Security Perspectives for Quantum Key Distribution

Size: px
Start display at page:

Download "Security Perspectives for Quantum Key Distribution"

Transcription

1 Security Perspectives for Quantum Key Distribution Norbert Lütkenhaus Institute for Quantum Computing & Department of Physics and Astronomy University of Waterloo, Canada Ontario Research Funds DARPA Office of Naval Research

2 Task description of QKD EVE Alice Authenticated Classical Channel Bob key (X): Quantum Channel

3 Assumptions Security Proof Security Statement

4 Security definition: preparation input state ρ N input state ρ N QKD Protocol QKD Protocol abort? abort? Alice: classical s Bob: classical s Eve: quantum ρ E s,s Alice: classical s Bob: classical s Eve: quantum ρ E real output state µ p(s, s 0 ) sihs s 0 ihs 0 ρ s,s0 E X s,s 0 S 1 2 ρ(real) ABE ρ(ideal) ABE 1 <² ideal output state 1 sihs sihs ρ E S X s S Indistinguishability ensures: - correct (shared by Alice and Bob) - uniformly distributed - secret

5 Security Definition 1 2 ρ(real) ABE ρ(ideal) ABE 1 <² [Renner, PhD Thesis 2005] Key requirements: - correct (shared by Alice and Bob) - uniformly distributed - secret operational definition of ²: Security statement: the probability that - key protocol does not abort AND - the key is not ideal (requirements!) is smaller than ² 1) ² cannot be zero for QKD! 2) Definition does not condition on non-abortion of protocol always aborting protocols are secure by this definition (but useless)! 3) Clear interpretation of imperfection (insurance mathematics!)

6 Development of Security Proofs Actual Device e.g. reality based Assumptions Security Proof Security Statement modelling Quantum Optical Model e.g. mode based e.g. realistic sources (laser pulses) threshold detector models Security Model e.g. qubit based ρ ABE ρ AB ρ C 1 ² Security Proof

7 frequently used assumptions Characterized devices: know what our devices are doing o side-channel attacks o see also voltage levels of one-time pad encryption! access to randomness secure perimeter of devices

8 Characterized devices: qubit scenario BB84, six-state, Ekert, B92, SARG Results optical scenario laser pulses instead of single photons, threshold detectors new protocol classes (Continuous Variable Protocols, Differential Phase Shift Protocols ) protocols using only characterized sources (no trusted detectors) [measurement-device independent QKD] Uncharacterized devices: qubit/optical protocols where only one side needs to be characterized (rates reduces unless partial characterization is re-introduced loss!) Protocols where all devices are uncharacterized (but random choices are utilized) reduction in assumptions is possible trade-off to rate fundamental issue or proof techniques???

9 What is a Security Proof? Testing of Models e.g. by embedding into larger models - requires experience based cut-off no scientific proof possible Calibration (initial and ongoing) Alignment Initialization Software and Hardware Implementation -verified software (development & execution) -hardware security perimeter - key management -Model of Devices -e.g. QM description -quantum security perimeter -classical security perimeter -Exact Protocol -sequence of protocol steps -Error Correction method -Privacy Amplification function -security parameters - Scientific Security Proof perfect secret key with exception of probability ²

10 Testing of Models e.g. by embedding into larger models - requires experience based cut-off no scientific proof possible Calibration Models (initial are based and ongoing) experience (hacking, counter measures, scientific Alignment experience) Initialization need to find common level of acceptance (ETSI standardization) (testable/quantifyable or not) Software and Hardware Implementation -verified software (development & execution) -hardware security perimeter - key management What Boundary is a between Security scientific and Proof? acceptance can be moved (device independent security proofs) but never vanishes -Model of Devices -e.g. QM description -quantum security perimeter -classical security perimeter -Exact Protocol -sequence of protocol steps -Error Correction method -Privacy Amplification function -security parameters - Scientific Security Proof perfect secret key with exception of probability ² Security proof defined by scientific standard

11 Testing of Models e.g. by embedding into larger models - requires experience based cut-off no scientific proof possible Calibration Models (initial are based and ongoing) experience (hacking, counter measures, scientific Alignment experience) Initialization need to find common level of acceptance (ETSI standardization) (testable/quantifyable or not) Software and Hardware Implementation -verified software (development & execution) -hardware security perimeter - key management What Boundary is a between Security scientific and Proof? acceptance can be moved (device independent security proofs) but never vanishes -Model of Devices -e.g. QM description -quantum security perimeter -classical security perimeter -Exact Protocol -sequence of protocol steps -Error Correction method -Privacy Amplification function -security parameters So what remains? QKD provides secret key that is future-proof (on quantum side): the key is as secure for all future as it is at its creation! - Scientific Security Proof perfect secret key with exception of probability ² Security proof defined by scientific standard

12 Distance Scaling Use fiber optics devices log(k) key rate detector saturation channel loss detector noise distance maximum distance: just under 200 km scaling with distance (fiber): K exp(- α d/10) (no amplification possible!) Example: 1 THz clockrate 0.17 db/km 700 km = 120 db 1 bit/sec over 700 km (infinite key limit)

13 Distance Problem: Trusted Repeater Networks Romain Alleaume Realizations: DARPA Network SECOQC Network Tokyo Network (2010) South Africa Geneva use trusted classical nodes to propagate secrets through network can cover metropolitan area networks at reasonable key rates stability against failure of individual links Note: users of network should also be operators trust level must be high!

