Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system =...

46
Practical Quantum Cryptography Practical Quantum Cryptography G. Gilbert 28 March 2001 Seminar Presentation at Purdue University Center for Education and Research in Information Assurance and Security © All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed. 0,75( UNCLASSIFIED Approved for public release

Transcript of Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system =...

Page 1: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

PracticalQuantum Cryptography

PracticalQuantum Cryptography

G. Gilbert28 March 2001

Seminar Presentation at Purdue UniversityCenter for Education and Research in Information Assurance and Security

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 2: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����

Principal Seminar Reference -http://xxx.lanl.gov/abs/quant-ph/0009027

UNCLASSIFIED

Approved for public release

Page 3: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Information on Quantum Information...

�����

MITRE Quantum Information Processing Website:appearing soon at: http://www.mitre.org/

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

Approved for public release

Page 4: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

The situation in a nutshell…(1)

1) The Future - Optical Communications Spanning the Globea) Ultra-Transparent Optical Fibers & All Optical Switchingb) Optical Links Connecting Spaceborne Assets

2) An Important Element - Quantum Cryptographya) Unconditional Secrecy (even against Quantum Computers)b) Los Alamos, MITRE and others: Working Prototypes alreadyc) But: Slow (5 Kbps)

3) MITRE - MSR (MITRE Sponsored Research) Project + IC fundinga) Objective: High-Speed (1 Gbps)b) Theoretical Work: Detailed mathematical analysesc) Experimental Work: Laboratory prototype demonstrations

�����© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

UNCLASSIFIED

Approved for public release

Page 5: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

The situation in a nutshell…(2)

• Improvements in algorithms and/or computing machinery

a) Moore’s Law & Nanocomputing - “Slippery Slope” (Now & 10+ years)

b) Quantum Computers - “The Precipice” (10+ years ?)

�����© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

UNCLASSIFIED

Approved for public release

Page 6: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

� MITRE has obtained the first complete mathematicaldescription of quantum cryptosystem operatingcharacteristics

� MITRE has analyzed a practical system design whichshould be able to achieve high throughput

� Theoretical analysis demonstrates possibilities for avariety of specific applications of quantumcryptography

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����

First-Year Accomplishments - Theoretical (1)

UNCLASSIFIED

Approved for public release

Page 7: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

• We show that various practical high-speed quantum cryptosystems can work(multiplexing can increase these rates) -

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed. �����

First-Year Accomplishments - Theoretical (2)

30 cmtransmittelescope

0.6 meterreceivetelescope

•Free-space channel: Aircraft-LEO satellite link•Secret throughput ~60 Mbps (> T3 link)

1.6 meterreceivetelescope

•Free-space channel: Earth (MSL)-LEO satellite link•Secret throughput ~60 Mbps (>T3 link)

10 meterreceivetelescope

•Free-space channel: Earth (10000’)-GEO satellite link•Secret throughput ~240 Kbps (1/6th T1 link)

•Fiber-optic channel:•Secret throughput ~115 Mbps (10 km link)•Secret throughput ~30 Mbps (40 km link)

Approved for public release

UNCLASSIFIED

Page 8: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

High-Speed Quantum Cryptography

�����© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

•Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possiblesystem consistent with the laws of physics

• Secure against even Quantum Computers

• Quantum key distribution:– It is impossible to measure the state of a quantum bit without altering

it; No passive eavesdropping possible due to the Heisenberg

Indeterminacy Principle unconditional secrecy

• Vernam cipher (“one-time pad”) encryption:– Plaintext encrypted via XOR against Vernam cipher; As a result

ciphertext is literally random unconditional secrecy

• High speed transmission:– Generation of large Vernam ciphers bulk encryption

• Quantum key distribution:– It is impossible to measure the state of a quantum bit without altering

it; No passive eavesdropping possible due to the Heisenberg

Indeterminacy Principle unconditional secrecy

• Vernam cipher (“one-time pad”) encryption:– Plaintext encrypted via XOR against Vernam cipher; As a result

ciphertext is literally random unconditional secrecy

• High speed transmission:– Generation of large Vernam ciphers bulk encryption

UNCLASSIFIED

Approved for public release

Page 9: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

“Ideal” Quantum Key Distribution Protocol (BB84)

