Home Blog Page 244

BB84 Protocol

0

Table of Contents

  1. Introduction
  2. Historical Context and Significance
  3. Basic Idea Behind BB84
  4. Classical vs Quantum Key Distribution
  5. Qubit Encoding in BB84
  6. Polarization Bases Used
  7. Step-by-Step Procedure
  8. Basis Reconciliation
  9. Sifting Process
  10. Error Rate Estimation
  11. Eavesdropping Detection
  12. Privacy Amplification
  13. Security Proofs
  14. Mathematical Description
  15. Photon Polarization Representations
  16. Real-World Implementations
  17. Device Considerations
  18. Limitations of BB84
  19. Photon Loss and Noise
  20. Countermeasures for Attacks
  21. Side-Channel Attacks
  22. Decoy State Method
  23. Satellite-Based BB84
  24. BB84 vs E91 and Other Protocols
  25. Conclusion

1. Introduction

The BB84 protocol, introduced by Charles Bennett and Gilles Brassard in 1984, is the first and most famous quantum key distribution (QKD) protocol. It enables two parties (traditionally named Alice and Bob) to generate a shared secret key with security guaranteed by quantum mechanics.


2. Historical Context and Significance

BB84 was the first protocol to demonstrate the practical utility of quantum mechanics in secure communication. It paved the way for quantum cryptography, allowing unconditionally secure key exchange.


3. Basic Idea Behind BB84

The key idea is that measuring a quantum system disturbs it, allowing the detection of eavesdropping attempts. This distinguishes BB84 from classical key exchange methods.


4. Classical vs Quantum Key Distribution

AspectClassical Key ExchangeBB84 Protocol
Security basisComputational hardnessPhysical laws
Eavesdropper detectionNoYes
Vulnerability to quantumYesNo

5. Qubit Encoding in BB84

Information is encoded into qubits using two non-orthogonal bases:

  • Rectilinear (Z-basis): \( |0\rangle, |1\rangle \)
  • Diagonal (X-basis): \( |+\rangle = \frac{1}{\sqrt{2}}(|0\rangle + |1\rangle), |-\rangle = \frac{1}{\sqrt{2}}(|0\rangle – |1\rangle) \)

6. Polarization Bases Used

In practical photonic implementations:

  • Horizontal (\( |0\rangle \)) and Vertical (\( |1\rangle \))
  • +45° (\( |+\rangle \)) and -45° (\( |-\rangle \))

7. Step-by-Step Procedure

  1. Alice randomly chooses a bit (0 or 1) and a basis (Z or X), and sends a polarized photon.
  2. Bob measures each photon in a randomly chosen basis (Z or X).
  3. Alice and Bob publicly announce their bases (not their bits).
  4. They keep only the results where their bases matched — this is the sifted key.

8. Basis Reconciliation

Alice and Bob communicate over a classical public channel to compare which bases they used. Only measurements where the bases match are kept.


9. Sifting Process

About 50% of the bits are discarded during the sifting step because Alice and Bob used different bases.


10. Error Rate Estimation

They compare a small portion of the sifted key to estimate the Quantum Bit Error Rate (QBER). If it’s too high (typically >11%), they abort the protocol.


11. Eavesdropping Detection

Eavesdropping causes detectable disturbances in the qubit state due to the no-cloning theorem and measurement-induced collapse.


12. Privacy Amplification

Even if some information is leaked, Alice and Bob can use privacy amplification techniques (e.g., hashing) to compress the key and remove leaked parts.


13. Security Proofs

Security of BB84 has been rigorously proven under both:

  • Individual attacks
  • Collective and coherent attacks

Using tools like entropic uncertainty relations and composable security frameworks.


14. Mathematical Description

Let Alice send \( |\psi\rangle \) randomly chosen from:

\[
|0\rangle, |1\rangle \text{ (Z-basis)} \
|+\rangle = \frac{1}{\sqrt{2}}(|0\rangle + |1\rangle),\quad |-\rangle = \frac{1}{\sqrt{2}}(|0\rangle – |1\rangle) \text{ (X-basis)}
\]

Bob randomly measures in Z or X. If the basis matches, Bob gets the correct bit with high probability.