14 Distance Challenge: Moving Satellite Satellite User A User B

15 Quantum Repeater Quantum repeater network: (technologically challenging) [Application: Service Provider] Overcomes loss problem allows routing EPR source EPR source Alice Bob Memory Memory Memory Memory Bell measurement Bell measurement (classical)

16 Quantum Repeater Quantum repeater network: (technologically challenging) [Application: Service Provider] Overcomes loss problem allows routing EPR source EPR source Alice Memory Memory Effective Channel Memory Memory Bob Bell measurement Bell measurement (classical)

Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd)

Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd) UPDATE ON ETSI ISG QKD Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd) Industry Specification Group in Quantum Key Distribution Global Deployments of Quantum Key Distribution

More information

Andrew Shields (Toshiba Research Europe Ltd)

Andrew Shields (Toshiba Research Europe Ltd) ETSI S ROLE IN THE DEPLOYMENT OF QUANTUM KEY DISTRIBUTION Andrew Shields (Toshiba Research Europe Ltd) Industry Specification Group in Quantum Key Distribution Quantum Key Distribution optical fibre Quantum

More information

Presentation of ID Quantique

Presentation of ID Quantique Presentation of ID Quantique Scrambled Message Alice Bob Symmetric Cryptography Secret Key Secret Key 2007: The first commercial QKD device 2017: A world leader in ground QKD systems 2 Why QKD; Why QuSAT

More information

An Update on ETSI ISG QKD

An Update on ETSI ISG QKD An Update on ETSI ISG QKD Andrew Shields (Chair) Industry Specification Group in Quantum Key Distribution Global Deployments of QKD EU Flagship Programme UK Quantum Network TREL Tokyo QKD Network Cambridge

More information

Advances in the security analysis of CVQKD. Sébastien Kunz-Jacques

Advances in the security analysis of CVQKD. Sébastien Kunz-Jacques Advances in the security analysis of CVQKD Sébastien Kunz-Jacques SeQureNet 2013-09-26 1/17 CVQKD: Gaussian protocol Grosshans-Grangier 2002 Send coherent states with Gaussian distribution Measurement:

More information

Research, development, and perspective of Tokyo QKD Network

Research, development, and perspective of Tokyo QKD Network Presentation at ETSI meeting on 26 th 27 th, Sep, 2013 Research, development, and perspective of Tokyo QKD Network Kiyoshi Tamaki NTT basic research lab, Japan Project overview of Tokyo QKD Network Main

More information

1 Quantum Cryptography

1 Quantum Cryptography J. Rothberg March 3, 204 Quantum Cryptography. Quantum Key Distribution A better name for this application of Quantum Mechanics is Quantum Key Distribution since what is transmitted is not a message but

More information

Authentication and routing in simple Quantum Key Distribution networks

Authentication and routing in simple Quantum Key Distribution networks Authentication and routing in simple Quantum Key Distribution networks Andrea Pasquinucci UCCI.IT, via Olmo 26, I-23888 Rovagnate (LC), Italy arxiv:cs/0506003v1 [cs.ni] 1 Jun 2005 June 02, 2005 Abstract

More information

ETSI ISG QKD. Martin Ward. Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017

ETSI ISG QKD. Martin Ward. Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017 ETSI ISG QKD Martin Ward Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017 ETSI Industry Specification Group in QKD Mission: To develop ETSI Group

More information

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC.

Encryption Providing Perfect Secrecy COPYRIGHT 2001 NON-ELEPHANT ENCRYPTION SYSTEMS INC. Encryption Providing Perfect Secrecy Presented at Calgary Unix Users Group. November 27, 2001 by: Mario Forcinito, PEng, PhD With many thanks to Prof. Aiden Bruen from the Mathematics Department, University

More information

Demonstration of an Active Quantum Key Distribution Network 1

Demonstration of an Active Quantum Key Distribution Network 1 Demonstration of an Active Quantum Key Distribution Network 1 Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Hai Xu, Barry Hershman, Joshua Bienfang, David Su, Ronald F. Boisvert, Charles Clark, and

More information

Zhu Cao. Joint work with Wei-Yue Liu, Hai-Lin Yong, Ji-Gang Ren, Xiongfeng Ma, Cheng-Zhi Peng, and Jian-Wei Pan

Zhu Cao. Joint work with Wei-Yue Liu, Hai-Lin Yong, Ji-Gang Ren, Xiongfeng Ma, Cheng-Zhi Peng, and Jian-Wei Pan 2013-08-05 Zhu Cao Joint work with Wei-Yue Liu, Hai-Lin Yong, Ji-Gang Ren, Xiongfeng Ma, Cheng-Zhi Peng, and Jian-Wei Pan Univ. of Sci. & Tech. of China Tsinghua University Outline Background Field tests