1) Alice sends: I I / – – \ – I – /

2) Bob sets: x + + x x x + x + +

3) Bob receives: / I – \ / \ – / – I

4) Bob tells Alice (publicly) what his settings were

5) Alice tells Bob (publicly) which settings werecorrect: 2,6,7,9

6) Alice and Bob keep those states correctlymeasured:

* I * * * \ – * – *

7) Using { I , \ } = 0 and { – , / } = 1 yields:

0 0 1 1 : the shared random key

�����© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

UNCLASSIFIED

Approved for public release

Page 10: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

aEC

Singlephotonpulses

Multi-photonpulses

PrivacyAmplified

Data

Correcteddata

Sifteddata

Rawdata

Quantum ChannelQuantum ChannelTransmissionTransmission

Leakedinformation

estimate:s bits

Errors:eT bitsm bits

Inconclusive:m-n bits

n bits n-eT bits n-eT-s bits

KeyKeySiftingSifting

ErrorErrorCorrectionCorrection

PrivacyPrivacyAmplificationAmplification

QuantumChannnel

Eavesdropping

t(n,t(n,eeTT))

SecurityParameter

gg

Eavesdropper

EstimatedInformation

Leakage:ss==t(n,t(n,eeTT))++

νν++qqνν

ErrorCorrection

Eavesdropping

qq

Final VernamCipherLength:nn--eeTT--s-g-as-g-a

bits

2ln

2 g−

≤Final probability that Eve knows 1 or more bits

Adapted from Slutsky, et. Al, “Defense frontier analysis of quantum cryptographic systems,” Applied Optics, Vol. 37, No 14, 10 May 1998.

e.g. if g=30 this probability is 10-9

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

FinalKey

Authenticationcost: a bits

n-eT-s-a bits

aSa=as+aEC

Continuous AuthenticationContinuous Authentication

Practical Quantum Key Distribution Analysis

�����

Approved for public release

Page 11: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Physical Variables for Effective Secrecy Capacity

m number of raw bitsn number of sifted bitseT number of sifted bits in errors information content obtained by eavesdropperg privacy amplification security parametera number of continuous authentication bitsτ bit cell period

The effective secrecy capacity function is defined as:

The effective secrecy rate function is defined as:

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

SR 1−≡τ

m

agsenS T −−−−≡

�����UNCLASSIFIED

Approved for public release

Page 12: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Physical Parameters for Effective Secrecy Capacity

α line attenuation

η photon detector quantum efficiency

rc intrinsic error in quantum channel

rd dark count

x Shannon limit exceedence

µ mean photon number per pulse

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

To calculate the secrecy capacity and rate we also need:

�����UNCLASSIFIED

Approved for public release

Page 13: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Calculation of Number of Sifted Bits: n

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

( ) ∑=

′′′ llllPmn

,,Alice leave photons

Fundamental Approach: (1) enumerate all dynamical events (2) deduce associated absolute and conditional probabilities (3) carry out the sums

�����UNCLASSIFIED

( ) Alice leave photons | Bobreach photons llP ′×

( ) Bobreach photons | detected photons llP ′′′×

( ) ( )]ity compatibil basis event count dark no PP ××

( ) ( )}ity compatibil basis event count dark PP ×+

Approved for public release

Page 14: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Calculation of Number of Sifted Bits: probabilities

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

( )!