15. Photon Polarization Representations

Logical BitBasisPolarization
0ZHorizontal
1ZVertical
0X+45°
1X-45°

16. Real-World Implementations

BB84 has been implemented in:

  • Fiber-optic networks (up to 500 km)
  • Free-space optical links
  • Satellite-based QKD (e.g., Micius satellite)

17. Device Considerations

Key hardware components include:

  • Single-photon sources
  • Beam splitters and polarizers
  • Single-photon detectors
  • Timing synchronization systems

18. Limitations of BB84

  • Photon loss in fibers
  • Detector noise
  • Imperfect devices can leak information (side channels)

19. Photon Loss and Noise

Loss leads to lower key generation rates. Noise increases QBER and limits communication distance.


20. Countermeasures for Attacks

  • Decoy state protocols to prevent photon-number splitting attacks
  • Device-independent QKD to account for hardware imperfections

21. Side-Channel Attacks

Examples include:

  • Time-shift attacks
  • Detector blinding
  • Trojan horse attacks

22. Decoy State Method

Introduces dummy photons to monitor for photon-number splitting attacks. Widely adopted in practical BB84 implementations.


23. Satellite-Based BB84

Implemented by China’s Micius satellite, enabling secure quantum communication between ground stations over 1,000+ km distances.


24. BB84 vs E91 and Other Protocols

FeatureBB84E91
EntanglementNot requiredRequired
ImplementationSimplerMore complex
Security BasisBasis mismatchBell inequality

25. Conclusion

The BB84 protocol remains a cornerstone of quantum cryptography. Its blend of theoretical elegance and practical implementability makes it the de facto standard in QKD. With enhancements like decoy states and satellite delivery, BB84 is poised to secure communications in the emerging quantum age.


.

Today in History – 18 November

0
today in history 18 november

1477

First English dated printed book “Dictes & Sayengis of the Phylosophers” by William Caxton

1727

Maharaja Jai Singh-II of Amber laid the stone of Jaipur City. Vidyadhar Chakravarty of Bengal was the architect of the first planned city in India.

1772

Madhav Rao Peshwa (the 4th peshwa ruler) died at the age of 28. Narayanrao succeeded him.

1839

Nainital was discovered by P. Barron, an European sugar merchant and an enthusiastic hunter from Rosa, near Shahjahanpur.

1865

Mark Twain publishes “Celebrated Jumping Frog of Calaveras County”

1911

Free primary school education introduced.

1916

General Douglas Haig finally calls off 1st Battle of the Somme (WWI) – over 1 million killed or wounded

1937

1,100 prisoners freed after appeal by Gandhi, his first political act in year.

1974

Telex Service started between India and Pakistan.

1999

Sonia Gandhi pleads the President on Nalini’s case.

Quantum Cryptography Basics

0

Table of Contents

  1. Introduction
  2. What Is Quantum Cryptography?
  3. Classical Cryptography: A Brief Recap
  4. Quantum vs Classical Security
  5. Core Principles Behind Quantum Cryptography
  6. Quantum Superposition and Measurement
  7. The Role of Entanglement
  8. Heisenberg Uncertainty and Security
  9. No-Cloning Theorem in Cryptography
  10. Key Distribution vs Encryption
  11. Quantum Key Distribution (QKD)
  12. The BB84 Protocol
  13. The E91 Protocol
  14. Differences Between BB84 and E91
  15. Security of QKD
  16. Error Rates and Eavesdropping Detection
  17. Privacy Amplification
  18. Authentication in Quantum Channels
  19. Post-Quantum Cryptography vs Quantum Cryptography
  20. Quantum Cryptographic Devices
  21. Experimental Demonstrations
  22. Current Challenges and Limitations
  23. Integration with Classical Systems
  24. Applications and Future Directions
  25. Conclusion

1. Introduction

Quantum cryptography uses the laws of quantum mechanics to enable secure communication. It guarantees unconditional security, something impossible with classical methods relying on computational assumptions.


