Ibrahim Lodi (1517-26) succeeded the throne of Delhi, after the death of his father Sikandar Lodi.
1791
Colonel Napoléon Bonaparte is promoted to General and appointed Commander-in-Chief of the Armies of the French Republic.
1818
Russia’s Tsar Alexander I petitions for a Jewish state in Palestine.
1877
Thomas Edison announces his “talking machine” invention (phonograph), the 1st machine to play and record sound
1906
China prohibits the opium trade
1921
Prince of Wales visited India and Congress observed all India strike.
1947
First postal stamp of indepedent India of three and half annas denomination was started. Major General Cariappa took over from Lieutenant General Sir Francies Tulker as the Army Commander, Eastern Command, in the rank of Lieutenant General. General Hafez al-Assad becomes Prime Minister of Syria following military coup
1963
First sounding rocket launched from Thumba Equatorial Rocket Launching Station (TERLS). Thus started India’s space programme.
1971
Rebellion in East Pakistan (formerly Bengal). Ten million Bengalis flee to India. Indo-Pak border clashes escalate to war. India defeats West Pakistan. E. Pakistan becomes independent Bangladesh.
Battle of Garibpur: Indian troops aided by Mukti Bahini (Bengali guerrillas) defeat the Pakistan army
1991
R. Nagarajan, former Tamil Nadu Home Secretary, arrested for harbouring LTTE militants.
Quantum Key Distribution (QKD) offers unconditional security based on the laws of quantum physics, not computational hardness. This makes it resilient even against adversaries with quantum computers.
2. What Is QKD Security?
QKD security is the guarantee that any eavesdropping attempt will be detected, and that a secret key can still be distilled with provable bounds on the amount of leaked information.
3. Security Paradigm Shift: Classical vs Quantum
Aspect
Classical Crypto
Quantum Crypto (QKD)
Based on
Algorithmic difficulty
Physical principles
Broken by QC
Yes (e.g., RSA, ECC)
No
Eavesdropping
Undetectable
Detectable
4. Physical Principles Behind QKD Security
QKD relies on:
The no-cloning theorem
The disturbance caused by measurement
The uncertainty principle
5. Security from the No-Cloning Theorem
The no-cloning theorem ensures that an unknown quantum state cannot be duplicated:
Measuring a quantum state collapses it. If Eve tries to intercept and measure a qubit, it changes the qubit’s state, introducing detectable errors.
7. Eavesdropping Detection in QKD
By publicly comparing a subset of their key, Alice and Bob can compute the Quantum Bit Error Rate (QBER). If the QBER exceeds a threshold, they abort the protocol.
8. Quantum Bit Error Rate (QBER)
The fraction of mismatches between Alice’s and Bob’s raw key:
\[ \text{QBER} = \frac{\text{Number of Errors}}{\text{Total Bits Compared}} \]
A high QBER indicates potential eavesdropping.
9. Error Thresholds in QKD Protocols
BB84 tolerates QBER up to ~11%
E91 tolerates up to ~7–10% depending on implementation
Beyond these, key generation is insecure
10. Privacy Amplification
A post-processing step to remove leaked information by compressing the raw key using universal hash functions.
11. Information Reconciliation
Before privacy amplification, Alice and Bob must:
Reconcile bit discrepancies
Use error correction (e.g., Cascade, LDPC codes)
Minimize information revealed to Eve
12. Composable Security Framework
Security proofs today ensure composable security:
Security holds even when QKD is part of a larger protocol
Guarantees hold when keys are reused or chained
13. Individual, Collective, and Coherent Attacks
Individual attacks: one qubit at a time
Collective attacks: measure all qubits independently, store for joint analysis
Coherent attacks: interact with multiple qubits jointly — most powerful and general
14. Security Proofs Against Coherent Attacks
Modern QKD security proofs use:
Entropic uncertainty relations
Quantum de Finetti theorems
Smooth min-entropy bounds
To prove security even against the most general attacks.
15. Device-Independent Security
Device-Independent QKD (DI-QKD) uses Bell inequality violations to ensure security, even if devices are untrusted or malicious.
16. Finite-Key Security Analysis
Real systems exchange a finite number of bits. Finite-key analysis provides tight bounds on security parameters using statistics and confidence levels.