Alice leave photons l

elPlµµ−=

The relevant absolute and conditional probabilities are:

�����UNCLASSIFIED

( ) ( ) lll

l

lllP ′−′ −

=′ αα 1 Alice leave photons | Bobreach photons

( ) ( ) ( )llll

l

lllP ′′

′′−′′′ −−

′′′

=′′′ ,011 Bobreach photons | detected photons δηη

( ) drP −=1 event count dark no

( )2

1ity compatibil basis =P

Approved for public release

Page 15: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Calculation of Effective Secrecy Capacity

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

loss at detector

channel errorline attenuation

dark count

mean photon number per pulse

mean photon number per pulse

number of sifted bits

number of error bits

( ) ( )[ ] ( )[ ]22

1 11

mr

mrrn ddd ⋅+≈⋅+−= ≥≥ ηµαψηµαψ

( ) ( )22222

1 11

mrr

mrr

re d

cd

cd

T ⋅

+≈⋅

+

−= ≥≥ ηµαψηµαψ

�����UNCLASSIFIED

Approved for public release

Page 16: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Physical Variables for Effective Secrecy Capacity

q information obtained via error-correction eavesdroppingt information obtained via single-photon pulses

ν information obtained via multi-photon pulses

The information obtained by eavesdropper is:

ν++= tqs

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

We now determine in turn: q, t and ν:

�����UNCLASSIFIED

Approved for public release

Page 17: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

3 Types of Individual Attacks on Multi-Photon Pulses

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

Direct Attack: (1) Eve intercepts multi-photon pulse (3 or more photons) (2) Eve measures and determines polarization of pulse (3) Eve prepares and transmits surrogate pulse

�����UNCLASSIFIED

Indirect Attack: (1) Eve intercepts multi-photon pulse (2 or more photons) (2) Eve retains u photons in quantum memory (3) Eve allows remnant pulse to propagate to Bob (4) Eve listens to public discussion and measures retained pulse

Combined Attack: (1) Eve intercepts multi-photon pulse (5 or more photons) (2) Eve performs direct attack against some of the pulse (3) Eve performs indirect attack against some of the pulse

Approved for public release

Page 18: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Calculation of Multi-photon Privacy Amplification:

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

( ) ( )∑=′′′′′′ llll

ui lP

m

,,,Alice leave photons

�����UNCLASSIFIED

( ) Alice leave photons | Evereach photons llP ′×

( ) Eve pass photons | Bobreach photons ullP −′′′×

( ) Bobreach photons | detected photons llP ′′′′′×

Sample Calculation - Indirect Attack: (1) Eve intercepts multi-photon pulse (2 or more photons) (2) Eve retains u photons in quantum memory (3) Eve allows remnant pulse to propagate to Bob (4) Eve listens to public discussion and measures retained pulse

Approved for public release

Page 19: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Best Value for Privacy Amplification Function

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

( )

−+−+= − 1

2cosh2

2sinh21

2 2

µµηµψν µemmax

The complete closed form expressions for the privacy amplificationfunctions that guarantee secrecy against individual attacks are:

( ) ( ) ( )[ ]{ }[ ]ηµηµψν µηµ −+−−+= −−− 1112

12 ee

mmax

3 2

11 −<η

2

11 −>η

�����

m

νν 2~=

UNCLASSIFIED

Approved for public release

Page 20: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Calculation of Effective Secrecy Capacity

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

effective secrecy capacity( )m

agr

ffrS dc

+−

−+−= ≥ νψ ~

211

2

11

( )

+−

−+−= ≥

m

agr

ffrR dc νψτ ~

211

2

11

1 effective secrecy rate

The complete closed form expressions for the effective secrecycapacity and rate functions are:

�����UNCLASSIFIED

Approved for public release

Page 21: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Sources of Attenuation: Loss Budget

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

• Atmospheric Transmission Losses: FASCODE– Atmospheric absorption and scattering

• Turbulence-Induced Losses: NUMERICAL MODELS– Scintillation– Beam wander– Beam spread– Coherence loss– Pulse distortion and broadening (dispersion)

