• No results found

Security of EPR based Quantum Cryptography

N/A
N/A
Protected

Academic year: 2020

Share "Security of EPR based Quantum Cryptography"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

2017 International Conference on Electronic and Information Technology (ICEIT 2017) ISBN: 978-1-60595-526-1

Security of EPR-based Quantum Cryptography

Jiang ZHU

1,*

, Tao YAN

1

and Hua ZHAO

1

1

NARI Group Corporation (State Grid Electric Power Research Institute) Nanjing, Jiangsu, 210003, China

*Corresponding author

Keywords: Quantum Entanglement, Quantum Cryptography, Quantum Encryption,

Uncertainly Principle, EPR Pair.

Abstract. Quantum cryptography based on quantum physics has been proved to be an effective means of key security allocation in secure communication. This paper introduces you to the basic principle of quantum cryptography on the basis of classical cryptography, and then presents several methods of quantum cryptography. It expounds the main research on EPR key distribution mechanism based on entanglement, according to quantum cryptography communication history and the existing problems. Lastly the advanced prospect and research aspect were predicted.

Introduction

In traditional encryption systems, the security of cipher text depends entirely on the secrecy of the key, whether it is the key technology or the public key technology. The key must be made up of long enough random binary string. Once the key is established, the cipher text encoded by the key can be transmitted on the public channel. However, in order to establish the key, the sender and receiver must choose a safe and reliable communication channel, but because of the existence of the intercept, technically speaking, real security is difficult to guarantee, and the distribution of keys is always passively monitored when legitimate users are unaware of that.

In recent years, quantum cryptography has been born because of the combination of cryptography and quantum mechanics. It can complete the perfect security system which cannot be completed by traditional mathematics. Quantum cryptography is a new security communication system based on quantum theory. It cannot fundamentally ignore the quantum properties. In these properties, the key role of quantum cryptography is the Heisenberg's uncertainty principle. When measuring a quantum system, it usually interferes with the system and produces incomplete information relative to the system before measuring. Therefore, any effort to monitor the quantum channel will interfere with the information transmitted in this channel in some manner that can be detected.

The content of this paper is as follows: the second part reviews the classical cryptography, and the third part explains the principle and technology of quantum cryptography based on EPR entanglement. The fourth part introduces quantum cryptography, and finally gives the conclusion.

Classical Cryptography

(2)

Figure 1. The classical secret communication principle.

The classical secret communication system entails several parts: key, encryption algorithm, ciphertext transmission, decryption and decryption algorithm [1]. And the system relies on the encryption of all these parts to ensure its security. The basic purpose is to turn confidential information into garbled code that can only be recognized by its owner or authorized people.

When the system is running, plaintext is turned into ciphertext by using cipher which process is called encryption. The cipher is called the key. The encryption rules are called encryption algorithms. Transferring ciphertext to the recipient is called cipher transmission. Converting ciphertext into plaintext is called decryption, and the rules of decryption are called decryption algorithms. If we use a symmetric cryptographic algorithm, then K=K', if the public key cryptography algorithm is used, then K is different from K'. The security of the whole communication system depends on the key. Public key cryptography is based on one-way functions. Given the x, it is easy to compute F (x), but its inverse operations are very difficult. The difficulty here is that the time required to complete the calculation increases exponentially with the number of bits input. For example, RSA (Rivest, Shamir, Adleman) is a representative public key cryptography algorithm. The difficulty of factoring the maximal integers determines the reliability of the RSA algorithm. In other words, the factorization of a maximal integer is more difficult, and the RSA algorithm is more reliable. Because of its simple and convenient characteristics, public key cryptography system has been popularized in the last 30 years, and 95% of modern electronic commerce confidential information relies on RSA algorithm. But it has some defects. First of all, it is impossible to theoretically prove the algorithm's fragmentation. For the known algorithm, the time required for computation increases exponentially with the number of bits in the input. As long as we increase the length of the key, we can improve the security of the encryption system. However no one is sure if there is a more advanced fast algorithm. Secondly, with the rapid development of quantum computer technology, those problems that the classical computers cannot solve can be easily solved by quantum computers. For example, Shor' quantum factorization algorithm can easily break the RSA encryption algorithm in polynomial time.

(3)

security of the communication between the legitimate communication parties before obtaining the shared key cannot be guaranteed.