More information

Presentation at GLOBECOM After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise. Gregory Kanter and Prem Kumar

Presentation at GLOBECOM After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise. Gregory Kanter and Prem Kumar Presentation at GLOBECOM 2007 After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise By Gregory Kanter and Prem Kumar NuCrypt, LLC 1801 Maple Ave. #6322, Evanston, IL 60201-3135

More information

Public-Key Cryptography

Public-Key Cryptography Computer Security Spring 2008 Public-Key Cryptography Aggelos Kiayias University of Connecticut A paradox Classic cryptography (ciphers etc.) Alice and Bob share a short private key using a secure channel.

More information

ETSI GS QKD 005 V1.1.1 ( ) Group Specification

ETSI GS QKD 005 V1.1.1 ( ) Group Specification GS QKD 005 V1.1.1 (2010-12) Group Specification Quantum Key Distribution (QKD); Security Proofs Disclaimer This document has been produced and approved by the Quantum Key Distribution (QKD) Industry Specification

More information

Software Development for B92 Quantum Key Distribution Communication Protocol

Software Development for B92 Quantum Key Distribution Communication Protocol Software Development for B92 Quantum Key Distribution Communication Protocol Shirantha Wijesekera Dr. Sajal Palit Dr. Bala Balachandran University of Canberra University of Canberra University of Canberra

More information

New directions in Quantum Cryptography

New directions in Quantum Cryptography New directions in Quantum Cryptography dr. Mario Stipevi, Institut Ruer Boškovi CARNet Users Conference 2004 27-29 September 2004, FER, Zagreb Final version E-mail: Mario.Stipcevic@irb.hr 1 Why do we need

More information

A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography

A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography D. Richard Kuhn National Institute of Standards and Technology Gaithersburg, MD 20899 USA Abstract This paper presents

More information

Marc Hentsch Sales Engineer

Marc Hentsch Sales Engineer Marc Hentsch Sales Engineer marc.hentsch@idquantique.com Ch. de la Marbrerie, 3 Tel: +41 (0)22 301 83 71 1227 Carouge / Geneva Fax: +41 (0)22 301 83 79 Switzerland www.idquantique.com Presentation outline

More information

University of Bristol - Explore Bristol Research. Other version. Link to publication record in Explore Bristol Research PDF-document.

University of Bristol - Explore Bristol Research. Other version. Link to publication record in Explore Bristol Research PDF-document. Price, A., Aguado, A., Hugues Salas, E., Haigh, P. A., Sibson, P., Marhuenda, J.,... Erven, C. (2016). Practical integration of Quantum Key Distribution with Next-Generation Networks. Abstract from International

More information

Quantum Secure Network - Architecture and Applications -

Quantum Secure Network - Architecture and Applications - [NEC Group Internal Use Only] 4 th ETSI/IQS Workshop on Quantum-Safe Cryptography Quantum Secure Network - Architecture and Applications - A. Tajima 1, T. Kondoh 1, T. Ochi 1, M. Fujiwara 2, K. Yoshino

More information

Towards a Key Consuming Detection in QKD-VoIP Systems

Towards a Key Consuming Detection in QKD-VoIP Systems Towards a Key Consuming Detection in QKD-VoIP Systems Guohong Zhao, Wanrong Yu, Baokang Zhao, and Chunqing Wu School of Computer Science, National University of Defense Technology, Changsha, Hunan, China

More information

This document is devoted mainly to solve confusions and. (QKD), and we also give some case studies where the use of QKD deserves to be considered.

This document is devoted mainly to solve confusions and. (QKD), and we also give some case studies where the use of QKD deserves to be considered. On Security Issues of QKD This document is devoted mainly to solve confusions and doubts about the security of Quantum Key Distribution (QKD), and we also give some case studies where the use of QKD deserves

More information

AIR FORCE INSTITUTE OF TECHNOLOGY

AIR FORCE INSTITUTE OF TECHNOLOGY SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS Carole A. Harper, Captain, USAF AFIT/GSE/ENV/12-M05 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE

More information

Lecture 1: Perfect Security

Lecture 1: Perfect Security CS 290G (Fall 2014) Introduction to Cryptography Oct 2nd, 2014 Instructor: Rachel Lin 1 Recap Lecture 1: Perfect Security Scribe: John Retterer-Moore Last class, we introduced modern cryptography and gave

More information

Custom Hardware to Eliminate Bottlenecks in QKD Throughput Performance *

Custom Hardware to Eliminate Bottlenecks in QKD Throughput Performance * Custom Hardware to Eliminate Bottlenecks in QKD Throughput Performance * Alan Mink National Institute of Standards and Technology, 100 Bureau Dr., Gaithersburg, MD 20899 alan.mink@nist.gov ABSTRACT The