2. What Is Quantum Cryptography?

It is the science of using quantum properties (like superposition and entanglement) to:

  • Detect eavesdropping
  • Securely distribute cryptographic keys
  • Build fundamentally secure systems

3. Classical Cryptography: A Brief Recap

Classical cryptography relies on:

  • RSA (factoring-based)
  • ECC (elliptic curves)
  • AES (symmetric key)

Their security is based on computational difficulty, not physics.


4. Quantum vs Classical Security

FeatureClassical CryptoQuantum Crypto
Based onComputational hardnessLaws of physics
Vulnerable to quantumYes (e.g., RSA, ECC)No
Eavesdropping detectionNoYes

5. Core Principles Behind Quantum Cryptography

Quantum cryptography is built on:

  • Superposition
  • Entanglement
  • Measurement disturbance
  • No-cloning theorem

6. Quantum Superposition and Measurement

Measuring a quantum state collapses it:

\[
|\psi\rangle = \alpha|0\rangle + \beta|1\rangle \Rightarrow \text{collapse to } |0\rangle \text{ or } |1\rangle
\]

This property is exploited to detect eavesdropping.


7. The Role of Entanglement

Entanglement creates strong correlations between distant particles. These correlations can be used to:

  • Verify secure channels
  • Detect tampering

8. Heisenberg Uncertainty and Security

Uncertainty principle prevents simultaneous knowledge of complementary observables:

\[
\Delta x \cdot \Delta p \geq \frac{\hbar}{2}
\]

This ensures tampering can’t go undetected.


9. No-Cloning Theorem in Cryptography

No one can copy unknown quantum states:

\[
|\psi\rangle \nrightarrow |\psi\rangle \otimes |\psi\rangle
\]

This guarantees eavesdroppers cannot clone the transmitted qubits.


10. Key Distribution vs Encryption

Quantum cryptography mostly focuses on Quantum Key Distribution (QKD), not encryption itself. Encryption is done classically using the secret key.


11. Quantum Key Distribution (QKD)

QKD allows two parties to:

  • Establish a shared secret key
  • Detect any third-party attempts to observe the exchange
  • Use that key in classical encryption (e.g., one-time pad)

12. The BB84 Protocol

Proposed by Bennett and Brassard in 1984, it uses:

  • Polarization states in two bases: rectilinear and diagonal
  • Random bit and basis selection

Steps:

  1. Alice sends qubits encoded in random bases
  2. Bob measures in random bases
  3. They compare bases and keep matching bits

13. The E91 Protocol

Proposed by Ekert in 1991:

  • Uses entangled particles
  • Verifies quantum correlations using Bell inequality tests
  • Offers security proofs based on entanglement

14. Differences Between BB84 and E91

FeatureBB84E91
UsesPolarized qubitsEntangled pairs
SecurityBasis mismatchBell inequality violation
HardwareSimplerMore complex

15. Security of QKD

QKD is provably secure against all computational attacks, even from quantum computers, as long as physical assumptions hold.


16. Error Rates and Eavesdropping Detection

Eavesdropping introduces errors. If error rate > threshold (usually ~11%), communication is aborted.


17. Privacy Amplification

After key generation, Alice and Bob perform:

  • Error correction
  • Privacy amplification to remove eavesdropper’s partial knowledge

18. Authentication in Quantum Channels

QKD requires authenticated classical channels to prevent man-in-the-middle attacks. Authentication is done using classical cryptographic hashes or pre-shared keys.


19. Post-Quantum Cryptography vs Quantum Cryptography

  • Post-quantum: Classical protocols safe from quantum attacks
  • Quantum cryptography: Uses quantum mechanics for security

They are complementary, not exclusive.