Modern cryptography holds that encryption and decryption algorithms for any encryption system can be made public. The security of encryption system lies in the secrecy of the key. In fact, due to the possibility of passive wiretapping, it is impossible to establish a secret key between the two parties if the two parties communicate completely through the classical channel. The intervention of quantum physics, however, revolutionized the situation.

The Principles of Quantum Cryptography

Quantum cryptography is the only way to achieve absolute secure communications that is recognized by the scientific community now. It depends on two points: One is the basic quantum mechanical effects (such as the Uncertainty Principle, the Bell Principle, the quantum No-Cloning Theorem); the other is quantum key distribution protocol [2]. Quantum cryptography can ensure that: (1) legitimate communications can detect potential eavesdropper and take corresponding measures; (2) the eavesdroppers cannot decipher the quantum cryptography, no matter how powerful computing power they have. At the same time, quantum cryptography is not used to transmit ciphertext or plaintext, but to build and transfer code book. This code book is absolutely safe. So far, the main schemes for implementing quantum cryptography are as follows:

(1) The four states scheme based on two groups of conjugate orthogonal bases, in which the representative is The BB84 Protocol;

(2) The two states scheme based on two nonorthogonality, in which the representative is The B92 Protocol;

(3) The scheme based on EPR entanglement pair, in which the representative is The E91 Protocol;

(4) The 4+2 protocol scheme based on The BB84 Protocol and The B92 Protocol. Here we mainly introduce the scheme based on EPR entanglement pair. The EPR based quantum key distribution protocol (E91) proposed by Ekert in 1991 took full advantage of the entanglement of quantum systems. It transmits quantum information through the nonlocality in entangled quantum systems, rather than through the quantum channel that The BB84 Protocol uses to transfer the qubit. As a result, it can implement key distribution more flexibly. In addition, unlike The BB84 Protocol, The E91 Protocol uses the Bell inequality to verify the presence of eavesdropper. In The BB84 Protocol and The B92 Protocol, eavesdropping verification is performed by random checking.

Although the exact relationship between the security of the quantum key distribution protocol and the Bell inequality is not clear, it is true that the quantum key distribution is unconditionally secure by using The Bell Inequality established. That is to say, no matter how sophisticated eavesdropping strategy and equipment that Eve uses, her eavesdropping behavior will inevitably affect the entangled state, and then make The Bell Inequality established.

Quantum Cryptography

(4)

Quantum Teleportation

Different quantum cryptographic protocols have different ways of quantum transmission, but they have one thing in common: the principle of quantum mechanics (such as the Heisenberg Uncertainty Principle). In the actual communication system, Alice randomly selects the photon polarization state and the base vector of single photon pulse in the quantum channel and sends it to Bob. Then Bob randomly selects base vectors for measurements. The bit string that is measured is recorded as a codebook. However, the acceptance of information is affected by the presence of noise and Eve. In particular, Eve may use various methods to interfere with and monitor Bob, such as quantum copy, interception, forwarding, etc... According to the Uncertainty Principle, the external interference will lead to the change of the photon polarization state in the quantum channel and affect the measurement results of Bob, so that the behavior of the listeners can be detected and determined. This is also an important feature of quantum cryptography that is distinguished from other cryptosystems.

Data Screening

In quantum transmission, the polarization state of photons in the photon state sequence will change due to the presence of noise, especially the presence of Eve. In addition, in the actual system, the measurement results by the Bob's tester cannot be 100% correct [3], so after comparing the measuring basis, Alice and Bob will give up all the things that are not received or have measurement errors, or are unqualified because of the influence of various factors in the process of transmission. Then, they can publicly and randomly select some data for comparison, then discard, calculate the error rate. If the error rate exceeds a certain threshold, the eavesdropper should be considered. Alice and Bob give up all the data and retransmit the photon sequence. If the results can be received, Alice and Bob save the remaining data, and the data is called screened data. Suppose that the quantum bit (Qubit) transmitted by Alice to Bob in quantum transmission is m bit, and m-n bit is screened out, and the original data is n bit. In this process, the presence of distinct Eve can be detected.