More information

arxiv:quant-ph/ v2 25 Oct 2006

arxiv:quant-ph/ v2 25 Oct 2006 arxiv:quant-ph/0610202v2 25 Oct 2006 Architecture of the Secoqc Quantum Key Distribution network Mehrdad Dianati and Romain Alléaume GET-ENST, Network and Computer Science Department, CNRS UMR 5141 46

More information

Central Slice Theorem

Central Slice Theorem Central Slice Theorem Incident X-rays y f(x,y) R x r x Detected p(, x ) The thick line is described by xcos +ysin =R Properties of Fourier Transform F [ f ( x a)] F [ f ( x)] e j 2 a Spatial Domain Spatial

More information

arxiv:quant-ph/ v2 2 Apr 2006

arxiv:quant-ph/ v2 2 Apr 2006 QKD Quantum Channel Authentication J.T. Kosloski National Security Agency, 9800 Savage Road, Fort George G. Meade, Maryland 20755 (Dated: February 1, 2008) arxiv:quant-ph/0603101v2 2 Apr 2006 Abstract

More information

SECRET SHARING SECRET SPLITTING

SECRET SHARING SECRET SPLITTING Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de SECRET SHARING SECRET SPLITTING BaSoTI 2012, Tartu Anecdotal Problem Trent wants to give Alice and Bob access to the safe Trent

More information

Photon counting strategies with low-light-level CCDs

Photon counting strategies with low-light-level CCDs Mon. Not. R. Astron. Soc. 345, 985 99 (3) Photon counting strategies with low-light-level CCDs A. G. Basden, C. A. Haniff and C. D. Mackay Astrophysics Group, Cavendish Laboratory, Madingley Road, Cambridge

More information

Q uantum Key Distribution (QKD) aims to create and provide secure key data to users for cryptographic

Q uantum Key Distribution (QKD) aims to create and provide secure key data to users for cryptographic OPEN SUBJECT AREAS: QUANTUM INFORMATION COMPUTER SCIENCE Received 3 June 2013 Accepted 10 November 2014 Published 2 December 2014 Correspondence and requests for materials should be addressed to A.R.D.

More information

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography

Cryptography CS 555. Topic 1: Course Overview & What is Cryptography Cryptography CS 555 Topic 1: Course Overview & What is Cryptography 1 Administrative Note Professor Blocki is traveling and will be back on Wednesday. E-mail: jblocki@purdue.edu Thanks to Professor Spafford

More information

QKD Communication Protocol for Authentication Mechanism of Cloud Network

QKD Communication Protocol for Authentication Mechanism of Cloud Network QKD Communication Protocol for Authentication Mechanism of Cloud Network Zuriati Ahmad Zukarnain Department of Communication Technology and Networks, Faculty of Computer Science and Information Technology

More information

Making and Breaking Ciphers

Making and Breaking Ciphers Making and Breaking Ciphers Ralph Morelli Trinity College, Hartford (ralph.morelli@trincoll.edu) Smithsonian Institute October 31, 2009 2009 Ralph Morelli You are free to reuse and remix this presentation

More information

PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY 1

PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY 1 PROTECTION AGAINST THE MAN-IN-THE-MIDDLE-ATTACK FOR THE KIRCHHOFF-LOOP-JOHNSON(-LIKE)-NOISE CIPHER AND EXPANSION BY VOLTAGE-BASED SECURITY 1 L. B. KISH Department of Electrical Engineering, Texas A&M University,

More information

arxiv: v1 [quant-ph] 15 Apr 2013

arxiv: v1 [quant-ph] 15 Apr 2013 1 Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters David Elkouss, Jesus Martinez-Mateo, Alex Ciurana, Vicente Martin arxiv:1304.4048v1 [quant-ph] 15 Apr 2013 Abstract

More information

Secure Multiparty Computation: Introduction. Ran Cohen (Tel Aviv University)

Secure Multiparty Computation: Introduction. Ran Cohen (Tel Aviv University) Secure Multiparty Computation: Introduction Ran Cohen (Tel Aviv University) Scenario 1: Private Dating Alice and Bob meet at a pub If both of them want to date together they will find out If Alice doesn

More information

Lecture 7.1: Private-key Encryption. Lecture 7.1: Private-key Encryption

Lecture 7.1: Private-key Encryption. Lecture 7.1: Private-key Encryption Private-key Encryption Alice and Bob share a secret s {0, 1} n Private-key Encryption Alice and Bob share a secret s {0, 1} n Encryption and Decryption algorithms are efficient Private-key Encryption Alice

More information

Decoupled Line System + Coherent Terminal Optics Link Design & Commissioning

Decoupled Line System + Coherent Terminal Optics Link Design & Commissioning Decoupled Line System + Coherent Terminal Optics Link Design & Commissioning ECOC 2014 Workshop on Can we still trust our test protocols? Vijay Vusirikala, Valey Kamalov, Vinayak Dangui & Tad Hofmeister

