Development towards a BB84 QKD system for CubeSats

54
Development towards a BB84 QKD system for CubeSats Rajesh Mishra A0119779J Supervisor: Associate Professor Alexander Ling Submitted for Honours Thesis

Transcript of Development towards a BB84 QKD system for CubeSats

Page 1: Development towards a BB84 QKD system for CubeSats

Development towards aBB84 QKD system for

CubeSats

Rajesh MishraA0119779J

Supervisor:Associate Professor Alexander Ling

Submitted for Honours Thesis

Page 2: Development towards a BB84 QKD system for CubeSats

Acknowledgements

I would like to take this opportunity to express my greatest gratitude to my

supervisor, Associate Professor Alexander Ling for giving me this opportunity

to work on this project. I would also like to thank Senior Research Fellow

Robert Bedington for his continuous guidance and mentoring throughout the

two semesters.

It has been a long and amazing learning journey for me. This would not

have been possible without all the people in the lab. Really thankful to them

for sparing the time to explain to me and help me out in anyway possible. I

took up this project without much experience in optics and would like to thank

everyone again for showing so much patience and lending a helping hand. It has

been a truly enjoyable time being with the group and spending time in the lab.

Thanks to all my friends, family members and everyone else for every single

bit of encouragement and living through the moments of frustration with me!

i

Page 3: Development towards a BB84 QKD system for CubeSats

Contents

Abstract iii

I Introduction 1

1. Cryptography . . . . . . . . . . . . . . . . . . . . 1

2. Why Quantum Cryptography . . . . . . . . . . . . . . 2

II Background 4

1. Quantum Key Distribution . . . . . . . . . . . . . . . 4

2. BB84 . . . . . . . . . . . . . . . . . . . . . . . 5

III Review - Advancements in Quantum Key Distribution 9

1. Challenges . . . . . . . . . . . . . . . . . . . . . 10

IV Aims 19

V Methodology 20

1. Setups . . . . . . . . . . . . . . . . . . . . . . 21

2. Device Physics . . . . . . . . . . . . . . . . . . . 27

VI Results and Discussion 31

1. Characterisation of the modulator . . . . . . . . . . . . 31

2. Estimation of Source Mean Photon Number . . . . . . . . . 33

VIIEvaluation and Conclusion 44

ii

Page 4: Development towards a BB84 QKD system for CubeSats

Abstract

BB84 QKD is a method of key sharing based on the laws of quantum mechanics.

It is theoretically proven to provide unconditional security to its users. However

that is not always the case when it comes to practical cases since the equipment

used are not perfect. In this project, we have explored a configuration for

conducting QKD using a nanosatellite. The first step in the process of building

a nanosatellite based QKD is to show that such a configuration works on a

optical table and then modify it to fit in a nanosatellite.

For our setup, we have used a Vertical Cavity Surface Emitting Laser as

a source, a Thor Labs EO-AM-NR-C1 as a modulator and an avalanche pho-

todiode and a superconducting nanowire single photon detector as detectors.

The aim of this project was to characterise the source mean photon number

for our setup. In pursuit of incorporating signal and decoy states for a decoy

state quantum key distribution, source mean photon numbers of 0.247 ± 0.036

and 0.142 ± 0.023 were achieved for 14V and 0V modulation at 100kHz. Some

changes to the setup can be made to achieve a higher source mean photon num-

ber for the signal state and a higher frequency of modulation. This will allow

us to generate keys securely at a high rate.

iii

Page 5: Development towards a BB84 QKD system for CubeSats

Chapter 1

Introduction

1 Cryptography

Cryptography is the art of secret writing. The word is derived from the Greek

word kryptos, meaning hidden. The simplest forms of cryptography have ex-

isted for centuries and were widely used for communication between royalty

and kingdoms. Messengers on horseback carrying letters were the most com-

mon means of communication before telegraph and other means of transport

were invented. It was not uncommon for a messenger to get kidnapped or even

murdered by groups trying to intercept the messages. Hence, cryptography was

crucial to prevent the messages from ending up in the wrong hands [1].

Advancements in the field of cryptography brought about advancements in

the field of cryptoanalysis and the cat and mouse chase has continued till today.

The attempted assassination of Queen Elizabeth in the 16th century and the

Enigma machines in the second world wars are just two of the many cases when

cryptography was used to plan the assassination and war respectively [2].

There has been a rapid improvement in the field of cryptography through-

out the 20th century and today we have many different protocols based on

complex mathematics and information science governing the exchange of digital

information. Previously, cryptography was mainly used by the military or the

governments for communication, however, today it is used in many forms of dig-

ital communications involving ordinary citizens and business. Stakes are even

higher with huge volumes of online transactions involving trillions of dollars and

pieces of sensitive information being shared with a click of a mouse [2].

1

Page 6: Development towards a BB84 QKD system for CubeSats

2 Why Quantum Cryptography

Modern cryptography can be classified into two cryptosystems: symmetric and

asymmetric (public) [3]. Some of the examples of symmetric-key cryptogra-

phy are Data Encryption Standard (DES) and Advanced Encryption Standard

(AES), and some examples of asymmetric-key cryptography are Rivest-Shamir-

Adleman (RSA) and Elliptic Curve Cryptography (ECC). Both cryptosystems

are currently being used for different purposes in keeping our communications

secure, however, neither of them is fully secure and so is vulnerable to attacks.

Symmetric key encryption refers to the system where both sender and re-

ceiver have the same key. It will be secure if the key is as long as the message

and changes with each message. This is known as the one-time pad encryption

and it prevents a third party from recognising the patterns and decoding the

messages. Also, different keys are required for each pair of sender and receiver.

This process of generating and sharing keys at a fast rate acts as a limitation

for this cryptosystem and in turn can be exploited by the cryptanalysts. Asym-

metric/Public key encryption on the other hand works using a public key and

a private key. An individual can share his/her public key which is then used

by the sender to encrypt the message and this message can only be decrypted

using the corresponding private key. It is useful in digital signatures to verify

the sender’s identity. However, this encryption system has its own flaws too,

since it is based on the computational complexity of mathematical problems, for

example, RSA, which is based on the prime factorisation. For a prime factori-

sation problem, if a number is too large, there is no efficient classical algorithm

known today. With the current computational speed, solving one such problem

can take many years [4]. But with faster computers especially Quantum Com-

puters, these problems can be solved in polynomial rather than exponential time

(Figure 1.1). Algorithms such as Shor’s algorithm have shown that the RSA

encryption can indeed be broken using a Quantum Computer [5].

2

Page 7: Development towards a BB84 QKD system for CubeSats

Figure 1.1: Comparison of computation time between classical and quantumcomputers [6]

Therefore, as cryptanalysts or hackers find better ways to hack the current

encryption systems, there are a lot of efforts in the direction of devising even

better encryption systems and hopefully unbreakable ones. One such idea called

Quantum Cryptography was devised in the later part of 20th century and cur-

rently a lot of efforts are being directed towards its implementation.

3

Page 8: Development towards a BB84 QKD system for CubeSats

Chapter 2

Background

1 Quantum Key Distribution

Quantum Cryptography, first proposed by Stephen Wiesner in the 1970’s, ap-

plies fundamental laws of Quantum Mechanics to allow for secure symmetric key

generation [7] [8]. The most common and well-developed example of Quantum

Cryptography is Quantum Key Distribution (QKD). Unlike classical cryptogra-

phy, the security of QKD does not rely on unproven computational assumptions.

The first QKD protocol was devised by Charles H. Bennett and Giles Brassard

in 1984 and was named BB84 [9].

There are two types of QKD: prepare and measure scheme and entanglement

based. BB84 in which each qubit is encoded in one of the four states of two

complementary basis and B92 in which each qubit is encoded in one of two non-

orthogonal states are examples of prepare and measure schemes. E91 proposed

by Artur Ekert in 1991 is based on entanglement where a pair of entangled

photons are distributed to Alice and Bob [10]. For this project, the focus will

be on BB84.

QKD is unconditionally secure due to a few simple principles of Quantum

Mechanics:

• Every measurement perturbs the system.

• It is impossible to copy data encoded in a quantum state (no-cloning

theorem) [11].

4

Page 9: Development towards a BB84 QKD system for CubeSats

In QKD, a quantum as well as classical channel is required to carry out com-

munication. Distribution of secret bits that will form the key is only done via

the quantum channel. Sender, usually called Alice sends qubits to the receiver,

usually called Bob. A key distillation process that is discussed in the next sec-

tion is carried out by both to retrieve the key. It is during this process that they

can know about the presence of an eavesdropper. Once the keys are distributed,

the classical channel is used by the sender to send the encrypted message to the

receiver. Therefore, the main aim of QKD is to produce and distribute the keys

which are then used for encryption.