Data Correction

The obtained n bit screened data cannot guarantee the complete consistency of Alice and Bob, and the two sides of communication cannot guarantee that all the data stored are not tapped. Therefore, it is necessary to correct the original data [4,5]. Several methods have been proposed, and the following methods are proposed after research:

(1) Alice and Bob agree to randomly change the location of their bit string to disrupt the wrong location;

(2) Divide the bit string into a region of K size, and the selection of K should make the error of each region as small as possible [6];

(3) For each zone, A1ice and Bob compute and publicly announce parity-check results;

(4) If the results are the same [7], A1ice and Bob agreed to give up the last bit of the area;

(5) If the results are different, log (K) is used to repeatedly search, locate and correct errors in the area;

(5)

Privacy Amplification

Privacy amplification is a non-quantum method which improves the security of the key. Its implementation is as follows: suppose Alice sends a random variable W to Bob, such as a random n bit string. The eavesdropper Eve obtains a correct random variable V

from the random variable W, set the corresponding bits t<n and H (W|V) ≥ n-t. The

distribution of PVW is not known by Alice and Bob. Neither is PW. Alice and Bob

publicly select compression function G:{0,1}n→ {0,1}r G:(r is the length of the

compressed key) in order to make the information obtained by Eve from W and its information about function G and the new key K=G (K) as little as possible. For any s<n-t, Alice and Bob can get the key K=G (K) with length r=n-s-t bit. G is mapped G:

{0, 1}n→ {0,1}n-s-t, and the information obtained by Eve is reduced by V=f (e-ks)

according to the S index.

Summary

Quantum cryptography is a new science built out of a combination of quantum physics and cryptography. It successfully solves the problems in the traditional cryptography that cannot be solved by mathematics alone, and then attracts international attention. Quantum cryptography is an important subject which is mainly used in quantum information field. In recent years, many domestic and foreign research institutions have been active in the research of quantum cryptography. This new cryptographic communication is different from the classical cryptographic communication, and has the advantages of absolute security.

In summary, with the development of single photon detection technology, the potential of quantum cryptography communication technology in all optical networks and satellite communications will continue to be mined and become reality. When quantum computers become reality, the classical cryptosystem will not be safe. Quantum cryptography will become one of the best choices to protect data security. Therefore, further researches on quantum secure communication technology and secure communication between legitimate communicators will be a very meaningful work.

Acknowledgement

This research was financially supported by the Science and Technology Project of SGCC: Research and Development of Longitudinal Encryption and Authentication Device for Quantum Secure Communication Suitable for Electric Power Dispatching Service.

References

[1] Reinke, Edgar. C, Classical Cryptography, Classical Journal 58.3(1962):113-121.

[2] Nicolas Gisin, Gre’ goire Ribordy, Wolfgang Tittel, and Hugo Zbinden, Quantum cryptography[j], Reviews of Modern Physics, Volume 74, January 2002.

[3] Davids. Pearson, Chipelliott, On the optimal mean photon number for quantum cryptography[j], Quantum information and computation, vol. 0, no. 0 (2003) 000–000.

(6)

[5] Daniel Collins, Nicolas Gisin and Hugues De Riedmatten, Quantum relays for long distance quantum cryptography[r], 14 November 2003.

[6] Norbert Lu¨ Tkenhaus, Security against individual attacks for realistic quantum key distribution[j], Physical Review A, volume 61, 052304.

References

Related documents

An 18ct yellow and white gold diamond three-stone crossover style ring, featuring three graduated round brilliant cut diamonds in claw settings, centre diamond dimensions approx 4.9

If a local domain of a current pronoun (anaphor) is a PP-Infinitive phrase and the pronoun does not have a prepositional phrase as its parent (e.g. “Mary is desperate [for Jane

Previously, Spanish zero pronouns had been resolved (with a precision of 81.4%) and anaphoric personal pronouns had been resolved in English (with precisions of 86.6% and 76.8% in

In conclusion, treatment HS a Lolium perenne bred for elevated levels of WSC had higher total fatty acids and a higher proportion of the beneficial fatty acid 18:3n-3 compared to

The UNIVERSITY OF SOUTH CAROLINA SCHOOL OF MEDICINE GREENVILLE is a four-year medical school located in the heart of South Carolina’s most comprehensive health system –

INVESTMENT ANALYSIS FOR LARGEST HEAVY OIL FIELD IN INDONESIA UNDER INDONESIA’S GROSS SPLIT PRODUCTION SHARING CONTRACT.. M Nail Ritinov * and Ahmad

Also, tenuigenin significantly ameliorated the degeneration of dopaminergic neurons and inhibited NLRP3 inflammasome activation in substantia nigra of MPTP mouse model.. We

VI. Section IV) and error-sensitive permissions (cf. Section V), we now study the relationship between them in order to identify potential correlations between apps that use