More information

Lecture 07: Private-key Encryption. Private-key Encryption

Lecture 07: Private-key Encryption. Private-key Encryption Lecture 07: Three algorithms Key Generation: Generate the secret key sk Encryption: Given the secret key sk and a message m, it outputs the cipher-text c (Note that the encryption algorithm can be a randomized

More information

Defining Encryption. Lecture 2. Simulation & Indistinguishability

Defining Encryption. Lecture 2. Simulation & Indistinguishability Defining Encryption Lecture 2 Simulation & Indistinguishability Roadmap First, Symmetric Key Encryption Defining the problem We ll do it elaborately, so that it will be easy to see different levels of

More information

Classic Cryptography: From Caesar to the Hot Line

Classic Cryptography: From Caesar to the Hot Line Classic Cryptography: From Caesar to the Hot Line Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Overview of the Lecture Overview of Cryptography and Security Classical

More information

PARAMETRIC TROJANS FOR FAULT-BASED ATTACKS ON CRYPTOGRAPHIC HARDWARE

PARAMETRIC TROJANS FOR FAULT-BASED ATTACKS ON CRYPTOGRAPHIC HARDWARE PARAMETRIC TROJANS FOR FAULT-BASED ATTACKS ON CRYPTOGRAPHIC HARDWARE Raghavan Kumar, University of Massachusetts Amherst Contributions by: Philipp Jovanovic, University of Passau Wayne P. Burleson, University

More information

An Overview of Secure Multiparty Computation

An Overview of Secure Multiparty Computation An Overview of Secure Multiparty Computation T. E. Bjørstad The Selmer Center Department of Informatics University of Bergen Norway Prøveforelesning for PhD-graden 2010-02-11 Outline Background 1 Background

More information

National Network of Quantum Technologies Hubs: Quantum Communications Hub. Director: Professor Tim Spiller Affiliation

National Network of Quantum Technologies Hubs: Quantum Communications Hub. Director: Professor Tim Spiller Affiliation National Network of Quantum Technologies Hubs: Quantum Communications Hub Director: Professor Tim Spiller Affiliation Quantum Communications Hub: Partners Academic partners: York (lead), Bristol, Cambridge,

More information

Radiance, Irradiance and Reflectance

Radiance, Irradiance and Reflectance CEE 6100 Remote Sensing Fundamentals 1 Radiance, Irradiance and Reflectance When making field optical measurements we are generally interested in reflectance, a relative measurement. At a minimum, measurements

More information

Quantum Encryption Keys

Quantum Encryption Keys Quantum Technology PROGRAMME ACTIVITY SHEETS Quantum Encryption Keys SHARING DECRYPTION KEYS AND DECODING MESSAGES Every time you send an email or you pay for something online, or with your debit card,

More information

Cryptographic Primitives A brief introduction. Ragesh Jaiswal CSE, IIT Delhi

Cryptographic Primitives A brief introduction. Ragesh Jaiswal CSE, IIT Delhi Cryptographic Primitives A brief introduction Ragesh Jaiswal CSE, IIT Delhi Cryptography: Introduction Throughout most of history: Cryptography = art of secret writing Secure communication M M = D K (C)

More information

Dawn Song

Dawn Song 1 Secret-Sharing & Zero-knowledge Proof Dawn Song dawnsong@cs.berkeley.edu Review DH key exchange protocol Password authentication protocol Random number generation 2 Lessons Learned Seeds must be unpredictable

More information

Single Photon Counting Module COUNT blue -Series

Single Photon Counting Module COUNT blue -Series Single Photon Counting Module COUNT blue -Series Description Laser Components COUNT blue series of Single Photon Counting Modules has been developed to offer a unique combination of high quantum efficiency,

More information

Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol

Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol Adnan Memon Abstract This paper presents a new scheme to distribute secret shares using two trusted third parties to increase security

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

Implementing a Near-Optimal Optical Receiver for Interplanetary Communications

Implementing a Near-Optimal Optical Receiver for Interplanetary Communications Quantum Communication Sensing and Measurement in Space Keck Institute For Space Studies June 28th, 2012 Implementing a Near-Optimal Optical Receiver for Interplanetary Communications Tim Rambo Advisor:

More information

Authentication and Key Distribution

Authentication and Key Distribution 1 Alice and Bob share a key How do they determine that they do? Challenge-response protocols 2 How do they establish the shared secret in the first place? Key distribution PKI, Kerberos, Other key distribution

More information

ECE 646 Lecture 3. Key management

ECE 646 Lecture 3. Key management ECE 646 Lecture 3 Key management Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 5/E or 6/E Chapter 14 Key Management and Distribution Using the same key for multiple

More information

Secure Multiparty Computation

Secure Multiparty Computation CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

arxiv:quant-ph/ v1 16 Jul 2004

arxiv:quant-ph/ v1 16 Jul 2004 Cryptanalysis of a Practical Quantum Key Distribution With Polarization-Entangled Photons Thomas Beth, Jörn Müller-Quade, and Rainer Steinwandt arxiv:quant-ph/0407130v1 16 Jul 2004 IAKS/E.I.S.S., Fakultät