2 BB84

The BB84 protocol is one of the best known QKD protocols and its security has

been proven by many previously. Even though it is usually implemented using

polarised photons, any two-level quantum system can be used instead.

Most commonly, two of the polarisation bases: rectilinear,diagonal or cir-

cular basis are used to produce 4 quantum states. Vertical and horizontal for

rectilinear and diagonal and anti-diagonal for diagonal (Figure 2.1) and left and

right for circular basis. For both these bases, we can attribute the binary value

of 0 to one of the states and 1 to the other state [12].

Figure 2.1: Bases states in BB84 [12]

Let’s say we have two parties: Alice and Bob. They wish to communicate

securely and to do so they need to first generate keys that will be used to encrypt

their messages and hence, they will need to carry out QKD.

5

Page 10: Development towards a BB84 QKD system for CubeSats

Alice has a setup that generates qubits that correspond to individual states

prepared using one of the two bases shown in Figure 2.1. Qubits or quantum

bit are the basic unit of quantum information. In a classical system, a bit

represents either a 0 or a 1, however, in a quantum system, a qubit refers to a

coherent superposition of both the states. This idea of superposition which is a

fundamental concept in quantum mechanics allows BB84 to be unconditionally

secure.

Alice sends a string of binary numbers encoded in qubits to Bob. When this

string reaches Bob, he can carry out measurements to retrieve back the string

of binary numbers from the qubits. Bob can only retrieve the correct state if he

uses the same basis as the one used by Alice to generate that qubit. If Bob uses

the wrong basis then he will randomly retrieve a state, 50% of the time 0 and

50% of the time 1. Therefore, he will only retrieve the correct binary number

half the number of times when he chooses the wrong basis for conducting the

measurements. Using this property, Alice and Bob can identify the presence of

an eavesdropper if any.

Figure 2.2: Generation of Secret Key

Let’s assume Eve is an eavesdropper and is trying to eavesdrop on the QKD

between Alice and Bob. Referring to Figure 2.2, Alice generates a string of

bits and encodes them using randomly generated basis. Then she sends the

generated qubits to Bob through the quantum channel. Eve, who is trying

to eavesdrop, must intercept the communication and then resend the photons,

because without making a measurement on a qubit, one cannot retrieve the

information stored in it. Hence, Eve must carry out a measurement without

having any knowledge about the basis used to generate the photons. Once a

measurement is made on a qubit, it collapses to one of the 4 states. If the basis

Eve used matches the one Alice used, then Eve is lucky, and she can generate a

6

Page 11: Development towards a BB84 QKD system for CubeSats

qubit using the same basis again and resend it to Bob. However, if Eve uses the

other basis, then she gets a random output and the photon that she resends is

no longer in its original state.

Bob on his side used random basis to carry out the measurements since he

has no knowledge of the basis used by Alice for generation of qubits. Once Bob

finishes his set of measurements, he shares his set of bases with Alice over an

authenticated classical/public channel. Even Eve can listen to this part of the

communication but cannot modify it. Alice and Bob discard all the bits where

their basis does not match. Now they shift their attention to the bits left.

This shorter set of bits obtained after bases reconciliation is called the sifted

key. Alice and Bob use a small segment of the sifted key obtained to check

for the presence of an eavesdropper. Ideally every single outcome compared

should match for both since the bases used are the same. Mismatch at this

point indicates that their communication has been tempered with and is most

likely due to an eavesdropper. In such a case, Alice and Bob will discard the

whole key and start over again to generate a key.

Once a key is generated, it is truly random and neither Alice nor Bob has

any control over the key that is generated. Hence, using the fundamentals of

quantum mechanics it can be proven that BB84 is completely secure against

eavesdropper attacks and if used as a one-time pad symmetric encryption key,

it is also not hackable. However, practically there are many implementation

issues that researchers need to deal with, and this has been discussed in the

next section.

2.1 Decoy-state QKD

One of the most common loopholes in the standard BB84 protocol arising due

to the unavailability of single photon sources is the presence of pulses having

multiple photons. This puts the system at risk of attacks known as photon

number splitting (PNS) attacks from the eavesdroppers, Eve [13]. PNS attacks

are those where the pulses carrying photons are transmitted from Alice to Bob

and rather than each of the pulses having single photons, they have multiple

photons. This distribution of pulses containing single or multiple photons is

unknown to Alice and Bob, so they are unable to predict which pulses contain

multiple pulses. Eve can measure the photon number of each signal and then

split the multiphoton signals. She can keep one of the photons in a quantum

7

Page 12: Development towards a BB84 QKD system for CubeSats

memory for herself from these multiple photon pulses and send the others to

Bob. Since the polarisation of each of the pulses is the same, the photon/photons

reaching Bob and the photon with Eve are the same. Eve can then wait for the

measurement bases to be shared between Alice and Bob and use the information

to carry out measurements on the photons she is holding on to. This leads to

the leakage of information and Alice and Bob have no way of knowing how much

information Eve has regarding the generated key. Thus, risking the security of

the communication.

Figure 2.3: Multi-photon pulses. The orange coloured dots represent the pho-tons

Decoy state QKD was proposed in the early 2000s to counter the PNS attack

[14]. The main idea is to have a few more states in addition to the standard

BB84 states. These additional states are called the decoy states and they vary

from the standard states in their intensities. While the standard states are still

used to generate the keys, the decoy states are used to detect eavesdropping

attacks.

Figure 2.4: Decoy State QKD

8

Page 13: Development towards a BB84 QKD system for CubeSats

Chapter 3

Review - Advancements inQuantum Key Distribution

Practical QKD was first demonstrated in the early 1990’s by Bennett and Bras-

sard at the IBM laboratory. The set up from that experiment in shown in Figure

3.1. QKD in this experiment was performed over a distance of 30cm [7].

Figure 3.1: First ever BB84 setup at the IBM laboratory

In 2006, a collaboration in Europe carried out QKD via an optical-free-space

link between Canary Islands of La Palma and Tenerife. This was carried out us-

ing Optical Ground Station of the European Space Agency where the observers

were separated by 144km [15]. The same group also carried out another round

of QKD in 2007 but this time using BB84 enhanced with decoy states. This was

the longest distance at that point of time. In another effort in 2007, QKD was

demonstrated by Los Alamos Laboratory and National Institute of Standards

9

Page 14: Development towards a BB84 QKD system for CubeSats

and Technology over 148km of optic fibre [16]. In the same year, QKD was also

used to protect Swiss elections from hacking using an ID Quantique encryption

system.

Moving on to this decade, efforts from researcher is University of Geneva,

Coning Inc. and a few institutions from China pushed the distance to over

400kms while compromising on the secret key rate [17]. 2017 was a great year

for advancement in QKD as a group of physicists from the Institute of Quan-

tum Computing and the University of Waterloo conducted QKD from a ground

transmitter to a moving aircraft [18]. In 2017 itself, physicists from the Uni-

versity of Science and Technology of China measured entangled photons over

1203km and later successfully demonstrated BB84 over satellite links from Mi-

cius to various ground stations. This was then used to carry out a secure video

call between Beijing and Vienna [19]. There have also been efforts to minia-

turise the whole system. A group from Centre from Quantum Technologies in

Singapore aims to use CubeSats orbiting in the Low Earth Orbit to carry out

QKD between ground stations on Earth [20].

Advancements of research in QKD has also led to commercial products like

Cerberis QKD systems by ID Quantique [21]. However, there are still some

technological challenges that continue to pose a threat to the security and per-

formance of a realistic QKD system.

1 Challenges

In theory QKD allows for secure communications and this has been proven with

the assumption being that the equipment being used are perfect and behave

ideally. However, what researchers find in labs is far from ideal and these im-

perfections in the processes and in the current technologies pose threats to the

security of the system. Some of the major issues are found in photon sources

and photon detectors [12].

1.1 Photon Sources

Photon sources are broadly categorised into 3 groups: single photon sources,

coherent light sources (lasers) and thermal light sources.

QKD is based on single photon Fock states or number state. A Fock state is

10

Page 15: Development towards a BB84 QKD system for CubeSats

a quantum state with a well-defined number of particles, in this case photons.