17. Entropic Uncertainty Relations
A generalization of Heisenberg’s principle that quantifies the uncertainty Eve must have if Alice and Bob share strong correlations.
18. Side-Channel Attacks and Countermeasures
Real devices can leak unintended info:
Time-shift attacks
Detector blinding
Phase remapping
Countermeasures include:
Monitoring device behavior
Introducing randomness
Using Measurement-Device-Independent QKD (MDI-QKD)
19. Trojan Horse Attacks
Eve sends light into Alice/Bob’s device and analyzes the reflected light to learn settings. Prevented by:
Optical isolators
Filters
Watchdog detectors
20. Photon Number Splitting (PNS) Attacks
When weak coherent pulses are used, Eve may split off a photon. Decoy state QKD prevents this by randomizing signal intensity.
21. Decoy State Method
Alice sends random decoy pulses to detect PNS attacks by monitoring the yield and QBER of different intensities.
22. Authentication of Classical Channels
The classical communication channel must be authenticated using:
Pre-shared keys
MACs (Message Authentication Codes)
Post-quantum secure digital signatures
23. Post-Quantum Cryptography vs QKD
Feature
Post-Quantum Crypto
QKD
Based on
Hard math problems
Quantum mechanics
Forward secrecy
Not guaranteed
Yes (with ephemeral keys)
Implementation cost
Software-based
Hardware-intensive
24. Regulatory and Practical Considerations
NIST and ETSI are developing QKD standards
Cost and infrastructure limit widespread use
Integration with classical networks is active research
25. Conclusion
QKD security is grounded in the unassailable laws of quantum physics. With defenses against even the most sophisticated attacks — including future quantum adversaries — it offers unmatched cryptographic strength. While practical deployment faces challenges, QKD is already securing some of the world’s most sensitive communications, laying the groundwork for a truly quantum-secure future.
Akbar responded with alacrity and arrived at Ahmadabad and made adequate arrangements for its administration.
1789
New Jersey is 1st state to ratify Bill of Rights
1815
2nd Treaty of Paris: France & her allies agree France pay indemnities after Battle of Waterloo, ending Napoleonic Wars
Russia, Prussia, Austria and England signs Alliance “for the maintenance of peace in Europe” same day as Treaty of Paris.
1902
Gandhiji returned to South Africa at the request of the Indian community and revived the Indians against Anti-Asian Laws.
1914
US State Department starts requiring photographs for passports
1946
Gandhiji starts tour without party.
1967
First Indian made Sounding Rocket ‘Rohini RH75‘ launched into space from Thumba Equatorial Rocket Launching Station.
1969
The Union Home Ministry decides to reserve posts for SC\STs in the public sector undertakings.
1981
Bhaskara-II, India’s second experimental remote sensing satellite, was launched by Russian launch vehicle Intercosmos. This provided experience in building and operating a remote sensing satellite system on an end-to-end basis.
1990
Union Government asks Supreme Court to repeal the $470 million Bhopal Gas settlement order.
The E91 Protocol, proposed by Artur Ekert in 1991, is a quantum key distribution (QKD) scheme based on the principles of quantum entanglement and Bell’s theorem. Unlike BB84, E91 uses entangled particles to ensure security and detect eavesdropping.
2. Historical Context
The E91 protocol introduced the idea that quantum correlations verified by Bell inequality violations could be used to distribute cryptographic keys securely. It connected quantum information theory with the foundations of quantum mechanics.
3. Core Concepts Behind E91
Uses maximally entangled pairs (e.g., Bell states)
Security stems from violation of Bell inequalities
Eavesdropping disrupts the quantum correlations and changes measurement statistics
Bell’s theorem shows that no local hidden variable theory can reproduce the predictions of quantum mechanics. In E91, violation of Bell inequalities implies genuine quantum correlations.
7. Step-by-Step E91 Protocol
A central source emits entangled photon pairs to Alice and Bob.
Each randomly selects a measurement setting (3 each).
They perform measurements on their qubits.
They compare settings publicly.
Use measurement results with matching settings to form the secret key.
Other settings are used to test the CHSH Bell inequality.
