You are on page 1of 5

On the Horizon

Editor: O. Sami Saydjari, ssaydjari@cyberdefenseagency.com

Quantum Cryptography

E
instein wrote, “I cannot believe that God plays dice theoretic secrecy firmly based on CHIP E LLIOTT
the laws of physics. BBN
with the cosmos.”1 But quantum mechanics has Technologies
How does it work?
proved him wrong, and a remarkable crop of new QKD lets two parties—for example,
Alice and Bob—agree on secret keys.
cryptographic systems takes full advantage of those More formally, it’s a technique for
agreeing on a shared random bit se-
dice that Einstein found so troubling. Though most people think quence within two distinct devices,
with a very low probability that other
they are science fiction, quantum techniques are ubiquitous; probably eavesdroppers will be able to make
cryptography systems are now opera- the most well known are the Diffie- successful inferences as to those bits’
tional, with prototypes protecting Hellman key-exchange and RSA values. We use the random bit se-
Internet traffic across metropolitan prime-factor algorithms. Unlike quences as secret keys for encoding
areas. These systems are so novel that Shannon, who assumed that adver- and decoding messages between the
we can consider quantum cryptogra- saries had unlimited mathematical two devices. Thus, QKD is not, in it-
phy—or, more properly, quantum prowess, public-key techniques as- self, a full cryptosystem. Rather, we
key distribution (QKD)—as the sume that certain mathematical should compare it to other key-dis-
third and final insight to transform functions are one way—easy to do tribution techniques, such as trusted
cryptography in the 20th century. in one direction but too difficult for couriers, the Diffie-Hellman key ex-
In the 1940s, Claude Shannon an adversary to undo in a reasonable change, and so on.
provided the information-theoretic time. For example, the RSA algo- QKD can be an intensely confus-
basis for secrecy; the amount of un- rithm assumes that it is simple to ing field: there are many approaches,
certainty that can be introduced multiply two large prime numbers the schemes are complex, and it
into an encoded message can’t be to get their product, but quite hard helps to have a working knowledge
greater than that of the crypto- to factor that product into the two of quantum optics, which is funda-
graphic key used to encode it.2 To original primes. (However, no one mental to the technology. I recom-
achieve perfect secrecy, the key has proved these assumptions.) mend Nicholas Gisin’s article5 for a
must be at least as long as the mes- Invented by Charles Bennet and detailed review. However, the basic
sage and never reused, that is, we Giles Brassard in 1984,4 QKD be- idea is simple, as Figure 1 illustrates.
must use Vernam ciphers,3 also gins with a radically different Alice sends a series of single pho-
known as “one-time pads.” Unfor- premise: we should base security tons to Bob, each modulated with a
tunately, in practice, it is difficult to on known physical laws rather than random basis (here, a two-sided card)
distribute completely secret, com- on mathematical complexities. and a random value. Alice chooses a
pletely random, one-time pads Physical devices with specialized card side at random, writes a random
needed for Vernam ciphers, so they cryptographic protocols can con- 0 or 1 on that side, and sends the card
haven’t been widely adopted. jure up ever-flowing streams of to Bob. Bob also chooses a side at
In the early 1970s, or possibly random bits whose values will re- random and reads that side’s value.
earlier, several researchers, including main unknown to third parties. When Alice and Bob choose the
Whitfield Diffie, Martin Hellman, When we use these bits as key ma- same side, Bob reads exactly what
Ralph Merkle, Ron Rivest, Adi terial for Vernam ciphers, we can Alice wrote. Otherwise, he reads a 0
Shamir, Leonard Adleman, James achieve Shannon’s ideal of perfect or 1 completely at random.
Ellis, Clifford Cocks, and Malcolm secrecy—cheaply and easily. In After Bob reads all the photons,
Williamson, invented cryptographic contrast with the unproven foun- he performs a sifting transaction with
techniques based on computational dations of public-key techniques, Alice to discard all cases where he
complexity. Today, these public-key QKD provides information- read the wrong side (basis). He sends

PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/04/$20.00 © 2004 IEEE ■ IEEE SECURITY & PRIVACY 57
On the Horizon

Alice and Bob interpret all noise as


Eve evidence of active eavesdropping.
In a perfect world, that would end
the story. However, in real systems,
some channel noise is always present,
Alice Bob and a cryptographic system must op-
erate with some noise levels even if
they imply eavesdropping activities.
Photons
To address this, we employ relatively
elaborate error-detection and -cor-
1 1 0 0 0 1 rection protocols to find and correct
bit errors and privacy amplify the result
so that Eve has a vanishingly small
Figure 1. The basic idea of quantum cryptography. Alice sends a series of single knowledge of the resultant bit values
photons to Bob, each modulated with a random basis. Bob demodulates them with a Alice and Bob use. Operating on bits
random basis. Any noise in Bob’s detection is assumed to have been added by an in computer memory, privacy ampli-
eavesdropper, Eve, who guessed the basis wrong in her eavesdropping. Alice and Bob fication is a classical algorithm that
can use those bits where they randomly selected the same basis, provided that the smears out the value of each initial
detection noise is low. shared bit across the shorter resulting
set of bits; that is, it distributes its
value via a universal hash across the
which ones were correct. Then resulting bits.
Alice and Bob discard all values
where they disagreed on the basis Current systems
and keep the remaining values for Bennet and Brassard built the first
raw key material. primitive QKD apparatus in 19926
Now, what about an eavesdrop- (eight years after their first paper); sev-
per, who we shall call Eve? At first, eral systems followed since then, in-
Eve is in a situation similar to Bob’s. cluding systems built by Los Alamos,
She must guess which side of the British Telecom, Johns Hopkins Uni-
card to read; half the time she will be versity, and IBM Almaden Research
able to read what Alice sent, and the Center. Most were component parts,
other half she’ll get a random value. typically only optics. In the past year,
But she can’t surreptitiously siphon two fully-operational systems
off a little bit of a single photon be- emerged from Los Alamos and
cause when she reads it, she demol- BBN,7,8 and two companies (ID
ishes it. But if Bob doesn’t get that Quantique, www.idquantique.com
photon, it’s no loss; the sifting and Magiq Technologies, www.
process will discard that photon and magiqtech.com) announced com-
Alice and Bob won’t use that bit in mercial systems but haven’t provided
their key material. public demonstrations.
A clever Eve might try to regen- QKD can work through tele-
erate a demolished photon and send communications fiber or through
a copy to Bob but she can’t. Quan- the atmosphere. Although these sys-
tum physics’ no-cloning theorem tems differ greatly in their technical
says that she can’t copy values from details, researchers have demon-
Figure 2. BBN quantum cryptography system both sides of the card—only from strated both approaches. Today’s sys-
(Anna and Boris). A full-featured quantum the side she read. The other side will tems generate very high-grade key
cryptography system now operating in the have a random value. If that’s a side material at rates approaching 5,000
world’s first quantum cryptographic network, that Alice and Bob agree on during bits/s at distances of up to 50 km
under the streets of Cambridge, Massachusetts. sifting, any Eve-generated random through telecom fiber or 10 to 20
values will appear as small noise km through atmosphere. While
bursts in the communicated values. these rates are not fast enough to
the random basis settings list that he Hence, eavesdropping always pro- protect useful traffic with one-time
used to Alice, and she tells him duces QKD noise, and a cautious pads, they do allow very rapid rekey-