An ideal single photon source produces one-photon number states and these

number states have certain properties like photon anti-bunching. Photon anti-

bunching is a property where there is a minimum time value between successive

photons. As a result of this property, each of these photons can be used to

produce a qubit in one of the four quantum states.

In the cases of coherent and thermal light sources, there is no anti-bunching,

which means that there is a probability of multiple photons arriving in the same

time window and this can allow an eavesdropper to carry out photon number

splitting attack which will be discussed later. As of today, we still do not have

very reliable single-photon sources. But there is a lot of research being carried

out on how to use single molecules and quantum dots as single-photon sources

[22].

Most practical QKD experiments today use either faint laser pulses or en-

tangled photon pairs as the source of photons. For BB84 protocols, faint laser

pulses are the popular choice [23]. Even though they do not exhibit photon

anti-bunching, they are a good alternative when operated at low mean photon

number (μ). Since laser pulses exhibit Poisson distribution, there is well-defined

probability of finding n photons in each pulse [24]. This probability is given by

the following expression:

P (n, µ) =µn

n!e−µ (3.1)

Reducing the mean photon number reduces the probability of finding n pho-

tons in a pulse. For comparison, Figure 3.2 shows the probability of finding

a certain number of photons for different mean photon numbers. Low mean

photon number means that most of the pulses are empty and this results in a

decrease in the bit rate. Hence, this balance between the mean photon number

and the bit rate is crucial.

11

Page 16: Development towards a BB84 QKD system for CubeSats

Figure 3.2: Poisson Statistics

1.2 Photon Detectors

Photon detectors are as crucial for a QKD experiment as are the photon sources.

However, in this case too we are far from having ideal single photon detectors.

Some of the common photon detectors are photo-multiplier tubes, charged-

coupled devices, photo-diodes and superconducting detectors. However, only

avalanche photodiodes (APD) and superconducting detectors are typically used

in modern QKD setups. For this project we have used both passive-quenched

APD and superconducting nanowire single photon detectors (SNSPD) for de-

tection of photons.

Some of the key characteristics of detectors are efficiency, dark counts and

dead time. Efficiency is the ratio of the number of photons the detector detects

to the number of photons arriving at the detector. Dark counts are the noise

counts that arise due to recombination occurring in the semiconductor and not

due to the photons detected. And lastly, dead time is the shortest possible

interval between the detection of two photons. It is sometimes referred to as

the recovery time if a detector. APD and SNSPD vary greatly on these 3

characteristics. The efficiency of the APD is around 50% for the near infrared.

This number varies significantly with wavelength and gain. For a SNSPD, the

efficiency can reach 90%. An APD usually has dark counts of a few hundreds

(an average of 700 for out setup) whereas an SNSPD’s dark counts are usually

less than 50. APD’s dead time is usually around 1 microsec as compared to

12

Page 17: Development towards a BB84 QKD system for CubeSats

around 100nanosec for SNSPD.

Avalanche Photodiode

A photodiode is a semiconductor device that converts light into current using

the properties of semiconductors. A pure semiconductor is not desirable to be

used as a photodiode, instead it is first doped with small amounts of impurities.

Doping is used to manipulate various properties of a semiconductor for example

conductivity. This is because introduction of other elements into the semicon-

ductors causes an increase in the number of charge carriers or electrons. There

are two types of doped semiconductors, namely ‘p-type’, containing excess holes

(charge carriers) and ‘n-type’ containing excess electrons. Despite having excess

of either the electrons or holes, these semiconductors are still neutral. When a

p-type and an n-type semiconductor are in contact, diffusion of charge carriers

occur, and this leads to the formation of a p-n junction. In the p-n junction, the

excess electrons from the n-type recombine with the holes from the p-type near

the region of contact and form a depletion region. Due to this recombination, a

potential difference is generated in depletion region with the positive potential

in the n-type region and negative in the p-type region as shown in Figure 3.3.

When a photon comes and strikes the depletion region, an electron hole pair

is created. Due to the potential difference, the electron hole pair moves to the

opposite ends and results in a current in the circuit containing the diode and this

can be detected. However, the depletion region in the p-n junction is too small

for the collection of the incoming photons and hence a p-i-n junction is used

instead where, in addition to the p and n region, there is an intrinsic area which

is undoped and is added to increase the area of collection. As more photons can

be detected, it leads to an increase in efficiency.

An avalanche photodiode (APD) is a semiconductor device that also works

on the principle of photoelectric effect and its structure is like a PIN photodiode.

As the name suggests, the gain in this device occurs through the process of

avalanche multiplication. The gain depends on the applied reverse voltage. The

higher the voltage, the higher the acceleration achieved by the carriers and this

leads to the creation of more electron-hole pairs through collisions with bound

electrons. The reverse bias applied is higher than the breakdown voltage such

that even arrival of a single photon can trigger an avalanche of electrons and as

a result be detected. This mode of operation is called the Geiger mode.

13

Page 18: Development towards a BB84 QKD system for CubeSats

Figure 3.3: P-N junction

The avalanche process causes a sharp increase in current in a very short

period of time and this can continue further if not stopped. In order to detect

the next photon, the diode needs to be restored to its original state where

the bias voltage is just above the breakdown. However, to stop the avalanche

process, the bias voltage needs to be lowered to below the breakdown voltage.

This quenching process can last for a period of a few nanoseconds to a few

microseconds depending on the type of quenching circuit used. There are mainly

three methods used to do the quenching: passive quenching, active quenching

and gated mode operation.

For a passive-quenching circuit, a large resistor is placed in series with the

APD. Once the avalanche starts, it causes a voltage drop across the resistor and

the voltage drop across the APD is lowered. When the voltage drop across the

APD falls below the breakdown voltage, the avalanche stops and the system

resets to detect another photon. The recovery time of a passively-quenched

detector is around 1 microsecond and this duration depends on the value of the

quench resistor and capacitor used.

For an active quench circuit, rather than waiting for the bias voltage to

14

Page 19: Development towards a BB84 QKD system for CubeSats

fall below the breakdown voltage, the bias voltage is actively lowered once an

increase in current is detected. Hence, this method of operation allows for a

much faster response to the arrival of the photon and reset time is faster. As a

result, the rate of detection of photons is much higher in this case as compared

to that of the passively-quenched detector.

Lastly, for gated mode operation, the bias voltage is originally below the

breakdown and is raised above for short durations when a photon arrival is

expected. However, this needs the knowledge of the arrival times.

For this project, we have used a Silicon Geiger Mode Avalanche Photodi-

ode of SAP500-Series from Laser Components. The figure below shows the

actual APD and the form it is used in which contains the cooling system and a

discriminator circuit board.

Figure 3.4: APD from Laser Components

Figure 3.5: APD with the cooling system and discriminator card

15

Page 20: Development towards a BB84 QKD system for CubeSats

Superconducting Nanowire Single Photon Detector

The technology used in the detectors has continued to improve and even though

APDs are the most popular today, there are the better performing detectors out

there. The main issues however are the cost and portability. One such type of

detector is the SNSPD. Currently, this is the fastest single photon detector for

photon counting.

A SNSPD consists of thin superconducting nanowires that are coiled in a

snake like pattern in a small area. This nanowire made of niobium nitride is

cooled to a temperature below its superconducting critical temperature and di-

rect current biased below its critical current. When a photon arrives at the

photodiode, it creates a hotspot causing the current to flow around the hotspot.

This leads to an increase in the local current density on the side beyond the crit-

ical current density and hence forming a resistive barrier (non-superconducting

region) across the nanowire. This increase in resistance from zero to a certain

value causes an output pulse to be generated and thus indicates the arrival of a

photon. The output pulse is generated due to the resistor connected in parallel

to the nanowire. When the nanowire has zero resistance, all the current passes

through it, however, when its resistance increases, there is a certain amount of

current flowing through the resistance in parallel and this leads to a voltage

drop across the resistor. Once the nanowire starts to cool and returns to the

superconducting state, the SNSPD is ready to detect another photon.

The most prominent difference between the SNSPD and the APD are the

dark count rates, efficiency and dead time. The SNSPD operates at a very low

temperature (approx. 4K) and therefore the low dark count rates in the order

of a few tens per second. The dead time is usually very low also in the order

of tens of nanoseconds. Another benefit is also the range over which these can

operate. SNSPDs can be used to detect photons in both visible and infrared

regions which is not possible using the same APD.

