on vector is .
the concept of public key cryptography proposed by Diffie The bra of this vector is triangle transpose, T denotes
and Hellman9 in 1976. The strength of this algorithm the transpose.
motivated several researchers in the field of cryptography
to propose new cryptographic algorithms with RSA as the
(1)
basis. The example of discrete logarithm based cryptogra-
phy is the one proposed by Elgamal in 198511. * denotes the entry wise conjugate, and Thus a “ket”,
To attain high level security obligation, the key size of denoted is a d-dimensional column vector and the
the conventional public key cryptosystem has to be suf- “bra” is a d- dimensional row vector.
ficiently large, which in lower speed and consumption Let us write the classical bits as:
of more bandwidth. To overcome this problem the solu-
tion that came up was the elliptical curve cryptosystem.
Elliptical curve cryptosystem was discovered in 1985 by
Victor Miller and Neil Koblitz19.
3.2.1 Definition of a Qubit
Quantum cryptography was originated by Bennett
,Bassard and Wiesner13. Quantum coding was first intro- A state of a qubit can be represented as a 2-dimentional
duced by Wiesner15 in 1983. Then Bennet and et.al.17 ket vector , therefore
used quantum coding in conjunction with public key
(2)
cryptographic techniques to yield several schemes for
unforgeable subway tokens. Several others contributed where α and β and are the amplitudes. And,
to quantum cryptography and quantum key distribution.
Though quantum computing is not that feasible, quantum |α|2+ |β|2=1 (3)
2 Vol 10 (3) | January 2017 | www.indjst.org Indian Journal of Science and Technology
Seema S. Kute and Chitra G. Desai
Inner product helps us to decide upon whether the Table 1. Representation of classical bits and Qubits24.
qubit is a valid qubit. 2 Classical Bits 2 Qubits (Quantum Bits)
(4) 00 α 00
01 β 01
10 μ 10
11 € 11
So this is a qubit.
For example, Let us consider a qubit
3.2.2 Density Matrix
Suppose is the number of qubits then, we define qubit as
a vector in a complex space of dimension . Practically
We have, we will deal with more than one qubit at a time and there-
fore it is not possible to work with qubits by representing
Let, & them into vectors. It is required that the vectors be rep-
resented as matrix. To describe the quantum system in a
Hence, =
mixed state we use density matrix24. The density matrix is
To check whether it is a valid qubit, we have denoted by (rho). The matrix ρ, associated to the state
Ψ can be computed by taking the ket of Ψ times the bra of
Ψ, which is just the outer product.
(7)
Thus, it is a valid qubit. The quantum states of a qubits
are given by: Consider, the mixed state with probability and
with probability .
Then,
, with
The state of one of many qubits is given by tensor and
product for example the state of two qubits (A & B) in
terms of a vector is,
(6)
Vol 10 (3) | January 2017 | www.indjst.org Indian Journal of Science and Technology 3
Quantum Cryptography: A Review
(8)
And the decryption function is:
As we know that Eve knows nothing about the key .
(9) So the probability that is and is .
Therefore:
One time pad has perfect secrecy i.e., from the cipher
text we will not be able to obtain any information about the
encrypted plain text if we do not know the key. However
to obtain perfect secrecy, the key length must greater than
or equal to message length which is difficult for practical Considering the standard basis we get:
implementation. Also the key K must be used only once
and never used again (Figure 1).
The maximally mixed state which is independent
5. Quantum One Time Pad of the message . Therefore Eve cannot gain anything
about the message from it.
Using quantum one time pad16,18 we demonstrate here
how the qubit is encrypted. The following example dem-
onstrates quantum encryption scheme. Let Alice and Bob 6. Conclusion
send a qubit to Bob using the key . Quantum computing has changed the way the con-
Let Eve be an intruder who tries to listen the com- ventional systems use to function using classical bits.
munication between Alice and Bob but cannot learn Quantum systems use qubits which are very much dif-
anything about ferent in nature as compared to the classical bits. All
Before sending the message Alice performs conventional cryptographic algorithms turn futile in
some operation on that depends on key . Eve who front of quantum computing due to enormous speed at
knows nothing about the key sees some state . When which these algorithms operate. The present paper briefs
reaches Bob he applies some decryption function. Using the journey of cryptography from classical one time pad
the decryption function Bob applies transformation using to quantum cryptography. Then the difference between
the key to obtain the sate classical bits and qubits along with the representation is
Let us consider the classical bit m in terms of standard presented referring to the various sources in the refer-
basis as a quantum state i.e.: ences. Finally, the classical one time pad and quantum
(10) one time pad are demonstrated.