58 IEEE SECURITY & PRIVACY ■ JULY/AUGUST 2004


On the Horizon

Gated detectors
Sync
Signal Pulse Buffering
QKD weak-coherent splitter generator Digital-to- Two pulse
Trigger thresholds
pulse generation analog
Bright pulse framing converter
and annunciation Signal
Three-way splitter Gates
Signal Amp splitters
splitter Amp Three pulse
generators
Delay line Gate Delay line
Electro- 1550.92 nm Electro-
optical 1550.92 nm optical
Delay phase sync laser sync pulse Delay phase Faraday
loop shifter receiver loop shifter mirrors
DWDM Circulator
φ φ
Link
1550.12 nm Optical Polarizer DWDM fiber 50/50
QKD 50/50
Adjustable attenuator Delay coupler Adjustable
data laser coupler loop air-gap delay 1550.12 nm
air-gap delay
QKD
cooled
Mach-Zehnder Mach-Zehnder APD
Transmitter (Alice) interferometer interferometer Receiver (Bob)

QKD: Quantum key distribution


DWDM: Dense wavelength-division multiplexing
APD: Avalanche photo detectors

Figure 3. Functional decomposition of BBN quantum cryptography system. Alice produces single photons and phase-
modulates them via a Mach-Zehnder interferometer for transmission over standard telecommunication fiber to Bob. Bob
demodulates them with an identical interferometer and detects the values that Alice transmitted with his thermo-electrically
cooled and electrically gated detectors.

ing of conventional cryptographic operational in October 2003, re- at Harvard University and will
algorithms, for example, the Ad- placing our first-generation system, shortly install Boris at Boston Uni-
vanced Encryption Standard (AES). which started continuous operation versity. Alice and Bob remain at
Fortunately, there is a relatively clear, in December 2002. These systems BBN. They are linked by the Cam-
though challenging, technology continuously generate key material, bridge dark fiber network (optical
path toward much faster systems. and then use it to protect Internet telecommunications fiber without
Today’s QKD systems are severely traffic. (We extended standard In- amplifiers or electronics). The
limited by the rates at which they can ternet Protocol security [IPsec] longest fiber length (between Boston
detect single photons; exotic new protocols to support the rapid University and BBN) is about 22 km.
detectors based on cryogenic super- rekeying of conventional encryp- Figure 3 highlights the systems’
conductors might remove this limit tion algorithms.) major features. The transmitter at
or, perhaps, even more conventional Each system uses a highly attenu- Alice sends data using 0.1 mean pho-
indium–gallium arsenide detectors ated “single-photon” telecommuni- ton number laser pulses. Each pulse
tailored to the single-photon regime. cations laser operating at a standard passes through a Mach-Zehnder in-
As real-world implementation wavelength (1550.12 nanometers) terferometer, which randomly mod-
examples, I’ll describe Anna and with phase modulation via unbal- ulates it to one of four phases, encod-
Boris (see Figure 2), two systems anced Mach-Zehnder interferome- ing a basis and a value in that
BBN Technologies (www.bbn. ters and thermo-electrically cooled photon’s self interference. The re-
com) built as part of the DARPA avalanche photo detectors (APDs), ceiver at Bob contains another
Quantum Network project (http:// which are capable of detecting single Mach-Zehnder interferometer, ran-
quantum.bbn.com), which re- photons. We implemented most of domly set to one of two phases to se-
cently began to operate the world’s the electronics using discrete com- lect the demodulation basis. The re-
first quantum cryptographic net- ponents (such as pulse generators), ceived single photons pass through
work under the streets of Cam- though we could integrate all neces- Bob’s interferometer to strike one of
bridge, Massachusetts. We now sary electronics onto a small custom the two APDs to present a received
have six QKD nodes running in our printed circuit board. value. Alice also transmits bright
laboratory. Four of them became In May 2004, we deployed Anna pulse—typical telecommunications

www.computer.org/security/ ■ IEEE SECURITY & PRIVACY 59


On the Horizon

Quantum key distribution (QKD) endpoint


IPsec-based
Internet Protocol
security • Public key
QKD protocols Authentication
• Secret key
Internet
Key
Exchange