For this project, we have used Single Quantum Eos, a multi-channel SNSPD

from Single Quantum. The first figure below shows the principle the SNSPD is

based on and the second figure shows the detector in use in our lab.

16

Page 21: Development towards a BB84 QKD system for CubeSats

Figure 3.6: Nanowire detection

Figure 3.7: Superconducting Nanowire Single Photon Detector in our lab

17

Page 22: Development towards a BB84 QKD system for CubeSats

1.3 Security Loopholes

There are a few ways in which information can be leaked to an eavesdropper.

These attacks on security can be traced to either Alice’s side, which is during

the preparation, or Bob’s side, which is during the detection. Our focus for this

project is to tackle some of the loopholes on the preparation side. As discussed

above, one of the reasons to carry out decoy state is to tackle the vulnerability

caused by the presence of multi-photon pulses.

Another loophole that we have paid attention to is the issue of indistin-

guishability of lasers. This means that two VCSELS manufactured for the same

wavelength can have a frequency split in the range of gigahertz and that makes

them spectrally distinguishable. By exploiting this loophole, Eve can associate

a specific frequency with a specific polarisation state. She can then perform

a precise frequency measurement to determine the polarisation state of the in-

coming photon. A few setups for decoy state QKD have been discussed in the

next section and as we will see some of them make use of multiple lasers for

the different polarisation states and for different intensities. They might also

have slight differences due to their temperature dependence. These slight dif-

ference between the sources can lead to a leakage of information and put the

communication at a risk.

18

Page 23: Development towards a BB84 QKD system for CubeSats

Chapter 4

Aims

The aim of this project was to build a table top BB84 transmitter that could

be later developed into a system for use on satellites. For this we have adopted

a compact design and chosen the components that complement the compact

design, for example, the choice of modulator. We have also chosen to use 850nm

wavelength of laser since this ensure a balance between the dispersion loss and

APD detection efficiency. Lastly, SNSPD has been used to do a cross-check on

the performance of the APD and improve the characterization of the source.

This also helped us to accurately calculate the source mean photon number.

Our project constitutes of multiple steps:

• Controlling the intensity and polarisation - this would allow us to carry

out decoy-state BB84.

• Switching the intensity and polarisation at a high frequency - this would

allow us to generate key at a high rate.

Within the time period of my final year project, I was only able to investigate

on some parts of the project. The focus was on characterizing the source of

photons for the experiment. This included the ability to control the intensity

and the mean photon number so that we can carry out decoy-state BB84 in

future and prevent security attacks such as the photon number splitting attack.

19

Page 24: Development towards a BB84 QKD system for CubeSats

Chapter 5

Methodology

In the past, practical BB84 has been carried out using different setups, different

methods and different equipment. We will first discuss some of the common

ways of doing BB84 below and then dive into the setup used for this project.

But before that the choice of photon source, medium of transmission and the

method of modulation is discussed.

The first decision to be made is the one about the wavelength of the pho-

tons to be used. There are two main windows in the electromagnetic spectrum

that physicists typically use to carry out QKD: one is the near infra-red wave-

lengths (700-900nm) and the second one is the telecom wavelength bands (1300-

1600nm). These are the two windows where the loss in signal while transmission

is the least. However, both have their advantages and disadvantages. For the

near infra-red wavelengths, the detectors used are silicon based and they have a

much higher efficiency as compared to the Indium-Gallium-Arsenide (InGaAs)

ones used for the telecom wavelength. However, most optical fibre networks

are suited for telecom wavelengths since the signal suffers a much lower loss as

compared to near infra-red transmitted via optical fibre networks. A free-space

channel is rather used for the case of near infra-red. A benefit of using free-space

channel is that it preserves the polarisation of the photons but at the same time

needs an uninterrupted line-of-sight view between the transmitter and receiver.

The next task is to modulate the laser source in order to produce photon

pulses. The two different ways of modulation are direct and indirect modulation.

In the case of direct modulation, the laser source is modulated whereas in case

of indirect modulation, a continuous wave is produced by the laser diode and

20

Page 25: Development towards a BB84 QKD system for CubeSats

another device is used to modulate the signal. Direct modulation is a simple and

inexpensive method as compared to the indirect one that requires an electro-

optic device which require careful setting up and are generally quite expensive.

1 Setups

The first setup discussed here uses the direct modulation technique and was

used widely in the early practical QKD experiments. The diagram is shown

below in Figure 5.1 [25].

Figure 5.1: Standard QKD setup with four laser diodes

This setup uses 4 laser diodes. Each of these laser diodes has a polariser in

front to produce the four different polarisation states. Then, using the beam

splitters the four beams are combined into one signal beam. Sometimes, rather

than using polarisers, a combination of a polarising beam splitter and half-wave

plate is used generate the states. The aim is to allow only one laser diode to

be active for each pulse. And the choice of which laser diode is active must be

completely random, hence, a quantum random number generator is usually used

for that purpose. However, this method has a drawback that can put the system

at risk. If each of the laser diodes has a slightly different spectral bandwidth,

they can be differentiated by an eavesdropper. This issue can be dealt with by

21

Page 26: Development towards a BB84 QKD system for CubeSats

characterising multiple laser diodes and choosing those with similar bandwidth,

or by temperature control. For an alternative method we proposed that the

intensity of the photons could be controlled by the current supplied to the laser

diode using a current driver. Our idea was to modulate the laser diode just

above and below the threshold current of the laser diode in order to ensure a

broad spectrum that could be filtered. This approach was investigated in the

early phases of this project. This idea was dropped because tests done by our

group and other groups showed that even below the threshold current of the

laser diode, photons were produced and did not follow the Poisson distribution.

Just bringing the current down to slightly below the threshold does not work.

On the other hand, modulating the current from zero to above the threshold

at a high frequency had a limitation which is the rise and fall time due to

the capacitance in the laser driver and during those slopes, photons were also

produced, thus, preventing us from getting a good control over the mean photon

number which is essential for performing decoy state BB84 correctly.

Decoy state QKD became popular since the mid-2000s. This meathod re-

quires pulses of different intensities. One of the setups is shown in Figure 5.2

[26]. This had even more components than the previous one since it makes use

of eight laser diodes. A pair of laser diodes is used for each polarisation state

and the intensity of the pulse is determined by the amount of attenuation done

by the attenuator in front of each laser diode. Like the previous approach, beam

splitters and polarising beam splitters are used to combine the individual signal

into one channel for transmission. Decoy states are useful in tackling the PNS

attack, however, the setup was large and consisted of many components. Some

groups modified the same setup by using an electro-optic modulator instead of

directly modulating the laser diode. The setup was still bulky and expensive

since eight modulators were required.

Another group recently used a different approach for the decoy state protocol

[27]. An advantage of this design is that there is no spectral/spatial or temporal

distinguishability between the pulses because there is only a single laser being

used. The laser diode was modulated at a high frequency and then an intensity

modulator was used to generate the decoy and the signal state by varying the

voltage input to the modulator. Then a polarisation modulator was used to

encode the polarisation states. The phase was randomly chosen by a Field Pro-

grammable Gate Array (FPGA) that converted into different levels of voltage

that was fed into the polarisation modulator. The setup for this approach is

22

Page 27: Development towards a BB84 QKD system for CubeSats

Figure 5.2: Decoy state QKD with multiple laser diodes

shown in Figure 5.3.

Figure 5.3: High Speed Decoy state QKD using one laser diode

For our project, an approach similar to the last one discussed has been used

whereby we make use of an 850nm vertical cavity surface emitting laser diode

(VCSEL) as compared to the Anritsu one. The VCSEL usually has a very low

threshold currect (3mA in this case) and low output power which also suggests

that less attenuation is needed. This makes it ideal for a CubeSat compatible

setup. To reduce the space used even further, we have used a Thorlabs labs

free-space modulator which is smaller than the fibre coupled ones and does not

need polarisation controllers since the free space preserves the polarisation of

photons. The free space modulator along with polarisers is used as an intensity

23

Page 28: Development towards a BB84 QKD system for CubeSats

modulator and a polarisation modulator after that is used to encode the four

polarisation states. The laser is controlled using a laser driver and the intensity

modulator is controlled using a function generator which is used to provide the

modulation. Randomised switching of the voltage can then be done using a

Quantum Random Number Generator. For the detection part of the setup, an

SAP500 Silicon APD from Laser Components and SNSPD from Single Quantum

have been used to take measurements. Though SNSPD are better in every

characteristic as compared to APD, they are not practical for most QKD set-

ups. The results from both therefore have been compared as a study of whether

an APD which is portable and economical can be used as a good approximation

of a SNSPD which is bulky and expensive.