4 Vol 10 (3) | January 2017 | www.indjst.org Indian Journal of Science and Technology
Seema S. Kute and Chitra G. Desai
5. Bennett CH. Quantum Cryptography using any Two 14. Shor PW. Polynomial-Time Algorithms for Prime
Non Orthogonal States, Physical Review Letters.1992; Factorization and Discrete Logarithms on a Quantum
68(21):3121−24. Computer, SIAM J. Comp. 1997; 26:1484. See also quant-
6. Bennett CH, Brassard G, Crepeau C, Maurer UM. ph/9508027.
Generalized Privacy Amplification, IEEE Transactions on 15. Gottesman D. Chuang IL. Quantum Digital Signatures,
Information Theory. 1995; 41(6):1915–23. quant-ph/0105032.
7. Choi KS, Chou CW, Deng H, Felinto D, Kimble HJ, 16. Fernando GSL. Brandão and Jonathan Oppenheim,
Laurat J, Riedmatten H. Functional Quantum Nodes Quantum One-Time Pad in the Presence of an Eavesdropper,
for Entanglement Distribution Over Scalable Quantum Phys. Rev. Lett. Jan 2012.
Networks, Science. 2007; 316(5829):1316–20. 17. Bennett CH, Brassard G. Quantum Cryptography: Public Key
8. Rishi Dutt Sharma. Quantum Cryptography: A New Distribution and Coin Tossing, In Proc. IEEE Int. Conf. on
Approach to Information Security, International Journal Comp.,Sys. and Signal Process., Bangalore;1984. p. 175–79.
of Power System Operation and Energy Management 18. Shukla R, Prakash HO. Sampurna Suraksha: Unconditionality
(IJPSOEM). 2011; 1(1). Secure and Authenticated One Time Pad Cryptosystem,
9. Diffie Hellman. New Directions in Cryptography. IEEE IEEE Conference: International Conference on Machine
Transactions on Information Theory. 1976; 22:644−54. Intelligence and Research Advancement; 2013. p. 174−178.
10. Rivest RL, Shamir, Adleman L. A Method for Obtaining 19. Millar V. Use of Elliptic Curves in Cryptography, CRYPTO.
Digital Signatures and Public Key Cryptosystems, Commun. 1985; p. 417−26.
ACM. 1978; 21:120−26. 20. Menezes A, van Oorschot PC, Vanstone S., Handbook of
11. ElGamal T. A Public Key Cryptosystem and a Signature Applied Cryptography, Boca Raton, FL: CRC Press; 1996.
Scheme based on Discrete Logarithms, IEEE Trans. Inform. 21. http://homepage.univie.ac.at/reinhold.bertlmann/pdfs/
Theory. 1985 Jul; IT−31(4). T2_Skript_Ch_9corr.pdf.
12. Wiesner S. Conjugate Coding, Written Circa 1970 and 22. Henle F. BB84 Demo. http://www.cs.dartmouth.edu/~henle/
Belatedly Published in Sigact News. 1983; 15(1). Quantum/cgi-bin/Q2.cgi (2002).
13. Bennett CH, Brassard G, Breidbart S, Wiesner S. Quantum 23. https://physicsandcake.files.wordpress.com/2010/02/qc_
Cryptography, or Unforgeable Subway Tokens, Advances for_beginners.pdf.
in Cryptology: Proceedings of Crypto 82, Santa Barbara, 24. http://www.qudev.ethz.ch/content/QSIT15/QSIT15_V03_
Plenum Press, (August 1982). slides.pdf.
Vol 10 (3) | January 2017 | www.indjst.org Indian Journal of Science and Technology 5