20. Quantum Cryptographic Devices

  • Single-photon sources
  • Polarization filters
  • Avalanche photodiodes
  • Quantum random number generators (QRNGs)

21. Experimental Demonstrations

QKD has been demonstrated over:

  • Optical fibers (>500 km)
  • Free-space and satellite links (e.g., China’s Micius satellite)

22. Current Challenges and Limitations

  • Cost and complexity of equipment
  • Photon loss and noise in channels
  • Scalability to large networks
  • Authentication and key management

23. Integration with Classical Systems

Quantum keys are often used with:

  • Classical one-time pads
  • AES encryption with frequent key refresh
  • Hybrid classical-quantum secure systems

24. Applications and Future Directions

  • Secure government and military communication
  • Banking and finance
  • Long-distance secure communication via quantum repeaters
  • Building a quantum internet

25. Conclusion

Quantum cryptography marks a revolutionary step in secure communication. By leveraging the fundamental principles of quantum mechanics, it provides security guarantees that classical systems cannot match. As technology matures, QKD and related techniques will play a crucial role in safeguarding data in the quantum era.


.

Today in History – 17 November

0
today in history 17 november

1525

James Todd, researcher and writer of Rajput history, passed away.

1857

Sir Colin Campbell, British Army Officer, managed to supress Indian Mutiny sepoys at Lucknow.

1921

Princes of Wales came to India.

1928

Lala Lajpat Rai died in Lahore after being seriously wounded in the barbarous lathi charge of 30th October. He is referred as the “”Lion of Punjab”” or “”Punjab Kesari”” and is remembered as freedom fighter, nationalist, educationist, lawyer, thinker, writer, social reformer, orator and a passionate fighter for the revival of the ancient Indian culture.

1932

The Third Round Table Conference began in London. It was not attended by the Congress as the real Indian participation in the making of the constitution was negligible. Since Gandhi was in prison because of his civil disobedience movement he could not attend it either. This conference ended on 24th November 1932 without achieving anything.

1947

Rajendra Prasad elected the President of Indian National Congress.

1966

India’s beauty queen Rita Faria was crowned as ‘Miss World’ in World Beauty contest held in London. She was a medical student.

Quantum Cloning (Impossibility)

0

Table of Contents

  1. Introduction
  2. What Is Quantum Cloning?
  3. The No-Cloning Theorem
  4. Historical Background
  5. Why Is Cloning Important in Classical Computing?
  6. Classical vs Quantum Information Duplication
  7. Statement of the No-Cloning Theorem
  8. Mathematical Proof of No-Cloning
  9. Linear vs Nonlinear Evolution
  10. Implications for Quantum Mechanics
  11. Examples of Cloning Attempts and Failures
  12. Relation to the Uncertainty Principle
  13. Consequences for Quantum Communication
  14. Role in Quantum Cryptography
  15. No-Cloning and the Security of QKD
  16. Cloning and Quantum Teleportation
  17. Approximate Quantum Cloning
  18. Universal Quantum Cloning Machines
  19. Probabilistic Cloning
  20. Quantum State Estimation vs Cloning
  21. No-Cloning and Quantum Computing Architecture
  22. Connection to the No-Broadcasting Theorem
  23. Experimental Tests of No-Cloning
  24. No-Cloning in Relativistic and Field-Theoretic Contexts
  25. Conclusion

1. Introduction

Quantum cloning refers to the hypothetical ability to make an exact copy of an arbitrary unknown quantum state. Unlike classical information, which can be copied freely, quantum mechanics imposes a strict limit on cloning through the No-Cloning Theorem.


2. What Is Quantum Cloning?

It is the process of duplicating an unknown quantum state:

\[
|\psi\rangle \rightarrow |\psi\rangle \otimes |\psi\rangle
\]

This transformation is not allowed for general quantum states.


3. The No-Cloning Theorem

This theorem states that no unitary operation or physical process can clone an arbitrary unknown quantum state without destroying it or altering it probabilistically.


4. Historical Background

The No-Cloning Theorem was formally proven in 1982 by Wootters and Zurek, and independently by Dieks. It resolved longstanding paradoxes involving measurement, communication, and relativistic signaling.


5. Why Is Cloning Important in Classical Computing?

Classical information:

  • Can be copied at will
  • Supports fanout (replication) in circuits
  • Enables redundancy and backups

Quantum systems violate this intuition.