Privacy amplification GF[2n] universal hash

BBBSS'92
Entropy estimation Slutsky
Myers/Pearson
Security Security
policy association Internet
database database Protocol
Error detection BBN Cascade
and correction
Ethernet Ethernet Ethernet
device device device
driver driver driver
Traditional
Sifting
“Geneva“ sifting
VPN
Interface
Internet
Optical
process control

Optical
hardware

Figure 4. BBN quantum cryptography protocols. Quantum cryptography protocols form a “stack,” somewhat like
conventional communications protocols. There are many possible variants for the different stack layers. BBN has
implemented a full suite of quantum cryptography protocols, including the variants shown here.

power level—multiplexed over the traffic via standard IPsec protocols and is a small possibility that Alice and
same fiber, to send timing and fram- algorithms. BBN’s QKD protocol Bob believe that they share identi-
ing information to Bob. stack is written in C for portability to cal bit sets, but, in fact, they do not.
embedded real-time systems. David • Error correction requires commu-
QKD protocols Pearson, Gregory Troxel (both at nications between Alice and Bob,
Although a detailed discussion of BBN Technologies) and I present a and inevitably—assuming that Eve
QKD protocols is beyond this arti- more detailed discussion of this im- can obtain plain-text versions of all
cle’s scope, QKD systems contain a plementation and how QKD inter- such public communications—the
surprising amount of sophisticated acts with IKE and IPsec elsewhere.8 process of error correction reveals
software. While developing our sys- As I previously mentioned, once sifted-bit information to Eve.
tems, we observed that QKD optics Alice and Bob agree on sifted bits,
is perhaps the easiest part; the elec- they must perform error correction to Thus, the error correction’s end
tronics are more difficult than the find and eliminate any bits damaged results are that Alice and Bob will—
optics; and, for a practical functional (or compromised by Eve) in transmis- with high probability—have in
system, the software is harder than sion, for example, bits sent as a 1s but their local memories identical
the electronics. received as 0s. There are many ways to copies of a set of error-corrected
Figure 4 illustrates how QKD perform error correction but each has bits and Eve will have some knowl-
protocols might integrate into a Unix two important consequences: edge of these bits’ values, which
operating system to provide key ma- Alice and Bob must reduce through
terial to its indigenous Internet Key • Error correction is always proba- privacy amplification.
Exchange (IKE) daemon for use in bilistic unless all bits are revealed Privacy amplification lets Alice
cryptographically protecting Internet during the process, and thus there and Bob reduce Eve’s knowledge of

