You are on page 1of 6

2SWLFVDQG/DVHU7HFKQRORJ\  

Contents lists available at ScienceDirect

Optics and Laser Technology


journal homepage: www.elsevier.com/locate/optlastec

Full length article

Impact security enhancement in chaotic quantum cryptography 7


a,⁎ a,b
Mahdi H. Al Hasani , Kais A. Al Naimee
a
Department of Physics, College of Science, University of Baghdad, Baghdad, Iraq
b
Istituto Nazionale di Ottica-CNR, Largo E Fermi 6, 50125 Firenze, Italy

H IG H L IG HT S

• The quantum key has been created experimentally and numerically using BB84 protocol.
• The presence of eavesdropping cause to non-synchronization of bits between Alice and Bob.
• The mixing of quantum key with chaotic signal enhances the security of quantum cryptography and lead to ultimate security.

A R TIC L E INFO A B S TR A C T

Keywords: In this paper the experimental and the numerical study of an optical key distribution quantum cryptography
Quantum cryptography using BB84 protocol has been achieved. We create secret quantum key and the security of BB84 protocol is tested
BB84 protocol by inserting Eve in the system, the presence of Eve will cause disturbance to the synchronization of qubits
Nonlinear dynamic between Alice and Bob and lead to bits errors. Finally we enhance the security of quantum cryptography using
Ultimate security
one-time pad technique and chaotic signal generated by semiconductor laser with an optical feedback. Mixing
Chaos
quantum key with chaotic signal will make ultimate security of the system.

1. Introduction provides two parties, a sender Alice and a receiver Bob to distribute a
secret key in a way that guarantees the detection of any eavesdropping
As a result of current technological developments, the computer can (Eve) [9]. Any information obtained by an unauthorized third party
now be found in all layers of our society and the possibilities for (Eve) about the exchanged key goes along with an increase of the
communication have grown immensely [1]. During this time when the quantum bit error rate (QBER) of the transmitted data which can be
Internet provides essential communication among tens of millions of checked using a suitable subset of the data similarly [10,11]. The first
people and is being increasingly used as a tool for commerce, the se- Quantum Key Distribution protocol is introduced in 1984 by Charles
curity becomes one of the most important tasks in wired and wireless Bennett and Gilles Brassard known as BB84 protocol [12]. The BB84
network that can ensure the confidentiality and the integrity of data protocol has been proven to be unconditionally secure, which are based
over the insecure channel [2,3]. In the communication fields, crypto- on the laws of quantum mechanics and uses polarization-coding to
graphic technique is commonly used for secure communications; one of realize the key distribution [13]. This protocol is based on Heisenberg’s
the new techniques in the information security field is the quantum Uncertainty Principle which states that one cannot measure the prop-
cryptography, in which the laws of quantum mechanics are applied to erties of a photon like spin, polarization, etc. without being introducing
create new cryptographic primitives [4]. Quantum cryptography is re- any errors or deviation of the normal photon transmission which can
latively new in the information security world, it give very promising easily be detected [14,15]. This can guarantee that any eavesdropper
solution to the issue of information security [5,6]. Quantum crypto- try to measure the photon that send from Alice to Bob will cause dis-
graphy features a unique way of sharing a random sequence of bits turbing to the photons state in a noticeable way.
between users with a certifiable security not attainable with either It enables two parties to share a random secret key which only
public or secret-key classical cryptographic systems [7]. This is known to them to encrypt and decrypt the message [16]. In this paper
achieved by means of quantum key distribution (QKD) techniques. QKD the BB84 protocol will be study experimentally and numerically and
relies on exploiting the laws of quantum mechanics that are often shows how key generate in this protocol and use this key to encrypt text
viewed in other contexts of physics as limiting or negative [8]. QKD message using one-time pad technique. Finally the security of BB84 will


Corresponding author.
E-mail address: mahdialhassany@yahoo.com (M.H. Al Hasani).