6. Classical vs Quantum Information Duplication

FeatureClassical BitsQubits
Copying allowed✗ (in general)
Measurement destroys state
Can be clonedOnly in special cases

7. Statement of the No-Cloning Theorem

For any two distinct non-orthogonal quantum states \( |\psi\rangle \) and \( |\phi\rangle \), there exists no unitary \( U \) such that:

\[
U(|\psi\rangle \otimes |0\rangle) = |\psi\rangle \otimes |\psi\rangle \
U(|\phi\rangle \otimes |0\rangle) = |\phi\rangle \otimes |\phi\rangle
\]


8. Mathematical Proof of No-Cloning

Assume \( U \) is a universal cloner:

\[
U|\psi\rangle|0\rangle = |\psi\rangle|\psi\rangle \
U|\phi\rangle|0\rangle = |\phi\rangle|\phi\rangle
\]

Take inner product:

\[
\langle\psi|\phi\rangle = (\langle\psi|\phi\rangle)^2
\Rightarrow \langle\psi|\phi\rangle = 0 \text{ or } 1
\]

Thus, only orthogonal or identical states can be cloned.


9. Linear vs Nonlinear Evolution

The linearity of quantum mechanics implies superposition is preserved. Cloning would violate linearity for arbitrary inputs.


10. Implications for Quantum Mechanics

  • Measurement disturbs the system
  • Cloning would allow faster-than-light signaling
  • No-cloning preserves unitarity and causality

11. Examples of Cloning Attempts and Failures

Using a CNOT gate works for \( |0\rangle, |1\rangle \) (computational basis) but fails for arbitrary superpositions.


12. Relation to the Uncertainty Principle

The inability to clone arbitrary quantum states is consistent with the uncertainty principle: complete knowledge of a quantum state cannot be obtained without disturbance.


13. Consequences for Quantum Communication

  • States cannot be copied and forwarded like classical signals
  • Entanglement and teleportation must be used for state transfer

14. Role in Quantum Cryptography

Security of QKD protocols (e.g., BB84) relies on no-cloning. An eavesdropper cannot copy the quantum key and measure it later without detection.


15. No-Cloning and the Security of QKD

Attempted cloning introduces detectable noise, causing the legitimate parties to abort the key generation process.


16. Cloning and Quantum Teleportation

Teleportation does not violate no-cloning because:

  • Original state is destroyed by measurement
  • No information is transmitted faster than light

17. Approximate Quantum Cloning

Bučkovic, Buzek-Hillery and others developed approximate cloning machines that create imperfect copies with high fidelity:

\[
F < 1
\]


18. Universal Quantum Cloning Machines

Applies the same process to any input state with the same fidelity. Example: Buzek-Hillery machine achieves \( F = \frac{5}{6} \) for qubits.


19. Probabilistic Cloning

Allows perfect cloning with nonzero probability, but only for linearly independent states. Otherwise, the success probability is limited.


20. Quantum State Estimation vs Cloning

Estimation allows inference of an unknown state using measurements on many identical copies, but it does not reconstruct the state itself.


21. No-Cloning and Quantum Computing Architecture

Quantum circuits must route, not duplicate, quantum data. Fan-out must be reinterpreted using entanglement or teleportation-based logic.


22. Connection to the No-Broadcasting Theorem

The no-broadcasting theorem generalizes no-cloning to mixed states: they cannot be duplicated into identical marginals over multiple systems.


23. Experimental Tests of No-Cloning

No experiments have observed violations. Tests have been done using:

  • Optical setups
  • Ion traps
  • NMR systems

24. No-Cloning in Relativistic and Field-Theoretic Contexts

Preserves causality across spacelike-separated regions. Ensures compliance with special relativity and field theory locality.


25. Conclusion

The No-Cloning Theorem is a foundational result that enforces the uniqueness of quantum information. It preserves the security of quantum communication, shapes quantum circuit architecture, and delineates quantum from classical systems. While approximate and probabilistic cloning offer partial solutions, exact universal cloning remains physically impossible under the rules of quantum mechanics.


.