More information

Exchanging Secrets Without Using Cryptography

Exchanging Secrets Without Using Cryptography Exchanging Secrets Without Using Cryptography Iris Safaka, Mahdi J Siavoshani, Uday Pulleti, Emre Atsan, Christina Fragouli, Katerina Argyraki, Suhas Diggavi (EPFL and UCLA) arxiv:1105.4991v2 [cs.cr] 25

More information

Single Photon Counting Module

Single Photon Counting Module Description Laser Components COUNT series of s has been developed to offer a unique combination of high quantum efficiency, wide dynamic range and ease of use for photon counting applications. Combining

More information

Status of the TORCH time-of-flight detector

Status of the TORCH time-of-flight detector Status of the TORCH time-of-flight detector Neville Harnew University of Oxford (On behalf of the TORCH collaboration : the Universities of Bath, Bristol and Oxford, CERN, and Photek) August 7-9, 2017

More information

SDN-based Network Obfuscation. Roland Meier PhD Student ETH Zürich

SDN-based Network Obfuscation. Roland Meier PhD Student ETH Zürich SDN-based Network Obfuscation Roland Meier PhD Student ETH Zürich This Talk This thesis vs. existing solutions Alice Bob source: Alice destination: Bob Hi Bob, Hi Bob, Payload encryption ǾǼōĦ

More information

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD

CS 6324: Information Security More Info on Key Establishment: RSA, DH & QKD ERIK JONSSON SCHOOL OF ENGINEERING & COMPUTER SCIENCE Cyber Security Research and Education Institute CS 6324: Information Security Dr. Junia Valente Department of Computer Science The University of Texas

More information

A NOTE ON AN ARBITRATED QUANTUM SIGNATURE SCHEME

A NOTE ON AN ARBITRATED QUANTUM SIGNATURE SCHEME International Journal of Quantum Information Vol. 7, No. 6 (2009) 1205 1209 c World Scientific Publishing Company A NOTE ON AN ARBITRATED QUANTUM SIGNATURE SCHEME ZHENGJUN CAO Département d informatique,

More information

arxiv:quant-ph/ v3 4 Dec 2014

arxiv:quant-ph/ v3 4 Dec 2014 Using quantum key distribution for cryptographic purposes: a survey R.Alléaume a,b,, C. Branciard c, J. Bouda d, T. Debuisschert e, M. Dianati f, N. Gisin c, M. Godfrey g, P. Grangier h, T. Länger i, N.

More information

4.1 QUANTIZATION NOISE

4.1 QUANTIZATION NOISE DIGITAL SIGNAL PROCESSING UNIT IV FINITE WORD LENGTH EFFECTS Contents : 4.1 Quantization Noise 4.2 Fixed Point and Floating Point Number Representation 4.3 Truncation and Rounding 4.4 Quantization Noise

More information

Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer

Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer Opportunities and Pitfalls in Securing Visible Light Communication on the Physical Layer Jiska Classen, Daniel Steinmetzer, Matthias Hollick Jiska Classen Technische Universität Darmstadt Secure Mobile

More information

Programming a quantum network

Programming a quantum network Programming a quantum network Axel Dahlberg Stephanie Wehner January 21, 2018 1 Introduction In this project, you will program your own quantum protocol! We start by a very simple protocol in which Alice

More information

CS 161 Computer Security. Week of September 11, 2017: Cryptography I

CS 161 Computer Security. Week of September 11, 2017: Cryptography I Weaver Fall 2017 CS 161 Computer Security Discussion 3 Week of September 11, 2017: Cryptography I Question 1 Activity: Cryptographic security levels (20 min) Say Alice has a randomly-chosen symmetric key

More information

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018 Lecture 6: Symmetric Cryptography CS 5430 February 21, 2018 The Big Picture Thus Far Attacks are perpetrated by threats that inflict harm by exploiting vulnerabilities which are controlled by countermeasures.

More information

Introduction to Post-Quantum Cryptography

Introduction to Post-Quantum Cryptography Introduction to Post-Quantum Cryptography CERG @ GMU http://cryptography.gmu.edu 10 PhD students 3 MS students Features Required from Today s Ciphers STRENGTH PERFORMANCE software hardware FUNCTIONALITY

More information

Introduction to Post-Quantum Cryptography

Introduction to Post-Quantum Cryptography Introduction to Post-Quantum Cryptography CERG @ GMU http://cryptography.gmu.edu 10 PhD students 3 MS students 1 Features Required from Today s Ciphers STRENGTH PERFORMANCE software hardware FUNCTIONALITY

More information

Secret Sharing. See: Shamir, How to Share a Secret, CACM, Vol. 22, No. 11, November 1979, pp c Eli Biham - June 2, Secret Sharing