https://doi.org/10.1016/j.optlastec.2019.105575
Received 5 November 2018; Received in revised form 3 March 2019; Accepted 17 May 2019
$YDLODEOHRQOLQH0D\
‹(OVHYLHU/WG$OOULJKWVUHVHUYHG
M.H. Al Hasani and K.A. Al Naimee 2SWLFVDQG/DVHU7HFKQRORJ\  

Fig. 1. Quantum Cryptography Setup with the Bases + (0° and 90°) and × (−45° and 45°).

enhanced by mixing the generated quantum key with chaotic signal different cases are shown as an overview.
obtained from semiconductor laser with optical feedback, this means
that two encoding methods (chaos cryptography and quantum crypto-
2.1. Eavesdropping
graphy) are mixed together to produce a highly secure link. Mixing
chaos and quantum key represents a novel technique in secure com-
Eavesdropper (Eve) consists of the same components as both Alice
munications that totally depends on the laws of physics.
and Bob, only in the reverse sequence. This is shown in Fig. 2.
Eve is located in a position to measure the light coming from Alice
2. Methods and results and then attempt to transmit the identical information to Bob. Consider
the following two possibilities:
The setup of BB84 protocol is shown in Fig. 1. The sending unit
“Alice” consists of a single photon source which is polarized horizon-
tally and a /2 plate.
• Eve chooses the same basis as Alice: In this case, Eve measures the
signal that Alice sends correctly. Now Bob randomly chooses his
The first part of Alice is the laser; the CPS635R Collimated Laser basis, and once again there are two possibilities:
Diode Module is used to get parallel beam in our experiment. It has a o Bob chooses the same basis as Alice: Eve transmits the signal
typical center wavelength close to 636.5 nm and produces an output correctly using the same basis.
beam that has a Gaussian cross section distribution. The second part of o Bob chooses the other basis: The basis used to receive the signal is
Alice is a /2 plate. It rotates the polarization of the incident light by different than the basis of the signal transmitted by Eve.
double the physical rotation angle of the wave plate (polarization ro- Therefore, one of his detectors will respond at random. However,
tator). when Alice and Bob now compare their bases, this measurement is
The receiving unit “Bob” consists of polarization rotator, polarizing discarded anyway because of the different bases used by Alice and
beamsplitter (PBS) and two detectors. The polarizing beamsplitter cube Bob.
reflects the vertically polarized (90°) component of the incident light,
while passing the horizontally polarized (0°) component. The two de-
• Eve chooses the wrong basis: In this case, Eve chooses a basis that
differs from the one used by Alice and one of Eve's detectors will
tectors are connected to the electronic and they detect the incoming respond at random. Therefore, Eve is not able to judge whether she
photon from Alice. chose the correct basis. When Eve sends her signal to Bob, she will
Since polarization rotator has two bases + and ×, Alice has to make send the bit in the same basis that she received Alice's signal with.
two random decisions for key generating. Bob also sets his polarization Because Bob is also randomly choosing his basis, there are two
rotator to differentiate between + and × bases. Accordingly Bob only possibilities:
needs the settings 0° and 45°. If Bob select the + basis and Alice sends o Bob chooses a different basis than Alice: This measurement is
in the + basis, Bob obtains an unambiguous result; this applies corre- discarded after Alice and Bob compare bases.
spondingly if both choose the × basis. But what if Bob chooses a dif- o Bob chooses the same basis as Alice: This represents a case where
ferent basis than Alice; the result is that 45° polarized light will be sent Alice and Bob obtain different bits with the same bases (which can
to the beamsplitter. For a continuous beam, half is transmitted and half never happen without third party interference).
is reflected. However, assuming that only one photon is sent, only one
of the two detectors can respond. The detector that responds is then left The individual cases are presented again briefly in Table 2 for an
to chance. If the two bases do not match, Bob will nevertheless measure overview. Only the cases where Alice and Bob use the same bases are
a signal on one of the two detectors. The probability of detecting the considered here. The remaining measurements are discarded during the
photon on one of the two detectors is 50% respectively. In Table 1, basis comparison process.

