WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

Quantum key distribution theory and practice

( Télécharger le fichier original )
par Grace Mupoyi
African Institut for Mathematical Science - Master 2 2015
  

précédent sommaire suivant

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

3.3 Assumption and protocol

Untill now the research considered a QKD as the only one key exchange which is secure. After their experience and verification, they came up with same characteristics to show us that this system stayed a secure system and the eternel system secure. Let us enumerate them.

1. This system give an guarantee to detect the Eve presence in the channel;

2. The key is absolutely secure that does not depend to the complexity of the algorithm or the technology used by Eavesdropper to attack.

Having those assumptions with a properties of quantum mechanics, quantum cryptography provide two kinds of protocols. All the protocols are able to detect the Eavesdropper in the channel and have the unconditional security.

3.4 Protocols Using Heisenberg's

There are many protocols using this notion of HUP but for us, we will focus on those which are more used and discovered before. We may have in mind that all the protocols follow the same structure6.

Prepare and send protocol

After Weisberg publish a paper where he introduced the concept of quantum mechanics in communication, Bernett and Bassard in 1984 come up with a new revolutionnary idea which was the first proposal of QKD protocol using totaly HUP (based on quantum properties) notion. This protocol is the oldest for quantum cryptography, based on basis7 which are quite related to the polarization notion. We have the rectilinear and the diagonal basis for BB84. Quantum protocol can be describe in two steps or phases, quantum and classical one. Let us describe firstly quantum phase and classical phase after.

Quantum phase

Any message passing through in the computer are converted into zeroes and ones which are the informatic unity in classical information theory. In BB84, there exist a correspondant unity for quantum information to express information. Using Dirac notation, we express the information unity with a braket as |øi, |1i or |xi and its call qubits 8. Other definition, we call a qubit a superposition of zeroes and ones (|00i, |01i, |10i) , is described by complex number with an argument 1 belong the set

{á|0i + /3|1i : |á|2 + |/3|2 = 1;á,/3 ? C}, (3.4.1)

we take |0i and |1i as two references qubits, corresponding to two orthogonal states in a quantum system.

6Structure means the fonctionnality is the same but few differents we can find but in general is the same

7BB84 is the main protocol and the remaind follow the way that its works the difference is few certain have a difference just in basis used to send the information

8Quantum bits

Section 3.4. Protocols Using Heisenberg's Page 17

Figure 3.3: Transmission photon by Alice to Bob

Figure 3.4: Detection of photon by Bob using states measurement

1. In BB84, Alice sends a sequence of photon to Bob, each independantly choose one of the four polarization (the four polarization are vertical, horizontal, 45% and 135% you can have an idea checking the figure down).

2. For each polarization, Bob will choose one base for measurement to achieve the result

3. Bob will records the result and his measurement bases and after, he will publicly acknowledges his receipt other signal.

Classical phase

In this phase the entities have a following steps

1. Alice broadcasts her bases of measurement, Bob broadcasts his bases of measurements

2. Alice and Bob discard all events where they use different bases for a signal

3. To test for tempering, Alice randomly choose a fraction, if all remaining events as test events, she publicly broadcasts their position and polarization

4. Bob broadcasts the polarizations of the test events

Section 3.5. Entaglement base to protocol Page 18

Figure 3.5: Data transmit between two parties using basis

5. Alice and Bob compute the error rate of the test events. If the compution of error rate is large than some prescribed threshold value, say 11% they about otherwise, they proceed to the next step (This step is where Alice and Bob detect Eve presence)

6. Alice and Bob each convert the polarization data of all remaining data into a binary string called a raw key. They can perform classical post-procesing such as error correction and privacy amplification to generate a final key.

With quantum mechanics properties, the security is a efficiency and the Eavesdropper can use any method of attack Alice and Bob will detect her. The work of [Zha09] explain other notion for the efficiency security.

3.4.1 B92 protocol . This protocol is a derivative of BB84 protocol. It was proposed by Charles Bernett in 1992. B92 have the same function then BB84 but the difference is just the half part of fonctionality from BB84. The encoding of one state for example |ø) composed by {|0), |1)} we can encode each element of the set in this way the first element in the set will be encode with rectilinear basis which is correspond to 0o and |1) encode in diagonal basis this according to [Hai14]. There exist also other variants QKD protocols using the notion of Heisenber Uncertainty Principale as you can see in many book where they are talking about QKD like [Hai14]. We can enumerate other protocols using Heisenberg like, Six-State Protoco(SSP) proposed by Posquinucci, Gusin in 1999 the different with BB84 instand of two state and here the use one.

précédent sommaire suivant






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Enrichissons-nous de nos différences mutuelles "   Paul Valery