Secret Sharing. See: Shamir, How to Share a Secret, CACM, Vol. 22, No. 11, November 1979, pp c Eli Biham - June 2, Secret Sharing Secret Sharing See: Shamir, How to Share a Secret, CACM, Vol. 22, No. 11, November 1979, pp. 612 613 c Eli Biham - June 2, 2011 464 Secret Sharing How to Keep a Secret Key Securely Information can be secured

More information

Data Integrity. Modified by: Dr. Ramzi Saifan

Data Integrity. Modified by: Dr. Ramzi Saifan Data Integrity Modified by: Dr. Ramzi Saifan Encryption/Decryption Provides message confidentiality. Does it provide message authentication? 2 Message Authentication Bob receives a message m from Alice,

More information

High Speed Quantum Key Distribution System Supports One-Time Pad Encryption of Real-Time Video 1

High Speed Quantum Key Distribution System Supports One-Time Pad Encryption of Real-Time Video 1 High Speed Quantum Key Distribution System Supports One-Time Pad Encryption of Real-Time Video 1 Alan Mink, Xiao Tang, LiJun Ma, Tassos Nakassis, Barry Hershman, Joshua C. Bienfang, David Su, Ron Boisvert,

More information

Cryptanalysis of Password Protection of Oracle Database Management System (DBMS)

Cryptanalysis of Password Protection of Oracle Database Management System (DBMS) Journal of Physics: Conference Series PAPER OPEN ACCESS Cryptanalysis of Password Protection of Oracle Database Management System (DBMS) To cite this article: Timur Koishibayev and Zhanat Umarova 2016

More information

CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued

CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued CS155b: E-Commerce Lecture 6: Jan. 25, 2001 Security and Privacy, Continued FIREWALL A barrier between an internal network & the Internet Protects the internal network from outside attacks Executes administrator-defined

More information

8/30/17. Introduction to Post-Quantum Cryptography. Features Required from Today s Ciphers. Secret-key (Symmetric) Ciphers

8/30/17. Introduction to Post-Quantum Cryptography. Features Required from Today s Ciphers. Secret-key (Symmetric) Ciphers CERG @ GMU http://cryptography.gmu.edu Introduction to Post-Quantum Cryptography 10 PhD students 3 MS students Features Required from Today s Ciphers Secret-key (Symmetric) Ciphers STRENGTH PERFORMANCE

More information

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL)) Introduction (Mihir Bellare Text/Notes: http://cseweb.ucsd.edu/users/mihir/cse207/) Cryptography provides: Data Privacy Data Integrity and Authenticity Crypto-systems all around us ATM machines Remote

More information

Cryptography. Andreas Hülsing. 6 September 2016

Cryptography. Andreas Hülsing. 6 September 2016 Cryptography Andreas Hülsing 6 September 2016 1 / 21 Announcements Homepage: http: //www.hyperelliptic.org/tanja/teaching/crypto16/ Lecture is recorded First row might be on recordings. Anything organizational:

More information

Bob k. Alice. CS 558 Lecture Deck(c) = c k. Continuation of Encryption

Bob k. Alice. CS 558 Lecture Deck(c) = c k. Continuation of Encryption CS 558 Lecture 1-26-2017 Continuation of Encryption Review: Schemes - how we do encryption and/or decryption Definition of what it means to be secure(sometimes use to analyze a system) Proof that the scheme

More information

Cryptography. Lecture 03

Cryptography. Lecture 03 Cryptography Lecture 03 Recap Consider the following Encryption Schemes: 1. Shift Cipher: Crackable. Keyspace has only 26 elements. 2. Affine Cipher: Crackable. Keyspace has only 312 elements. 3. Vig Cipher:

More information

Security protocols. Correctness of protocols. Correctness of protocols. II. Logical representation and analysis of protocols.i

Security protocols. Correctness of protocols. Correctness of protocols. II. Logical representation and analysis of protocols.i Security protocols Logical representation and analysis of protocols.i A security protocol is a set of rules, adhered to by the communication parties in order to ensure achieving various security or privacy

More information

Precision Timing in High Pile-Up and Time-Based Vertex Reconstruction

Precision Timing in High Pile-Up and Time-Based Vertex Reconstruction Precision Timing in High Pile-Up and Time-Based Vertex Reconstruction Cedric Flamant (CERN Summer Student) - Supervisor: Adi Bornheim Division of High Energy Physics, California Institute of Technology,

More information

Lecture 20: Public-key Encryption & Hybrid Encryption. Public-key Encryption

Lecture 20: Public-key Encryption & Hybrid Encryption. Public-key Encryption Lecture 20: & Hybrid Encryption Lecture 20: & Hybrid Encryption Overview Suppose there is a 2-round Key-Agreement protocol. This means that there exists a protocol where Bob sends the first message m B

More information

Update on technical feasibility for PAM modulation

Update on technical feasibility for PAM modulation Update on technical feasibility for PAM modulation Gary Nicholl, Chris Fludger Cisco IEEE 80.3 NG00GE PMD Study Group March 0 PAM Architecture Overview [Gary Nicholl] PAM Link Modeling Analysis [Chris