Table 1
A different cases of which detectors detect the incoming photon from Alice. 2.2. Setup for quantum key and chaos

Alice Bob
We develop a method to increase the security of quantum crypto-
Basis Bit Angle Basis Angle Detector “0” Detector “1”
graphy, this method involve the creation of chaotic signal by a semi-
conductor laser with an Optical feedback using optical loop mirrors
+ 0 0° + 0° 100% 0% [17]. This signal is integrating with quantum cryptography as shown in
+ 1 90° + 0° 0% 100% Fig. 3.
× 1 45° + 0° 50% 50%
× 0 −45° + 0° 50% 50%
+ 0 0° × 45° 50% 50% 2.3. Simulation
+ 1 90° × 45° 50% 50%
× 1 45° × 45° 100% 0%
× 0 −45° × 45° 0% 100% The various stages of BB84 protocol are simulated during this work.
In this stage several considerations are taken into account like:


M.H. Al Hasani and K.A. Al Naimee 2SWLFVDQG/DVHU7HFKQRORJ\  

Fig. 2. Eavesdropper Eve between Alice and Bob.

Table 2 In our numerical treatment eavesdropping is applied randomly,


Different cases of error in bit when Eve is exist in the system. optional to be applied. The simulation assumed that Eve uses Intercept/
Basis used by Alice and Basis used by Error? Bits match for Alice and Resend strategy, she detect the photon sent by Alice and resend photon
Bob Eve Bob to Bob, that will cause errors and lead to non-synchronization of bits,
because Eve likes Bob, she will chooses random bases to measure the
++ + No 100%
photon come from Alice. After her measurement, she has to send
++ × In part 50%
×× + In part 50%
photon to Bob in the same basis she detected, so when she chooses
×× × No 100% wrong bases she will cause errors in the bits received by Bob.

2.4. Security of BB84 protocol

Alice sends random qubits through random bases, Eve as Bob will
use random bases to get Alice qubits, then passes the qubits she get to
Bob using the same bases that use to detect Alice qubits. If Eve by
chance uses the same basis as Alice, she will correctly send the qubit to
Bob without making errors. If however, she used the incorrect basis, her
measurement changes the quantum state, so that Bob has a 50% chance
of measuring either 0 or 1 bit, this lead to an errors. Eve guesses the
incorrect basis 50% of the time, and 50% of these cases lead to an error,
so on average Eve presences leads to 25% of the key bits being in-
Fig. 3. Block diagram illustrate chaotic signal mixed with encrypted message.
correct. The number of same basis choosing by Alice and Bob and Alice
and Eve as a function to number of qubits sent have been tested ex-
• Alice randomly chooses her polarization bases and bits, Bob also perimentally and numerically. In Fig. 4a the experimental result shows
choose his bases randomly. that from 200 qubits sent by Alice; Bob successfully choose the same
• The quantum channel is assumed to be free space. basis 113 times this mean nearly half of the sent qubit from Alice and
• The noise and effect of quantum channel are neglected. the correct basis that Eve get is 47 times from 200 qubits which is
• The source is assumed to be perfectly single photon source. nearly half of what Bob received, we can say that the percentage of Bob
• The error is estimated to calculate the QBER define as: obtains the qubit in same basis is 50% and for Eve is 25%. The same

QBER =
NO. of error percentages are nearly obtained from numerical result as shown in
NO . of the key (1) Fig. 4b. From 200 qubits sent, Bob correctly choose the same basis 89
times and Eve 39 times which mean nearly 50% for Bob and 25% for

• Eavesdropping is also included randomly. Eve. This mean the percentage of Eve make errors is 75% (at Bob's end),

• If the QBER ≥ 15%, the process of creating key stop and the pro- whereas Bob is expecting to see only 50% of the photons. In other
words, since Alice later sends Bob her bases, he can go back and check
tocol repeated again [11].
his table for the bits whose values were supposed to stay constant. Eve's

Fig. 4. Same bit sent in same basis from Alice to Bob and Alice to Eve (a) Experimental and (b) Numerical.