8. The Role of Bell Inequalities
Violating Bell inequalities ensures:
The quantum correlations are non-classical
No eavesdropper can simulate them without detection
9. The CHSH Inequality
The Clauser-Horne-Shimony-Holt (CHSH) version is:
\[ |E(a, b) + E(a, b’) + E(a’, b) – E(a’, b’)| \leq 2 \]
Quantum mechanics allows values up to \( 2\sqrt{2} \). Violation signals quantum entanglement.
10. Security Mechanism in E91
Any eavesdropper trying to intercept or replicate the entangled states will:
which have perfect anti-correlations in measurement outcomes.
12. Measurement Settings
Alice uses: \( A_1, A_2, A_3 \) Bob uses: \( B_1, B_2, B_3 \)
Certain combinations are used for:
Bell inequality tests
Key extraction
13. Detecting Eavesdropping
If CHSH inequality is not violated, it means:
Eavesdropper tampered with the entangled states
The communication is not secure
14. Mathematical Framework
Expected correlations are computed as:
\[ E(a, b) = P_{++}(a, b) + P_{–}(a, b) – P_{+-}(a, b) – P_{-+}(a, b) \]
Where \( P_{ij}(a, b) \) is the joint probability of outcomes \( i \) and \( j \).
15. Key Extraction Process
Only a subset of results is used to form the key.
Results corresponding to aligned measurement bases form the sifted key.
16. Classical Communication and Post-Processing
Alice and Bob:
Share basis choices
Estimate error rates
Perform privacy amplification and error correction
17. Advantages of E91
More secure against side-channel attacks
Can be made device-independent
Based on deeper quantum principles
18. Practical Implementations
Photonic entanglement over fiber optics
Free-space optical experiments
Real-time CHSH inequality testing
19. Experimental Demonstrations
E91-like QKD systems have been tested over:
Urban fiber networks
Satellite links (e.g., Micius satellite by China)
Long-distance entanglement distribution (>1200 km)
20. Limitations and Technical Challenges
Entangled sources are complex
Synchronization required between distant parties
Photon loss and detector inefficiencies
21. Device Independence in E91
By violating Bell inequalities, E91 allows for device-independent security, reducing trust requirements in hardware.
22. Application in Quantum Networks
Entanglement-based protocols like E91 are foundational for:
Quantum internet
Entanglement swapping
Quantum repeaters
23. E91 and Future Satellite QKD
E91 is ideal for space-based QKD due to:
Long-range entanglement
Robustness to noise
Fundamental tests of quantum mechanics
24. Comparison Summary with Other Protocols
Protocol
Basis
Uses Entanglement
Device Independent
BB84
Basis choice
No
No
E91
Bell test
Yes
Yes (potentially)
B92
Simplified states
No
No
25. Conclusion
The E91 protocol represents a landmark in quantum communication, showing how the non-locality of entanglement can be harnessed for unbreakable cryptographic key distribution. Though more complex than BB84, its potential for device independence, long-distance QKD, and quantum internet applications make it a central pillar of future secure communications.
Rani Lakshmibai of Jhansi was born in Varanasi, Uttar Pradesh. She was named Manikarnika and was called ‘Manu’.
1838
Keshab Chandra Sen (1838-84), nationalist leader of Bengal, was born in Calcutta. He was one of the first Indians to sow the seeds of secularism in the country. He joined the Brahmo Samaj in 1857 but seperated from it in 1866 and founded Brahma Samaj of India, a radical offshoot of the Adi Brahmo Samaj.
1917
Indira (Pridarshani) Gandhi, the first Indian Lady Prime Minister, was born in Allahabad. She was the only child of Jawharlal Nehru and took active participation in freedom fight by forming “”Vanar Sena”” (a team of young detectives). She lead India in a successful war against Pakistan to seperate East and West Pakistans and establish the nation of Bangladesh.
1962
Nehru asks more US aid as China drives into India in New Delhi.
1969
Brazil’s Pele became the first man to score 1000 goals in competitive football.
1978
Gavaskar gets twin cricket tons for India for second time.
1991
Two national commissions on women set up.
1994
Aishwarya Rai, selected ‘Miss World’ at the age of 21 in the beauty contest held at the 44th convention at Sun City, South Africa .
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.