More information

Experimental Optics. Michelson Interferometer. Contact. Last edition:

Experimental Optics. Michelson Interferometer. Contact. Last edition: Experimental Optics Contact Last edition: Michelson Interferometer 1 Background... 3... 4... 5... 13... 13 4.2... 14... 15... 15... 17... 19... 21... 21... 22... 22... 23... 24... 24... 25 2 1 Background

More information

XUV pulse FLASH

XUV pulse FLASH W (GW) XUV pulse duration @ FLASH 50 85µm with bandpass filter 55 60 Kinetic Energy [ev] 65 70 75 80 85 90 95 100 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 Delay [ps] 80 60 40 20 0 0 50 100 150 200 250 300 t (fs)

More information

Confocal Microscope Imaging of Single-Emitter Fluorescence and Hanbury Brown & Twiss Setup for Photon Antibunching. Edward Pei

Confocal Microscope Imaging of Single-Emitter Fluorescence and Hanbury Brown & Twiss Setup for Photon Antibunching. Edward Pei Confocal Microscope Imaging of Single-Emitter Fluorescence and Hanbury Brown & Twiss Setup for Photon Antibunching Edward Pei Abstract The purpose of these labs was to study single photon sources and measure

More information

T Cryptography and Data Security

T Cryptography and Data Security T-79.4501 Cryptography and Data Security Lecture 10: 10.1 Random number generation 10.2 Key management - Distribution of symmetric keys - Management of public keys Stallings: Ch 7.4; 7.3; 10.1 1 The Use

More information

Differential Privacy. Cynthia Dwork. Mamadou H. Diallo

Differential Privacy. Cynthia Dwork. Mamadou H. Diallo Differential Privacy Cynthia Dwork Mamadou H. Diallo 1 Focus Overview Privacy preservation in statistical databases Goal: to enable the user to learn properties of the population as a whole, while protecting

More information

Syrvey on block ciphers

Syrvey on block ciphers Syrvey on block ciphers Anna Rimoldi Department of Mathematics - University of Trento BunnyTn 2012 A. Rimoldi (Univ. Trento) Survey on block ciphers 12 March 2012 1 / 21 Symmetric Key Cryptosystem M-Source

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

CS408 Cryptography & Internet Security

CS408 Cryptography & Internet Security CS408 Cryptography & Internet Security Lecture 18: Cryptographic hash functions, Message authentication codes Functions Definition Given two sets, X and Y, a function f : X Y (from set X to set Y), is

More information

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes

Lecture 02: Historical Encryption Schemes. Lecture 02: Historical Encryption Schemes What is Encryption Parties involved: Alice: The Sender Bob: The Receiver Eve: The Eavesdropper Aim of Encryption Alice wants to send a message to Bob The message should remain hidden from Eve What distinguishes

More information

FSM-30PF SPECIFICATIONS FOR FIBER FUSION SPLICER FOR HIGH TENSILE STRENGTH SPLICING 1. GENERAL

FSM-30PF SPECIFICATIONS FOR FIBER FUSION SPLICER FOR HIGH TENSILE STRENGTH SPLICING 1. GENERAL Page : 1/9 SPECIFICATIONS FOR FSM-30PF FIBER FUSION SPLICER FOR HIGH TENSILE STRENGTH SPLICING 1. GENERAL These specifications cover the FSM-30PF fiber fusion splicer. This splicer has some new functions

More information

Uniformity scan of the 6cm tubes. Jingbo Wang Argonne National Laboratory, Lemont, IL

Uniformity scan of the 6cm tubes. Jingbo Wang Argonne National Laboratory, Lemont, IL Uniformity scan of the 6cm tubes Jingbo Wang Argonne National Laboratory, Lemont, IL wjingbo@anl.gov Update of the test system Realized the computer control for the multi-channel HV supply, the 2D translation

More information

A Quantum Cryptography Communication Network Based on Software Defined Network

A Quantum Cryptography Communication Network Based on Software Defined Network A Quantum Cryptography Communication Network Based on Software Defined Network Hongliang Zhang 1.*, Dongxiao Quan 1.*, Changhua Zhu 1.*, and Zhigang Li 1.* 1 Skate Key Laboratory of Integrated Services

More information

What did we talk about last time? Public key cryptography A little number theory

What did we talk about last time? Public key cryptography A little number theory Week 4 - Friday What did we talk about last time? Public key cryptography A little number theory If p is prime and a is a positive integer not divisible by p, then: a p 1 1 (mod p) Assume a is positive

More information

Network Encryption. Dr. Michael Ritter. September 18 th, 2015

Network Encryption. Dr. Michael Ritter. September 18 th, 2015 Network Encryption Dr. Michael Ritter September 18 th, 2015 What the heck is Elliptic Curve Diffie-Hellman? Dr. Michael Ritter September 18 th, 2015 ADVA Optical Networking at a Glance Value-added connectivity

More information