M.H. Al Hasani and K.A. Al Naimee 2SWLFVDQG/DVHU7HFKQRORJ\  

Fig. 5. Number of errors as a function of number of bits (a) Experimental and (b) Numerical.

interference will change half of the photons that were supposed to re- random bases to Bob which is also used random bases to receive the
main constant. qubits [18]. In our work the quantum key is generated experimentally
Experimentally, Fig. 5a shows the probability of Eve making errors and numerically. The setup in Fig. 1 has been utilized to crate the key as
is increase with increasing the qubits sent by Alice. The numerical result follow:
shows similar behavior to the experimental as shown in Fig. 5b. From
these figures we show that the error that Eve make when sending 256 • Alice send 118 qubits using random bases (× or +) and random bits
bits is larger than the error make when sending 128 bits, this means the to Bob.
impact errors increase with increasing the number of qubits sent by • Bob receive 118 qubits from Alice using random bases (× or +).
Alice, so it is very important to send large number of qubits to force Eve • Compare Alice and Bob bases publicly and discard the different
to make errors so we can reveal her existence. bases and keep only the same bases.
The probability or error rate of Eve detection is calculated using Eq. • Alice and Bob reveal some of bits to test the presence of Eve.
(1), we start with 8 bits then we increase the number of bits by 8 bits
step and calculated the probability. This process is repeated until we The bits obtained from the same bases will represent the shared key
reach 128 bits, then we repeat this procedure from beginning until we between Alice and Bob, after discarding the different bases and remove
reach 256 bits. These probabilities are plotted as a function to the bits that used for testing Eve we obtained secret key of length 56 bits
number of bits. We saw that in both 128 and 256 bits the distribution of experimentally.
probabilities is random as shown in Fig. 6a. The same behavior
achieved from the numerical treatment as shown in Fig. 6b, so the Key: 111001011000000110011011100000111100110001010011
presence of Eve cause errors, from these errors we calculate the prob- 11001111
ability of errors and these probabilities are not constant but change in
every time Eve tries to eavesdropping on qubits sent by Alice depending This key will be used to encrypt a text message “QUANTUM”, the
on her success or failure to choose the same bases used by Alice. This procedure of encrypt the text message is as follow:
probability gives us indication of the presence of Eve so we have to stop
the communication link and start the process from beginning to create • First each letter is represent with eight binary:
new key. Q: 01001001,
U: 01011001,
A: 00001001,
2.5. Message encryption N: 00111011,
T: 01001111,
To create the key, Alice needs first to send number of qubits using

Fig. 6. The relationship between probability of Eve detection and number of bits (a) Experimental and (b) Numerical.


M.H. Al Hasani and K.A. Al Naimee 2SWLFVDQG/DVHU7HFKQRORJ\  

U: 01011001,
M: 00111001,
the message become:
Message: 010010010101100100001001001110110100111101
01100100111001
• Now we encrypt this message with secret key using the One-Time
pad technique, the key is add with the message using XOR gate.
Key: 11100101100000011001101110000011110011000101
001111001111
Message: 0100100101011001000010010011101101001111010
1100100111001
Encrypted message: 10101100110110001001001010111000
100000110000101011110110
• Alice sends the encrypted message using the + basis (0° to indicate
0 and 90° to indicate 1). She therefore selects the following angle Fig. 7. Experimental encrypted message in pulse shape.
settings in the sequence below:
90°, 0°, 90°, 0°, 90°, 90° ,………………………90°, 0°
• Bob receives Alice’s transmission using the + basis as well (reflected
light = 1, transmitted light = 0). Bob will obtain the following bits:
Encrypted message: 1010110011011000100100101011100
0100000110000101011110110
Bob then use the same key to decode the message (using XOR gate
to add key with the encrypted message).
Key: 1110010110000001100110111000001111001100010100
1111001111
Message: 01001001010110010000100100111011010011110
101100100111001