60 IEEE SECURITY & PRIVACY ■ JULY/AUGUST 2004


On the Horizon

their error-corrected bit values to an protocols let Alice build up a reser- Einstein’s “spooky action at a dis-
arbitrarily low fraction of the total voir of shared key material with tance” consideration provides the
number of bits. At its core, it occurs Anna via a trusted relay at Bob or engineering core for the next gener-
via randomized algorithms in Alice Boris. Similarly, Bob and Boris con- ation of cryptographic systems!
and Bob and public communication tinuously build up shared key mater-
between them regarding the results ial via trusted relays at Alice or Anna. References
of these algorithms. 1. A. Einstein, “Sayings of the Week,”
Finally, authentication gives Alice London Observer, 5 Apr. 1964.
and Bob reasonable assurance that
they are communicating with each
other. In most modern crypto-
W hat’s next? QKD’s next gener-
ation will be even stranger
than today’s because it will draw key
2. C.E. Shannon, “Communication
Theory of Secrecy Systems,” Bell
System Technical J., vol. 28, no.
graphic systems, this function occurs material from pairs of entangled 4, 1949, pp. 656–715.
via some kind of one-way function, photons. In some ways, this is the 3. G.S. Vernam, “Cipher Printing
for example, digital signatures imple- most satisfying of all forms of QKD Telegraph Systems for Secret Wire
mented by public-key techniques. In because it directly exploits the uni- and Radio Telegraphic Communi-
classic QKD literature, authentica- verse’s underlying randomness and cations,” J. Am. Inst. Electrical Eng.,
tion relies on shared secret keys, such strangeness. Such cryptographic sys- vol. 45, 1926, pp. 109–115.
as in universal hash functions. tems create, and derive their keys 4. C.H. Bennet and G. Brassard,
from, highly unusual “Siamese “Quantum Cryptography: Public
QKD networks twin,” or entangled, photons: Key Distribution and Coin Toss-
The DARPA Quantum Network ing,” Proc. Int’l Conf. Computers,
consists of two transmitters, Alice The entangled state contains Systems & Signal Processing, CS
and Anna, and two compatible re- no information on the indi- Press, 1984, pp. 175–179.
ceivers, Bob and Boris, with quan- vidual particles; it only indi- 5. N. Gisin et al., “Quantum Cryp-
tum channels directly intercon- cates that two particles will be tography,” Rev. Modern Physics, vol.
nected using fiber via a 2 × 2 optical in opposite states. The im- 74, no. 1, 2002, pp. 145–195.
switch. Either transmitter can nego- portant property of an entan- 6. C.H. Bennett et al., “Experimental
tiate a mutual key with either re- gled pair is that as soon as a Quantum Cryptography,” J. Cryp-
ceiver. The switch is optically pas- measurement on one parti- tology, vol. 5, no. 1, 1992, pp. 3–28.
sive; that is, it does not detect or cles projects it, say, onto [a 7. R.J. Hughes et al., “Practical Free-
amplify any photons passing horizontal polarization], the Space Quantum Key Distribution
through it, so it doesn’t disturb the state of the other one is deter- Over 10 km in Daylight and at
quantum state of the photons that mined to be [vertical], and Night,” New J. Physics, vol. 4, 2002,
encode key bits. vice versa. How could a mea- pp. 43.1–43.14.
When two QKD endpoints surement on one of the parti- 8. C. Elliott, D. Pearson, and G.
don’t share a direct or switched cles instantaneously influence Troxel, “Quantum Cryptography
channel but there is a path between the state of the other particle, in Practice,” Proc. ACM SIG-
them over channels through trusted which can be arbitrarily far COMM 2003, ACM Press, 2003,
relays, our networking protocols let away? Einstein, among many pp. 227–238.
them agree on a shared key by other distinguished physicists, 9. D. Bouwmeester et al., “Experi-
choosing a path through the net- could simply not accept this mental Quantum Teleportation,”
work, creating a new random num- “spooky action at a distance.” Nature, vol. 390, 1997, pp.
ber R, and, essentially, sending an R But this property of entan- 577–579.
one-time-pad encrypted across each gled states has been demon-
link. We call this process key relay, strated by numerous experi-
Chip Elliott is principal engineer for BBN
and the resulting network a trusted ments.9—Dik Bouwmeester Technologies. His research interests
network because this scheme’s chief include quantum cryptography and
characteristic is that the key’s secrecy One of these systems is taking mobile ad hoc networking. He has a BA in
mathematics from Dartmouth College.
depends on the endpoints and inter- shape in BBN’s Cambridge labora-
He is a senior member of the IEEE, a mem-
mediate nodes being trustworthy. tory. Other teams, such as those at ber of the American Association for the
The BBN key relay protocols Bristol and Vienna universities, are Advancement of Science, the ACM, and
have been operating continuously in proposing even wilder, space-based the American Institute of Aeronautics and
Astronautics, and has been nominated
the DARPA Quantum Network systems with entangled photon pairs for a World Technology Award for his
since October 2003. Even though transmitting between Earth and or- work in quantum cryptography. Contact
Alice and Anna are transmitters, the biting satellites. It is remarkable that him at celliott@bbn.com.

www.computer.org/security/ ■ IEEE SECURITY & PRIVACY 61

You might also like