Figure 5.4: Schematic of the setup for this project

Figure 5.4 shows the schematic of set-up from our project shown in Figure

5.5. Here the VCSEL is biased using a DC current of 10.5mA. The power mea-

sured after the pinhole is ≈ 60µW. The beam then passes through the modulator

and two polarisers. Since the power measured after the second mirror is still

very high and causes the detectors to saturate, filters are placed to introduce an

24

Page 29: Development towards a BB84 QKD system for CubeSats

Figure 5.5: Setup for this project. Here the VCSEL is connected to a currentdriver, the modulator is connected to the function generator and the light iscoupled into a fibre that is connected to the detector

optical attenuation of ≈ 80dB. Finally, the beam is coupled into a single-mode

fibre which is connected to the detectors.

The current setup does not contain the polarisation controller and the QRNG

since within the time period I had, we have managed to reach until this stage of

the project only. Moving forward, polarisation controller will be set-up before

the filter and both the modulators will be connected to voltage modulators which

will then be connected to the QRNG to randomly encode the signal, decoy and

the four polarisation states.

For detection of single photons, both APD and SNSPD have been used.

Upon the arrival of a photon, current flows in the circuit inside the detectors.

This causes a voltage drop across a resistor which can be detected using an

oscilloscope. A discriminator is then used to give an output as a nuclear instru-

mentation module (NIM) pulse. This is shown in Figure 5.6, where a 200mV

25

Page 30: Development towards a BB84 QKD system for CubeSats

pulse is registered when a photon is detected. However, this does not allow us

to count the number of photons arriving.

Figure 5.6: NIM Pulse output from the discriminator card

Hence, a photon counting card is used (Figure 5.7). This uses a threshold

voltage and compares it with the leading edge of a pulse. If the pulse surpasses

the threshold voltage, then it is counted as a detected photon and the arrival

time can be extracted as a time-stamp. The resolution of this photon counting

card is 2ns. The time-stamps can be stored into a file and the data is processed

to find the intervals between successive photons. This can then be used to

calculate the mean photon number and the probability distribution.

Figure 5.7: Photon Counting Card

26

Page 31: Development towards a BB84 QKD system for CubeSats

2 Device Physics

Before moving forward towards the discussion on the experimental procedure

and results, it is important to understand the working of the devices used in the

setup. Earlier in this report we have talked about the working of the photon

source and the photon detectors and now we will delve into the physics behind

the modulators that are used to carry out intensity and polarisation modulation

in this project.

2.1 Electro-optic Modulators

Modulators are most commonly used to vary properties of a waveform for ex-

ample, amplitude modulation or frequency modulation. In this project, we will

deal with intensity and phase modulation.

In this project, the most important part is encoding information in photons

and to do so we need to generate pulses that carry photons and encode infor-

mation in those using relative phases. To do so we need to change the phase

and hence, there is a need for modulation. As briefly discussed earlier, we can

carry out modulation either by directly modulating the source of photons or by

using external modulators.

Electro-optic modulators are a type of external modulator used to carry out

optical modulation. These modulators use the electro-optic effect to encode

information and modulate light wave carriers. This is done by altering the

optical properties of the material in a controlled way by applying voltage. These

devices use special properties of certain crystals to exhibit an electro-optic effect.

When an electric field is applied across certain crystals, there is a redistribution

of charge and a slight deformation of the lattice. These deformations are not

isotropic and vary with the direction in which the voltage is applied. Two types

of changes can occur in the impermeability tensor elements: one varying linearly

with the applied Electric field and is known as the Pockel’s effect and the other

varying quadratically is known as the Kerr effect. Most modulators are based

on Pockel’s effect.

For the light travelling through an anisotropic material, there is an ordinary

axis and an extraordinary axis and corresponding to these axes, there is ordinary

index and extraordinary index of refraction. A plane wave linearly polarised in

27

Page 32: Development towards a BB84 QKD system for CubeSats

either of these two axes will remain so. However, for a wave polarised in other

directions will experience a change in their ordinary and extraordinary refractive

index, causing it to change phase as it travels through the medium.

This property of birefringence material can be used to manufacture phase

and intensity modulators. For our project we have used a free-space Electro-

optic modulator from Thor Labs that consists of a Lithium Niobate crystal and

a radio frequency input connector (Figure 5.8). This allows us to modulate the

signal up to a frequency of 100MHz.

Figure 5.8: Electro-optic Modulator (EO-AM-NR-C1) from Thorlabs

When a voltage is applied across the crystal, there is a change in the refrac-

tive indices along the ordinary and extraordinary axes. This causes a change in

the polarisation state of the light. For the modulator to work ideally, the input

polarisation state must align with the principle axis of the crystal and therefore,

a polariser is placed in front of the modulator. By just using a polariser in front,

this device acts as a polarisation modulator, generating anti-diagonal, diagonal,

left and right polarisation states. These states lie on the Bloch Sphere as shown

in Figure 5.9 [28]. Figure 5.10 shows the setup for polarisation modulation.

28

Page 33: Development towards a BB84 QKD system for CubeSats

Figure 5.9: Bloch Sphere with the different polarisation states labeled on it

By placing a polariser behind the modulator, the setup for polarisation mod-

ulation can be changed into one for intensity modulation (Figure 5.11). To start

with, the polarisation axis of both the polarises is orthogonal to each other when

zero or no voltage is applied to the modulator. This is to ensure that the in-

tensity of light after the second polariser increases as we increase the voltage

supplied to it.

Figure 5.10: Polarisation modulation using an input polariser and an electro-optic modulator

The voltage required to cause a retardance of pi radiance is called Vπ. This

is equivalent of changing the intensity of the output light from the minimum to

29

Page 34: Development towards a BB84 QKD system for CubeSats

Figure 5.11: Intensity Modulation using an electro-optic modulator between twopolarisers

the maximum. The graph of the transmittance of light as a function of voltage

is shown in Figure 5.12. It also shows that there is a sine squared dependence

of intensity on the applied voltage.

Figure 5.12: Transmission vs Voltage Curve for an ideal Intensity Modulator

30

Page 35: Development towards a BB84 QKD system for CubeSats

Chapter 6

Results and Discussion

For this project, the focus was to understand what the mean photon number is

and how it is accurately calculated in QKD systems. This is necessary to verify

systems that will allows us to control the mean photon number such that we

can implement decoy state QKD on a CubeSat scale in the future.

1 Characterisation of the modulator

Earlier we have discussed the workings of the electro-optic modulators. Here,

we explore the details to get a better idea of the performance of our modulator

before using it to carry out intensity modulation. The same amplitude modu-

lator can be used for a range of wavelengths from 600-900nm but the halfwave

voltage varies with the wavelength. The simplified expression is given in the

manual as:

Vπ = 0.361λ− 23.844 (6.1)

where λ is the wavelength of the light.

Using this, the Vπ for 850nm can be calculated as 283V.

A miniature APD power supply (ultra-compact PCB mountable) from Mat-

susada Precision (TS-0.3P) has been used together with a potentiometer to do

a voltage sweep from 0-300V. The results are shown in the graph below.

The counts here refers to counts per second (cps) detected using an APD

31

Page 36: Development towards a BB84 QKD system for CubeSats

Figure 6.1: Photon Counts vs Voltage graph for the modulator. The scatter plotrefers to the measured data and the solid line refers to the theoretical sin2 π2

VVπ

curve from Figure 5.12

when the laser diode is illuminated. The max count in this case is 375000 and

the minimum is 4500, giving an extinction ratio of 19.2dB. Extinction Ratio is

the ratio of two extreme power levels in a signal generated by a optical source.

This is property of the modulator and is dependant on its alignment with the

input beam.

ExtinctionRatio = −10 logMax

Min(6.2)

The maximum and minimum counts change upon changing the attenuation,

but the extinction ratio fluctuation is negligible. The modulator works ide-

ally when the polarisation of the input beam matches the principle axis of the

Lithium Niobate crystal inside the modulator. The polariser in front of the

modulator is used to alter the input polarisation and the mount on which the

modulator sits is used to change the orientation of the base plane to allow for

maximum amount of light to be coupled into the crystal. In an ideal scenario at

zero voltage, the cps should be equal to the dark counts since the crystal does

not change the phase of the beam and with the polarisers orthogonal to each

32

Page 37: Development towards a BB84 QKD system for CubeSats

other, they do not allow any photons to pass through.