Bob know that each 8 bits represent one letter so he retrieves the
text message correctly.
The key is also generated numerically. In the simulation Alice send
Fig. 8. Numerical encrypted message in pulse shape.
qubits randomly to Bob who choose his bases randomly also, then
compare their bases and neglect the different once and keep the same
bases to generate the quantum key. Here the text message “QUANTUM” 110
will be encrypted, as mentioned earlier we need first to represents each
letter with 8 bits. The text message will become as: And the numerical encrypted message is shown in Fig. 8.

Message: 0100100101011001000010010011101101001111010 Numerical Encrypted message for text word QUANTUM:


1100100111001 01001100110111011001100111000111111101010000011001110
111
The message length is 56 bits so we need to create a secret key of
length 56 bits in order to encrypt this message, Alice send 120 bits to After converting encrypted message to strain of pulses, we experi-
Bob and they obtain key of length 56 bits. mentally produce optical chaotic signal using semiconductor laser with
an optical feedback [17]. The numerical chaotic signal is generated
Key: 000001011000010010010000111111001011101001011 using the two rate equation of Lang and Kobayashi model [19,20].
11101001110 The train of pulses of encrypted message and chaotic signal are
brings together. In order to mix chaos and quantum key perfectly it
then we add this key with the message and get the encrypted message: requires that choosing chaotic signal with spike rate compatible with
the bit rate of quantum key. Figs. 9 and 10 illustrate experimental and
Encrypted message: 01001100110111011001100111000111 numerical chaotic signals mixed with encrypted message, these figures
111101010000011001110111 show that the encrypted message is successfully hidden within chaotic
signals with a highly masking degree. Mixing of quantum cryptography
Alice sends the encrypted message using the + basis to Bob who and chaos creates very secure system. Now, if Eve somehow succeeded
used the same basis to receive data from Alice and he use the same key in knowing the quantum key, she cannot get the message since it cannot
to decrypt the received message from Alice. breakthrough chaos. This makes us close to the ultimate security of
communication.
2.6. Mixing quantum key with chaotic signal
3. Conclusions
We enhance the security of BB84 protocol by mixing the message
encrypted by quantum key and chaotic signal. In conclusions, describing and analyzing the quantum cryptography
First, we need to convert the encrypted message from binary bits to using BB84 protocol have been satisfied experimentally and numeri-
pulse shape. Fig. 7 shows the experimental encrypted message in pulse cally. We conclude that in the process of creating key, the presence of
shape. Eve lead to non-synchronization of bits between Alice and Bob, then
impact errors increased. Finally we show that chaotic signal can be
Experimental encrypted message for text word QUANTUM: mixed with quantum encrypted data to enhance the security of the
10101100110110001001001010111000100000110000101011110 communications link, and for ultimate security the spike rate of chaotic


M.H. Al Hasani and K.A. Al Naimee 2SWLFVDQG/DVHU7HFKQRORJ\  

Fig. 9. Experimental mixed chaotic signal and encrypted message (a) time series and (b) The Fast Fourier Transformation (FFT).

Fig. 10. Numerical mixed chaotic signal and encrypted message (a) time series and (b) The Fast Fourier Transformation (FFT).