• Geometrical Diffraction Loss: HAND CALCULATION

• Optics-Package Losses: COMPARATIVE ANALYSIS

�����UNCLASSIFIED

Approved for public release

Page 22: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Atmospheric Transmission Loss due to Absorptionand Scattering - Summary

• Analysis using AFRL’s PLEXUS system, which providesan interface to FASCODE

• Typical attenuation calculations for 1550 nm laser, 300 kmto ground clear weather conditions on the order of 1 db

• Attenuation virtually disappears for 10 to 300 kmcommunication

• Slight asymmetry in upwards and downwardstransmittance

• Clouds and even light drizzle will severely attenuate beam

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 23: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Alice on Ground, 60 Degree Slant AngleAlice on Ground, 40 Degree Slant AngleAlice on Ground, 20 Degree Slant AngleAlice at 300 km, 60 Degree Slant AngleAlice at 300 km, 40 Degree Slant AngleAlice at 300 km, 20 Degree Slant Angle

Transmittance differences aregreater when slant angle is greater.

Alice at 300 km, 90 Degree Slant AngleAlice at 300 km, 80 Degree Slant AngleAlice at 300 km, 70 Degree Slant AngleAlice at 300 km, 60 Degree Slant AngleAlice at 300 km, 50 Degree Slant AngleAlice at 300 km, 40 Degree Slant Angle

Transmittance is marginally greaterfor steeper slant angles.

(Click here return to last slide)

Transmittance as a Function of Slant AngleAlice at 300km, Bob on Ground, 1550nm Laser

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����

Approved for public releaseUNCLASSIFIED

Page 24: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Transmittance in the Presence of PrecipitationAlice at 300km, Bob on Ground, 1550nm Laser

Even slight drizzle causes severeattenuation.

(Click here return to last slide)

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����

Approved for public releaseUNCLASSIFIED

Page 25: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Turbulence-Induced Dispersion Loss Diagram

3.5 4 4.5 5 5.5 6log 10Hpath length �meter L

-15

-14

-13

-12

-11

-10

-9

-8

go

l01

H

es

lu

ph

tg

ne

l

dn

oc

es

L

Region of Turbulence �Induced Dispersion Loss

3.5 4 4.5 5 5.5 6log 10Hpath length �meter L

-15

-14

-13

-12

-11

-10

-9

-8

go

l01

H

es

lu

ph

tg

ne

l

dn

oc

es

L

Region of Turbulence �Induced Dispersion Loss

region of no pulse broadening or distortion

region of pulse broadening and/or distortion

limits of pulse width for 10 GHz qubit source

100 psec

20 psec

graph calculated for qubits with wavelength λ = 1550 nm

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

Unshaded region is the solution to simultaneous inequalities that determineconditions for the spectrum of a shortpulse in a turbulent medium to be equalto that of the incident pulse

this line corresponds to 300 km path length

�����UNCLASSIFIED

Approved for public release

Page 26: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Calculations for Diffraction and Turbulence Losses

•Calculation of geometrical vacuum diffraction beam spread:

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

( )2

12

2

2

2

4

+= A

A

d

D

kD

( )

56

31

02

0

222 62.01

4

−+=

Ads Dk

L ρρ

ρρ

( ) ( )5

3

0

35

220 1sec46.1

−= ∫

L

n LCdk

ηηηϕρ

( )2

2

2

2 4 χσσ ≈−

=I

III

( )∫=L

n zzdzCk0

6526

72 56.0χσ

•Calculation of transverse coherence length for turbulence:

•Calculation of short-term beam broadening due to turbulence:

•Calculation of scintillation due to turbulence:

�����UNCLASSIFIED

Approved for public release

Page 27: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Model for Refractive Index Structure Function

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

0 5 10 15 20 25 30height HkmL

1. �10-21

1. �10-18

1. �10-15

1. �10-12

1. �10 -9

1. �10 -6

Cn2

H

m

-

2

3

L

Cn2 Profile Calculated from the Hufnagel�Valley 5�7 Model

This empirically fitted model for Cn2 characterizes the refractive index in the turbulent boundary layer