2 Estimation of Source Mean Photon Number

As introduced before, the aim is to be able to control the mean photon number

of the source. This is the mean photon number corresponding to the photons

prepared by Alice. For QKD, these are then transmitted from Alice to Bob.

The statistics of these photons can be acquired by doing measurements on

them, in this case detecting them using an APD or a SNSPD. However, the result

obtained from the detector is referred to as detected mean photon number (µdet)

and this is usually much less than the source mean photon number (µsource).

In order to acquire the source mean photon number, the detected mean pho-

ton number needs to be corrected for detection efficiency (η) and the dead time

(τ). In this project, we have used an APD and two channels of the SNSPD

to carry our measurements and observe the trends. The efficiencies of the two

channels of the SNSPD are known and this has been used to estimate the effi-

ciency of the APD. The final result obtained is an average of the three and is

discussed in detail later.

2.1 Dead Time Correction

For all counting devices, there is minimum amount of time that is necessary to

resolve two different events. When one event is being processed and the system

has not recovered to its original state, another event occurring during that time

period is either not registered or there is a pile up leading to a longer recovery

time. Due this this effect, the experimental statistical distribution deviates from

the theoretical one and corrections are needed to process the collected data. The

model that the setup follows depends a lot on the type of discriminator card

being used.

There are two types of dead time models and they vary with respect to the

effect that an event occurring within the dead time of the previous event has on

the system [29]:

• Non-paralysable/non-extendable dead time: In this model, an event oc-

curring within the dead time of the previous one is not accounted for.

33

Page 38: Development towards a BB84 QKD system for CubeSats

• Paralysable/extendable: In this model, the occurrence of an event within

the dead time of the previous one causes the dead time to extend by a

period of τ from the point of occurrence of the second event.

Figure 6.2 diagrammatically explains the two models.

Figure 6.2: Extendable and Non-extendable Dead time models [30].

Due to the different behaviour in the two models, the output rate also varies

for both. As can be seen in Figure 6.3, the two models behave the same for

low intensities/low counts as there is less likelihood of events occurring withing

the dead time window. However as the intensity increases, the output counts

from the two models diverge. This is because for the extendable model, the

dead time period extends due to pile up of counts and fails to capture as many

counts as the non-extendable model. This becomes more and more severe with

the increase in the intensity. But for the non-extendable case, the counts increase

until a saturation point where once the detector exits the dead time window, it

immediately registers a count and hence the saturation counts is determined by

1/τ .

The APD used in our project exhibits an extendable dead time model

whereas the SNSPD used in our project exhibits a non-extendable model. How-

ever, since the range of counts in which our setup is operated is far below the

extendable saturation counts (1/τe), we use the non-extendable equations which

are simpler and can be used for correcting the data from both the detectors.

34

Page 39: Development towards a BB84 QKD system for CubeSats

Figure 6.3: Output vs Input count rates for the two models [30].

The saturation counts for the APD is around 470000 and for the SNSPD is

approximately 3700000 while for all our measurements, the counts have been

kept below 40000.

• Poisson Distribution:

P (n, µ) =µn

n!e−µ (6.3)

• Poisson Distribution for non-extendable dead time model [31]:

P (n, µ, τ) =

n∑k=1

µn

(Tn)k!(T − nτ)

ne(−µ+

µT nτ)

−n−1∑k=1

µn

(Tn)k!(T − (n− 1)τ)

ne(−µ+

µT (n−1)τ)

(6.4)

where µ is the corrected mean photon number, n is the detected counts

and T is the duration of the pulse.

• Mean Photon Number for the above model:

n′

= µ(1 +µ

Tτ)−1 + 0.5(

µ

Tτ)2(1 +

µ

Tτ)−2 (6.5)

35

Page 40: Development towards a BB84 QKD system for CubeSats

• Variance:

σ2 = µ(1 +µ

Tτ)−3 (6.6)

In order to obtain µ, we need to solve (6.5), which can be simplified into a

quadratic equation with the root being µ.

µ =−(2n

′t− 1) ±

√(2n′t− 1)2 − 4(n′t2 − t− t2

2 )n′

2(n′t2 − t− t2

2 )(6.7)

where t = τT

For our measurement, we have chosen to produce laser pulses at a frequency

of 100kHz since dead time limits the frequency that we can use for our detectors.

Even though we can use higher frequencies for SNSPD, but 100kHz is a value

where both the detectors work well. The time period for a 100kHz square wave

is 10µs and a 50% duty cycle gives T = 5µs.

In the case of APD, t = 0.2 and the corrected mean photon number is given

by:

µ =−(0.4n

′ − 1) −√

(0.4n′ − 1)2 − 4(0.04n′ − 0.22)n′

2(0.04n′ − 0.22)(6.8)

In the case of SNSPD, t = 0.02 and the corrected mean photon number is

given by:

µ =−(0.04n

′ − 1) −√

(0.04n′ − 1)2 − 4(0.0004n′ − 0.0202)n′

2(0.0004n′ − 0.0202)(6.9)

The difference between the two mean photon numbers depends on the in-

tensity of the input light and on the value of τT . A higher intensity results in a

larger value of n′

and as a result a larger correction. The same trend applies to

the values of τT .

Since in our case, we are operating at a very low intensity and τT is not very

high, the corrections are small but still can’t be ignored.

36

Page 41: Development towards a BB84 QKD system for CubeSats

Voltage Detected Mean Corrected Mean Difference

0 0.061 0.062 0.0012 0.064 0.065 0.0014 0.065 0.066 0.0016 0.068 0.069 0.0018 0.071 0.072 0.00110 0.078 0.079 0.00112 0.087 0.088 0.00114 0.101 0.103 0.002

Table 6.1: Corrections to the Detected Mean Photon Number for APD

Voltage Detected Mean Corrected Mean Difference

0 0.0877 0.0879 0.00022 0.0887 0.0889 0.00024 0.0911 0.0913 0.00026 0.1011 0.1013 0.00028 0.1111 0.1113 0.000210 0.1200 0.1203 0.000312 0.1403 0.1407 0.000414 0.1550 0.1555 0.0005

Table 6.2: Corrections to the Detected Mean Photon Number for SNSPD (Chan-nel 1)

Voltage Detected Mean Corrected Mean Difference

0 0.0561 0.0562 0.00012 0.0579 0.0580 0.00014 0.0615 0.0616 0.00016 0.0645 0.0646 0.00018 0.0703 0.0704 0.000110 0.0797 0.0798 0.000112 0.0898 0.0900 0.000214 0.1009 0.1011 0.0002

Table 6.3: Corrections to the Detected Mean Photon Number for SNSPD (Chan-nel 2)

2.2 Detector Efficiency

Detection efficiency refers to the ratio of the number of photons detected by the

detector to the number of photons reaching the detector. The correction for the

37

Page 42: Development towards a BB84 QKD system for CubeSats

detection efficiency η is rather simple.

µsource =µdet

η(6.10)

The detection efficiency of the SNSPD Channel 1 and Channel 2 are known to

be 57%±5% and 40%±5% respectively from callibration report. Data collected

for the two channels and the APD was used together with the knowledge of the

SNSPD efficiencies to calculate the detection efficiency of the APD. Dividing the

values of the two channels with their respective efficiencies produces the mean

value per 10µs for the source which is operated as a continuous wave. This is

then used to calculate the detection efficiency of the APD (ηAPD).

ηAPD = 47.2% ± 9.4%

.

2.3 Analysis of the modulation

An important aspect of photon pulses is the pulse width, it is ideal to have the

pulse width as small as possible, that allows one to reduce the probability of

having more than one photon per pulse but this also reduces the key rates. We

investigated the pulse width by varying the duty cycle of the pulses generated.

The pulse width of 50%, 20% and 5% duty cycle are 5µs, 2µs and 500ns. Re-

ducing the pulse width however comes at a penalty of reducing the dynamic

range of the attainable mean photon numbers.

Figure 6.4: Photon counts vs time for 50% Duty cycle modulation. Graph onthe left shows the counts for 4V peak to peak modulation. Graph on the rightshows the counts for 2V peak to peak modulation. Area is grey is the changein counts for each pulse when the voltage is changed

38

Page 43: Development towards a BB84 QKD system for CubeSats

Figure 6.5: Photon counts vs time for 20% Duty cycle modulation. Graph onthe left shows the counts for 4V peak to peak modulation. Graph on the rightshows the counts for 2V peak to peak modulation. Area in grey is the changein counts for each pulse when the voltage is changed.