signal should be compatible with bit rate of encrypted message. This intermodulation, and quantum bit error rate, IEEE J. Sel. Top. Quantum Electron.
mixing has resulted in a novel technique that enhances the impact se- 15 (6) (2009) 1607–1621.
[8] A. Ruiz-Alba, D. Calvo, V. Garcia-Munoz, A. Martinez, W. Amaya, J.G. Rozo,
curity of data transfer. J. Mora, J. Capmany, Practical quantum key distribution based on the BB84 pro-
tocol, Waves 3 (2010) 4–14.
Acknowledgments [9] S. Venkatramulu, S. Veena, Secure communication using two party authenticated
quantum key distribution protocols, Int. J. Comput. Sci. Netw. Security 10 (8)
(2010) 233–238.
The authors would like to thank and express their gratitude to Sora [10] W. Tittel, G. Weihs, Photonic entanglement for fundamental tests and quantum
Fahmi Abdalah (Informatics and Telecommunications Public Company) communication, Quantum Inf. Comput. 1 (2) (2001) 3–56.
[11] L.M. Aminu, Performance evaluation of secure key distribution based on quantum
for her consultations and remarks regarding to our work by her inter- mechanics principles over free space, Int. J. Eng. Comput. Sci. 3 (3) (2014)
action with our group, we got a good benefit during our research work. 2319–7242.
[12] C. Bennett, G. Brassard, Quantum cryptography: public key distribution and coin
tossing, Theoret. Comput. Sci. 5 (60) (1984) 7–11.
References
[13] M. Elboukhari, M. Azizi, A. Azizi, Analysis of the security of BB84 by model
checking, Int. J. Netw. Security Its Appl. 2 (2) (2010) 103–108.
[1] J.C.A. Van der Lubbe, Basic Methods of Cryptography, Cambridge University Press, [14] R. Aggarwal, H. Sharma, D. Gupta, Analysis of various attacks over BB84 quantum
1998. key distribution protocol, IJCA Int. J. Comput. Appl. 20 (8) (2011) 28–31.
[2] T.R. Devi, Importance of cryptography in network security, International [15] S.J. Lomonaco, A quick glance at quantum cryptography, Cryptologia 23 (1) (1999)
Conference on Communication Systems Network Technologies, 2013, pp. 462–467. 1–41.
[3] M. Halip, N. Hafizah, M. Mokhtar, A. Buhari, Simulation of Bennet and Brassard 84 [16] R.K. Sinha, M. Mishra, Quantum key distribution: simulation of BB84 protocol in C,
protocol with Eve's attacks, IEEE 5th International Conference on Photonics, 2014, Int. J. Electron. Electr. Comput. Syst. 6 (1) (2017) 57–60.
pp. 29–31. [17] M.H. Al Hasani, K.A. Al Naimee, Experimental evidence of the influence of an
[4] H. Lai, The design and analysis of quantum cryptographic protocols, PhD. thesis optical feedback in semiconductor laser, Int. J. Numer. Anal. Methods Eng. (IRENA)
University of Macquarie, Department of Computing, 2015. 3 (3) (2015) 53–56.
[5] S. Etcheverry, G. Cañas, E.S. Gómez, W.A.T. Nogueira, C. Saavedra, G.B. Xavier, [18] A. Kohnle, A. Rizzoli, Interactive simulations for quantum key distribution, Eur. J.
G. Lima, Quantum key distribution session with 16-dimensional photonic states, Phys. 38 (3) (2017) 1361–6404.
Sci. Rep. 3 (2316) (2013) 1–5. [19] R. Lang, K. Kobayashi, External optical feedback effects on semiconductor injection
[6] N. Gisin, G. Ribordy, W. Tittel, H. Zbinden, Quantum cryptography, Rev. Modern laser properties, IEEE J. Quantum Electron. 16 (3) (1980) 347–355.
Phys. 74 (1) (2002) 145–195. [20] B.O. Rasheed, S.F. Abdalah, K.A. Al Naimee, M.H. Al Hasani, P.M. Aljaff, R. Meucci,
[7] J. Capmany, A. Ortigosa-Blanch, J. Mora, A. Ruiz-Alba, W. Amaya, A. MartÍnez, F.T. Arecchi, Exploring noise effects in chaotic optical networks, Results Phys. 7
Analysis of subcarrier multiplexed quantum key distribution systems: signal, (2017) 1743–1750.

You might also like