�����UNCLASSIFIED

Approved for public release

Page 28: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Beam Wander Correction

• Active closed-loop feedback at Alice and Bobreject beam wander ( >30 dB rejection)

• Tracking beam from each terminal split toquad cell detectors for beam tilt correction

• Fast steering mirrors scans incoming trackingbeam to correct for lower frequency wander(<100 Hz)

• Source: MIT/LL GeoLITE program

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

31

35

02

22 97.2

A

c

Dk

L

ρρ =Beam wander due to turbulence:

�����UNCLASSIFIED

Approved for public release

Page 29: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Receiver Optics Package Efficiency Estimate

• Telescope efficiency: 90%• Optical fiber component transmission efficiencies

– Free-space to fiber collimator: 80%– Polarization beamsplitter: 80%– Wave division multiplexer: 90%– Optical filters: 95%

• Free space optical components efficiencies: ~95% each• Optical fiber implementation of ULTRA Bob: –3.8 dB• Free space ULTRA Bob: –2.3 dB• Reported optics losses for demonstrated lasercom

terminals range from –1.9 to –8 dB

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 30: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

References for Receiver Optics Losses

System

Atmospheric Attenuation

(dB)

Optics Package Loss

(dB) MissionWavelength

(nm) Reference Notes

JPL-OCD -1.9 lab demo 840SPIE vol. 3266

pp. 33-41 measured

AF Airborne ACT -4.8 -3 air-to-air 810SPIE vol. 3266

pp. 178-197design; 500 km airborne

demo at 40,000 ft alt.

JPL-OCD -5terrestrial point-

to-point 780SPIE vol. 3615

pp. 43-53 measured

JPL-OCD -6terrestrial point-

to-point 840SPIE vol. 3615

pp. 43-53 measured

JPL-DSO -3.65 -3.36deep space to

ground 800SPIE vol. 3615

pp. 154-169 design

JPL-OCDHRLF -2earth orbit to

ground 1550SPIE vol. 3615

pp. 185-191 design

JPL-X2000 -4deep space to

ground 550-1000SPIE vol. 3615

pp. 206-211 design

JPL-GOLD -3.14 -8.24 ground to GEO 514.5SPIE vol. 2990

pp. 70-81 measured

JPL-GOLD -2.19 -1.94 GEO to ground 830SPIE vol. 2990

pp. 70-81 measured

CRL -3 -6.5 GEO to ground 1550SPIE vol. 2990

pp. 142-151 design

CRL ETS-VI -3 -8.2 ground to GEO 514.5SPIE vol. 2990

pp. 264-275 measured

CRL ETS-VI -2 -4.4 GEO to ground 830SPIE vol. 2990

pp. 264-275 measured

CRL LCE -2 -7.2 GEO to ground 830SPIE vol. 2990

pp. 264-275 estimated

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 31: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Classical Processing & Public DiscussionPhase

• Steps in the classical process– Sifting– Error correction– Privacy amplification

• Several associated costs– Authentication– Communications– Computation

– Time: Processing requirements– Space: Memory requirements

– Supply of random numbers• We have obtained analytical results for

authentication, communications, and processingcosts

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 32: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Effective Secrecy Capacity: Earth-LEO Link

10 GHz prf laser

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

free-space quantum channel

�����

0 5�10-11 1�10-10 1.5�10-10 2�10-10

bit cell period Hseconds L

0

5�107

1�108

1.5�108

2�108

ev

it

ce

ff

et

er

ce

sm

an

re

Vr

eh

pi

ct

up

hg

uo

rh

t

H

st

ib

re

pd

no

ce

s

L

Effective Quantum Cryptographic Throughput of Secret Vernam Cipher

h=50%

h=25%

h=5%

EARTH�TO�SATELLITE LINK"Alice" on satellite : 30cm transmit optics

"Bob" at mean sea level: 1.6 m receive optics"Cascade" error correction : Shannon exceedence = 16%