Figure 6.4 and 6.5 are a way to visualise the modulation and change in duty

cycle and how it affects the counts and eventually the mean photon number.

As we can see here, the 10000 counts per second is the counts we have when

no voltage is supplied to the modulator. When a square wave pulse is supplied

to the modulator, the counts are also modulated similarly causing the above

waveforms. At the same time, the graphs also show the effect of the change of

duty cycle from 50% to 20%. Ideally if the base value was zero, then doubling

the voltage from 2V to 4V should double the area in each pulse and hence

double the counts too. This then leads to a doubling of the mean photon

number. However, as we see in Figure 6.4 and 6.5, that is not the case, and this

is because the majority of the area is due to the base value which is 10000 and

the contribution due to the change in voltage is significantly less. Furthermore,

when the duty cycle is reduced, the change in counts is even less significant

due to the modulation. Therefore, a significant drop in the range of the mean

photon number when the modulation is changed from 50% to 5%. Also, at low

duty cycles, the signal to noise ratio is vary low and that prevents a clear trend

between the photon counts and voltage being observed.

39

Page 44: Development towards a BB84 QKD system for CubeSats

2.4 Corrections and Curve Fitting

Timestamps were collected for both the detectors and the data was used to

calculate the detected mean photon number. After that dead time corrections

and detection efficiency were accounted for to produce the actual data directly

correlated to the source. The plots for both APD and SNSPD has been shown

below.

Figure 6.6: Detected and Corrected Mean photon number vs Modulation Volt-age for APD. Correction have been made for efficiency and dead time.

Figure 6.7: Detected and Corrected Mean photon number vs Modulation Volt-age for SNSPD Channel 1. Correction have been made for efficiency and deadtime.

40

Page 45: Development towards a BB84 QKD system for CubeSats

Figure 6.8: Detected and Corrected Mean photon number vs Modulation Volt-age for SNSPD Channel 2. Correction have been made for efficiency and deadtime.

From the graph we observe that mean photon number in each case follows

an increasing trend as the voltage is increased but they differ slight in the extent

of increase. For the APD, there is an increase in mean photon number from

0.132 ± 0.028 to 0.218 ± 0.045. For the Channel 1, this range is from 0.154 ±0.017 to 0.273 ± 0.027 and lastly for Channel 2, the range is from 0.140 ± 0.022

to 0.253 ± 0.023. The large error bars are a combination of the error arising

from the detection measurements and also from the error in the values of the

detection efficiencies. Graph in Figure 6.9 shows the comparison between all the

three for the corrected mean photon number. Corrected mean photon number

corresponds to the source mean photon number.

Ideally, all the three curves should match since the source mean photon

number stays fairly constant through out the experiment. However, there is

variation from the detector to detector and this can be attributed to the error

and also to differences in losses in each case. The graphs of the two channels

of SNSPD in Figure 6.9 seems to be following a similar trend which is slightly

different from that of the APD. This can be attributed to the fact that the two

channels use similar type of fibre as well as the length to couple the light from

the setup to the detectors. This is different from that of the APD. Therefore,

an average of all three has been taken to obtain the best match for the source

mean photon number. This is shown in Figure 6.10.

41

Page 46: Development towards a BB84 QKD system for CubeSats

Figure 6.9: Source Mean Photon number comparison between the three detec-tors

Figure 6.10: Source mean photon number obtained using the average of thethree detectors.

Equation 6.11 have been used in Figure 6.10 to carry out the curve fit.

y = a1 sin2 π

2

V

Vπ+ b1 (6.11)

where the values of a1 and b1 were found to be 17.09 and 0.14 respectively.

From Figure 6.10, we observe that a source mean photon number of 0.142 ±0.023 and 0.247 ± 0.036 is achieved at 0V modulation and 14V modulation.

42

Page 47: Development towards a BB84 QKD system for CubeSats

From equation (6.11), we know that a1 + b1 = Max and b1 = Min. There-

fore, the ExtinctionRatio = 20.9. The deviation of this value from 19.2 stated

above is due the large uncertainties in the efficiencies of the detectors.

Since the aim is to conduct decoy state QKD, it is necessary to have one or

multiple decoy states. Researchers have shown that the security of the system

improves with more decoy states but having two types of decoy states especially

vacuum and another states is a good approximation for infinite number of decoy

states [32]. The intensities of the decoy states are optimised to achieve maximum

key rates for specific wavelength and losses. Due to time constraints, we could

not conduct the optimisation and aimed to achieve a signal mean photon number

of ≈ 0.48 and decoy state mean photon number of ≈ 0.12. The higher signal

state can be achieved by applying a modulation of a higher voltage and using

the expression obtained, this voltage can be calculated to be ≈ 25V.

43

Page 48: Development towards a BB84 QKD system for CubeSats

Chapter 7

Evaluation and Conclusion

With a goal of sharing keys as securely as possible though BB84 QKD, it is

extremely important to understand the constraints on the key components of

the setup and the best available alternative. In this project, we have explored a

configuration for conducting QKD where the source is on a nanosatellite revolv-

ing in a orbit around the Earth. This part of the setup consists of the source

of photons which is the laser and also parts encode the information which is an

equipment able to modulate the laser. The detection part of the setup is on the

ground and it can make use of the different types of detectors available.

One of the main constraints that we have explored in this project is space.

There are a few ways of doing decoy state BB84 as discussed earlier, but the

key was to use one the most space effective configuration consisting of the one

source, one modulator for intensity control and one for polarisation control

together with the electronics on printed circuit boards.

For our source of photons, we have used a VCSEL with a very low threshold.

This helps to reduce the power requirements of the setup which is a key factor

for nanosatellite missions and also allows us to operate it by a relatively simpler

laser driver circuit. Since we are using only one laser, we do not need to be

concerned about it being distinguishable of the photons generated. Having

multiple lasers requires the setup to have temperature control units to ensure

the that the spectra of the lasers overlap well.

Another important consideration is the choice of the modulator. There are

two types of Electro-optic modulators: pockels cell based and wave-guide based.

44

Page 49: Development towards a BB84 QKD system for CubeSats

We chose the one based on pockels cell due to its smaller size. Even though the

waveguide ones are not that big but they require a temperature control and that

makes them large and bulky. One of them is show in Figure 7.1.

Figure 7.1: Intensity Modulator based on Mach Zehnder interferometry. The topsilver part contains the modulator. The box at the bottom is the thermoelectriccooler.

Even though the waveguide ones are not space efficient, they have a lot of

advantages and therefore are the common type of modulator used in most QKD

experiments. The Vπ for these modulators are usually less than 10V and hence

it is possible to do relatively large intensity modulation using these as compared

to the Pockels cells one whose Vπ is very large. Using a waveguide modulator

can help us achieve a much larger contrast between the signal and decoy states by

modulating over a small voltage. This will also allow us to operate at frequencies

of 100MHz or above. A high frequency in QKD experiments is necessary to

achieve a good key-rate generation. Another important consideration is the

duty cycle as well as pulse-width. Due to a low signal to noise ratio, we were

not able to carry out meaningful measurements using narrow pulse-width, but

this is definitely possible using the waveguide modulators. A pulse width of

5µs was used which was not ideal for any QKD system. Pulse width in the

45

Page 50: Development towards a BB84 QKD system for CubeSats

range of pico-seconds and duty cycle ≤ 1% is generally used in order to keep

the communication as secure as possible [33].

The last component which is very crucial is the detector. These are on the

ground to receive the signal coming from the source. For our project, we have

used an APD whose dead time is in the order of 1µs and hence a frequency

of 1MHz is the limit. Since our aim was to study the mean photon number

using the different detectors and use them to characterise the source, all the

three detectors had to be operated using the same settings. Moving forward,

the next step will definitely be to study the mean photon number at higher

frequencies using the SNSPD or even better detectors with smaller dead time.

Though SNSPD is much better in terms of performance and is a viable option

for a scientific experiment, it is not ideal for real world implementation since

it is much more expensive and bulky as compared to an APD with an active

quenching circuit that have dead time of a few nano-seconds also [34].

In conclusion, the combination of equipment used in this project may not

be best suited for a nanosatellite compatible setup. Moving forward, it will be

important to find the balance between performance and the constraints of the

project.

46

Page 51: Development towards a BB84 QKD system for CubeSats

Bibliography

[1] David Kahn. The codebreakers. Scribner’s and Sons, 1997.

