You are on page 1of 29

Secure Quantum Communications

Prepared by
Saja Talib Ahmed
Superviser
Dr. Prof. Ziad Tariq
Outline

 Quantum physics and information technology.

 the difference between Traditional Computer and Quantum


Computer.
 Characteristics of Quantum Computers.

 The principles of quantum cryptography.

 The limits of quantum cryptography.

 Future applications.

www.idquantique.com 2
Introduction

 Today, sensitive data is typically encrypted and


then sent across fiber-optic cables and other
channels together with the digital “keys” needed
to decode the information. The data and the keys
are sent as classical bits, a stream of electrical
or optical pulses representing 1s and 0s. And
that makes them vulnerable. Smart hackers can
read and copy bits in transit without leaving a
trace.

www.idquantique.com 3
Introduction

 Quantum communication takes advantage of the


laws of quantum physics to protect data. These
laws allow particles—typically photons of light for
transmitting data along optical cables—to take
on a state of superposition, which means they
can represent multiple combinations
of 1 and 0 simultaneously. The particles are
known as quantum bits, or qubits.

www.idquantique.com 4
Introduction

 The beauty of qubits from a cybersecurity


perspective is that if a hacker tries to observe
them in transit, their super-fragile quantum state
“collapses” to either 1 or 0. This means a hacker
can’t tamper with the qubits without leaving
behind a telltale sign of the activity.

www.idquantique.com 5
Introduction

 Some companies have taken advantage of this


property to create networks for transmitting
highly sensitive data based on a process called
quantum key distribution, or QKD. In theory, at
least, these networks are ultra-secure.

www.idquantique.com 6
Quantum physics and information technology

www.idquantique.com 7
Quantum physics and information technology

www.idquantique.com 8
Quantum physics and information technology

What is Quantum
Computer?

www.idquantique.com 9
www.idquantique.com 10
www.idquantique.com 11
www.idquantique.com 12
www.idquantique.com 13
Characteristics of Quantum Computers.

www.idquantique.com 14
Characteristics of Quantum Computers.

www.idquantique.com 15
The principles of quantum cryptography.

www.idquantique.com 16
The principles of quantum cryptography.

www.idquantique.com 17
Physical implementation of a data channel

Classical communication Quantum communication

"0"
"1"
"1" Fragile !

Security guaranteed by the laws of quantum physics

www.idquantique.com 18
Polarization of Photons

 Direction of oscillation of the electric field associated to a lightwave



E
 Polarization states 

 What can we do with it ?

50 %

50 %

www.idquantique.com 19
Irreversibility of Measurements
Incoming photon polarized at 90

Incoming photon polarized at 45

50 % 50 %

Rotation of polarizer

www.idquantique.com 20
Quantum communications

 Transmitting information with a single-photon Liner States

 Use a quantum property to carry information

= "0" = |0>

= "1" = |1>

www.idquantique.com 21
Eavesdropping

 Communication interception

Alice Bob
|0> ? |0>

Eve

 Use quantum physics to force spy to introduce errors in the


communication

www.idquantique.com 22
Quantum Cryptography Protocole

 BB84 Bob

H/V Basis

Polarizers Alice
45 Basis
Horizontal - Vertical

Diagonal (-45, +45)

Alice's Bit Sequence


Bob's Bases

Bob's Results 0 1 0 0- 0 1 1 1 1 -0 1 0

Key - 1 - 0- 0 1 - - 1 0- 1 0

 A better name: Quantum Key Distribution

www.idquantique.com 23
Eavesdropping

Alice

50% 50%
Eve

50% 50%

Bob

50% 50% 50% 50%

Error Ok
Ok Error Ok

www.idquantique.com 24
The limits of classical cryptography

 Why is Quantum Cryptography not used to transmit


data?

1) Quantum Cryptography cannot guarantee that one


particular bit will actually be received.
With a random key, it is not a problem. With data, it is.

2) Quantum Cryptography does not prevent eavesdropping,


but reveals it a posteriori. Sending a key and verifying its
secrecy allows to prevent information leakage.

www.idquantique.com 25
Extending the key distribution distance

 Free space links to low-earth-orbit


(LEO) satellites
Tokyo Geneva

 Cybersecurity.

 Drug Development.

 Artificial Intelligence.

www.idquantique.com 26
Quantum Circuits

www.idquantique.com 27
Learn Quantum Computation using Qiskit
The best way to learn is by doing. Qiskit allows users to run
experiments on state-of-the-art quantum devices from the
comfort of their homes.

Qiskit is an open-source software development kit (SDK)


for working with quantum computers at the level of
circuits, pulses, and algorithms.

www.idquantique.com 28
www.idquantique.com 29

You might also like