Continuous authentication processing block size = 200 Mbits

CLEAR WEATHER

rc=0.5% Hsolid L

rc=1% Hshort dashed L

rc=2% Hlong dashed L

rd=4.25 �10-18 counts �bit cell

a -10dB

57 Mbps

36 Mbps

21 Mbps

satellite at zenith

clear weather

UNCLASSIFIED

Approved for public release

Page 33: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Effective Secrecy Capacity: Earth-GEO Link

10 GHz prf laser

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����

0 5�10-11 1�10-10 1.5�10-10 2�10-10

bit cell period Hseconds L

0

500000

1�106

1.5�106

2�106

ev

it

ce

ff

et

er

ce

sm

an

re

Vr

eh

pi

ct

up

hg

uo

rh

t

H

st

ib

re

pd

no

ce

s

L

Effective Quantum Cryptographic Throughput of Secret Vernam Cipher

h=50%

h=30%

EARTH�TO�SATELLITE LINK"Alice" on GEO satellite: 30cm transmit optics

"Bob" at 13500’ : 10m receive optics"Cascade" error correction : Shannonexceedence= 16%

Continuous authentication processingblock size= 2 Gbits

rc=0.5% Hsolid L

rc=1% Hshort dashed L

rc=2% Hlong dashed L

rd=4.25 �10-18 counts �bit cell

a -26.4 dB

118 Kbps

240 Kbps

UNCLASSIFIED

free-space quantum channel

Approved for public release

Page 34: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Quantum Cryptographic Attenuation Curves

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

0.4 0.6 0.8 1 1.2 1.4 1.6Receiver Optics HBobL Aperture Size HmL

-25

-20

-15

-10

-5

0

en

il

no

it

au

ne

tt

a

H

Bd

L

Total Line AttenuationCurves for 30 cm Transmitter Optics �"Alice"� andPhotonQubits at ��1550 nm

� is the declination angle

Adaptive beam�tilt correction employed

Turbulence Calculations

scintillation : Cn2 via Hufnagel �Valley model

beam spread : Cn2 via CLEAR I model

Atmospheric transmission loss calculated with FASCODE

� � 0o or 45o

� � 0o

� � 45o

"Alice" on satellite at 300 km altitude"Bob " on aircraft at 35000 ’ altitude �solid �

"Bob " on ground at mean sea level �dashed �

�����UNCLASSIFIED

Approved for public release

Page 35: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

First-Year Accomplishments - Experimental

� “FIRST LIGHT” - MITRE JOINS QUANTUMCRYPTOGRAPHY CLUB

Thursday, 27 July 2000

First successful full demonstration at MITRE ofquantum cryptography between “Alice” and“Bob”

MITRE results reproduce benchmark establishedby Los Alamos National Laboratory

Throughput data rate values for siftedcryptographic Vernam cipher approximately 10Kilobits/second

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 36: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Quantum Information Processing:Secure Quantum Communications MSR Team

INNOVATIVE SOLUTIONS FACTORY(MITRE NEW JERSEY)

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

QUANTUM OPTICS LABORATORY(MITRE BEDFORD)

�����

MITRE is working with US Intelligence Community, Air Force Research Laboratory,Naval Research Laboratory, Caltech Jet Propulsion Laboratory, University of Rochester, others

UNCLASSIFIED

Approved for public release

Page 37: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Work in Progress: MITRE & IC funding•Verification of crucial theoretical predictions:

– Scaling behavior of computational cost for

parallelized links•essential to allow for achieving goal of

high-speed system throughput, since single link will not support sufficient

throughput– Combining optical fiber and free space quantum channels (of non-negligible lengths)

for real systems applications

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 38: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Team for Quantum Cryptography

Consortium effort to develop unconditionally secretquantum cryptosystems for National Security levelcommunication, including:� MITRE

� IC

� IC

� DARPA

� IC

� NRL

� AFRL

� JPL

� University of Rochester

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 39: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Design of Practical Ultrafast QKD System (1)

Question: How can we increase the throughput rate for arealistic quantum cryptography system?