[2] Simon Singh. The Code Book. Distributed by Paw Prints / Baker & Taylor,

2009.

[3] Goldreich Oded. Foundations of Cryptography: Volume 2, Basic Appli-

cations. Cambridge University Press, New York, NY, USA, 1st edition,

2009.

[4] Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Em-

manuel Thome, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Pe-

ter L. Montgomery, Dag Arne Osvik, Herman te Riele, Andrey Timofeev,

and Paul Zimmermann. Factorization of a 768-bit rsa modulus. In Tal

Rabin, editor, Advances in Cryptology – CRYPTO 2010, pages 333–350,

Berlin, Heidelberg, 2010. Springer Berlin Heidelberg.

[5] P. W. Shor. Algorithms for quantum computation: discrete logarithms

and factoring. In Proceedings 35th Annual Symposium on Foundations of

Computer Science, pages 124–134, Nov 1994.

[6] Karl Berggren. Quantum computing with superconductors. Proceedings of

the IEEE, 92:1630 – 1638, 11 2004.

[7] Charles H. Bennett, Francois Bessette, Gilles Brassard, Louis Salvail, and

John Smolin. Experimental quantum cryptography. Journal of Cryptology,

5(1):3–28, Jan 1992.

[8] Stephen Wiesner. Conjugate coding. SIGACT News, 15(1):78–88, January

1983.

47

Page 52: Development towards a BB84 QKD system for CubeSats

[9] Charles Bennett and Gilles Brassard. Withdrawn: Quantum cryptography:

Public key distribution and coin tossing. volume 560, pages 175–179, 01

1984.

[10] Artur K. Ekert. Quantum cryptography based on bell’s theorem. Phys.

Rev. Lett., 67:661–663, Aug 1991.

[11] W K. Wootters and W H. Zurek. A single quantum cannot be cloned.

Nature, 299:802, 10 1982.

[12] Nicolas Gisin, Gregoire Ribordy, Wolfgang Tittel, and Hugo Zbinden.

Quantum cryptography. Rev. Mod. Phys., 74:145–195, Mar 2002.

[13] Gilles Brassard, Norbert Lutkenhaus, Tal Mor, and Barry C. Sanders. Limi-

tations on practical quantum cryptography. Phys. Rev. Lett., 85:1330–1333,

Aug 2000.

[14] Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen. Decoy state quantum key

distribution. Phys. Rev. Lett., 94:230504, Jun 2005.

[15] Rupert Ursin, F Tiefenbacher, T Schmitt-Manderbach, Henning Weier,

Thomas Scheidl, M Lindenthal, Bibiane Blauensteiner, Thomas Jennewein,

J Perdigues, Pavel Trojek, B Oemer, Martin Furst, M Meyenburg, J Rarity,

Z Sodnik, C Barbieri, H Weinfurter, and A Zeilinger. Free-space distribu-

tion of entanglement and single photons over 144 km. Nature, 08 2006.

[16] D Rosenberg, C G Peterson, J W Harrington, P R Rice, N Dallmann, K T

Tyagi, K P McCabe, S Nam, B Baek, R H Hadfield, R J Hughes, and J E

Nordholt. Practical long-distance quantum key distribution system using

decoy levels. New Journal of Physics, 11(4):045009, apr 2009.

[17] Boris Korzh, Charles Lim, Raphael Houlmann, Nicolas Gisin, Ming-Jun

Li, D.A. Nolan, Bruno Sanguinetti, R Thew, and Hugo Zbinden. Provably

secure and practical quantum key distribution over 307 km of optical fibre.

Nature Photonics, 9, 07 2014.

[18] Christopher J Pugh, Sarah Kaiser, Jean-Philippe Bourgoin, Jeongwan Jin,

Nigar Sultana, Sascha Agne, Elena Anisimova, Vadim Makarov, Eric Choi,

Brendon L Higgins, and Thomas Jennewein. Airborne demonstration of a

quantum key distribution receiver payload. Quantum Science and Technol-

ogy, 2(2):024009, jun 2017.

48

Page 53: Development towards a BB84 QKD system for CubeSats

[19] Juan Yin, Yuan Cao, Yu-Huai Li, Sheng-Kai Liao, Liang Zhang, Ji-Gang

Ren, Wen-Qi Cai, Wei-Yue Liu, Bo Li, Hui Dai, Guang-Bing Li, Qi-Ming

Lu, Yun-Hong Gong, Yu Xu, Shuang-Lin Li, Feng-Zhi Li, Ya-Yun Yin,

Zi-Qing Jiang, Ming Li, Jian-Jun Jia, Ge Ren, Dong He, Yi-Lin Zhou,

Xiao-Xiang Zhang, Na Wang, Xiang Chang, Zhen-Cai Zhu, Nai-Le Liu,

Yu-Ao Chen, Chao-Yang Lu, Rong Shu, Cheng-Zhi Peng, Jian-Yu Wang,

and Jian-Wei Pan. Satellite-based entanglement distribution over 1200

kilometers. Science, 356(6343):1140–1144, 2017.

[20] Robert Bedington, Juan Miguel Arrazola Mantilla, and Alexander Ling.

Progress in satellite quantum key distribution. npj Quantum Information,

3, 07 2017.

[21] ID Quantique. Marketing.idquantique.com.

[22] Satoshi Kako, Charles Santori, Katsuyuki Hoshino, Stephan Gotzinger,

Yoshihisa Yamamoto, and Yasuhiko Arakawa. A gallium nitride single-

photon source operating at 200k. Nature materials, 5:887–92, 12 2006.

[23] Inamori, H., Lutkenhaus, N., and Mayers, D. Unconditional security of

practical quantum key distribution. Eur. Phys. J. D, 41(3):599–627, 2007.

[24] F. T. Arecchi. Measurement of the statistical distribution of gaussian and

laser sources. Phys. Rev. Lett., 15:912–916, Dec 1965.

[25] J. S. Choe, H. Ko, B. S. Choi, K. J. Kim, and C. J. Youn. Integrated

polarization beam splitter module for polarization-encoded free-space bb84

qkd. In Optical Fiber Communication Conference, page Th2A.5. Optical

Society of America, 2018.

[26] Yang Liu, Teng-Yun Chen, Jian Wang, Wen-Qi Cai, Xu Wan, Luo-Kan

Chen, Jin-Hong Wang, Shu-Bin Liu, Hao Liang, Lin Yang, Cheng-Zhi Peng,

Kai Chen, Zeng-Bing Chen, and Jian-Wei Pan. Decoy-state quantum key

distribution with polarized photons over 200 km. Opt. Express, 18(8):8587–

8594, Apr 2010.

[27] Fadri Grunenfelder, Alberto Boaron, Davide Rusca, Anthony Martin, and

Hugo Zbinden. Simple and high-speed polarization-based qkd. Applied

Physics Letters, 112, 01 2018.

[28] F. Bloch. Nuclear induction. Phys. Rev., 70:460–474, Oct 1946.

49

Page 54: Development towards a BB84 QKD system for CubeSats

[29] Malvin Carl Teich and Giovanni Vannucci. Observation of dead-time-

modified photocounting distributions for modulated laser radiation. J. Opt.

Soc. Am., 68(10):1338–1342, Oct 1978.

[30] John H. Hubbell. Radiation detection and measurement, 3rd edition, glenn

f. knoll; wiley, new york, 2000, isbn 0-471-07338-5. Radiation Physics and

Chemistry - RADIAT PHYS CHEM, 60:33–34, 01 2001.

[31] B. I. Cantor and M. C. Teich. Dead-time-corrected photocounting distri-

butions for laser radiation∗. J. Opt. Soc. Am., 65(7):786–791, Jul 1975.

[32] Xiongfeng Ma, Bing Qi, Yi Zhao, and Hoi-Kwong Lo. Practical decoy state

for quantum key distribution. Phys. Rev. A, 72:012326, Jul 2005.

[33] M. Jofre, A. Gardelein, G. Anzolin, G. Molina-Terriza, J. P. Torres, M. W.

Mitchell, and V. Pruneri. 100 mhz amplitude and polarization modulated

optical source for free-space quantum key distribution at 850 nm. J. Light-

wave Technol., 28(17):2572–2578, Sep 2010.

[34] Mario Stipcevic, Bradley G. Christensen, Paul G. Kwiat, and Daniel J.

Gauthier. Advanced active quenching circuit for ultra-fast quantum cryp-

tography. Opt. Express, 25(18):21861–21876, Sep 2017.

50