Answer:(1) Increase the basic pulse repetition frequency (i.e., reduce the

bit cell period) - need fast photon detectors

(2) Increase the number of transmitters (i.e., multiplex Alices) -

need: relation between block size and rate

(3) Combine the above techniques

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.UNCLASSIFIED �����

Approved for public release

Page 40: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Design of Practical Ultrafast QKD System (2)

Question: What is a practical rate for the internal clockspeed of a realistic quantum cryptography system?

Answer: A practical system can be designed with aninternal clock speed of 10 GHz, corresponding to a bitcell period, τ, of 100 picoseconds.

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.UNCLASSIFIED �����

Approved for public release

Page 41: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Ultrafast Optoelectronics Requirement

Two essential requirements for ultrafast quantum cryptography:

• Photon detection apparatus as fast as bit cell period• Superconducting HEP photon detection

• University of Rochester group• Sufficiently fast source of quantum bits

• Pulsed lasers with high pulse repetition frequency• Naval Research Laboratory

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 42: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Hot Electron Photo-Effect (HEP) Detection

• The HEP effect employs superconducting thin film technology• Different materials, including Niobium Nitride (NbN) and Yttrium Barium Copper Oxides (YBCO) exhibit the HEP effect

• NbN has measured HEP cycle time of 30 picoseconds (33 GHz)• Tc=9K (slightly higher than liquid helium)

• YBCO has measured HEP cycle time of 1 picosecond (1 THz)• Tc=89K (slightly higher than liquid nitrogen)

ν

T<Tc T>Tc T<Tc

bound electron Cooper pairsbroken Cooper pairs bound electron Cooper pairs

electrical resistivity generated

incoming photon

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 43: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

Design of Practical High-Speed QKD System

We show the design for a full, high-speed quantum

key distribution system

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 44: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

High-Speed Alice

PulsedLASER

MachZehnder

MachZehnder

To Bob

Bandpassfilter

PPBC

PPBC

PPBC

VA - Variable AttenuatorPPBC - Polarization Preserving Beam Combiner

Timing PulsePulsedLASER

Data Recording,Storage,

&System Control

Clock

MachZehnderDelay R.N.G.

R.N.G.

P1

P2

P3

P4

Basis 1

Basis 2

VA

VA

VA

VA

OpticalElectrical

BS

λ1

λ2Public

Public Channelto Bob

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 45: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

High-Speed Bob

HEP1

HEP4

HEP3

HEP2 Data Storage

&Controls

PBS

From Alice

DBS

DBS - Dichroic BeamsplitterPBS - Polarization Beamsplitter

Timing Pulse

PINPhotodiode Basis 1

Basis 2

ClockExtract

Optical

Solarfilter

Electrical

λ1

λ2

Public

Public Channel to Alice

Polarization Rotator/waveplate

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release

Page 46: Practical Quantum Cryptography - CERIAS · •Quantum Key Distribution + Vernam cipher system = QUANTUM CRYPTOGRAPHY: most secure possible system consistent with the laws of physics

High-Speed DEMUX and Data Storage

10 GHz

Master Clock

Digital SignalAmplifier

OC-192 4:1 DEMUX Chips

÷ 4

÷10

2.5 GHz

Agilent 2.5 GHz10:1 DEMUX

250 MHzBuss Rate

Gbps E-net

10 Gb/s DigitalData Stream

To Data Storage

ExtractedClock

Parallel-Serial Data Processing

© All materials herein copyright 2001 The MITRE Corporation, McLean, VA, unless otherwise attributed.

�����UNCLASSIFIED

Approved for public release