Quantum
cryptography
Max
Braun
1.
Introduction
2.
Quantum
cryptography
3.
Quantum
mechanics
4.
Usage
Public‐key
cryptography
relies

on
P≠NP
(unproven)
and
can
be

broken
by
quantum
computers.
Ideal
quantum
cryptography
is

provably
secure
based
on

quantum
mechanics.
1.
Introduction
- History: Stephen Wiesner ca. 1970; Charles Bennett, Gilles Brassard 1984
- neglecting engineering problems
2.
Quantum
cryptography:
Vernam
cipher
Strategy
of
QC
BB84
Attacks
Alice
sends
bits
to
Bob.
Eve
is
listening.
Vernam
cipher
0
0
1
1
0
1
1
0
1
0
1the
plaintext:
0
1
1
1
0
0
1
0
0
1
1the
pad:
0
1
0
0
0
1
0
0
1
1
0the
ciphertext:
XOR
=
Vernam
cipher
0
0
1
1
0
1
1
0
1
0
1the
plaintext:
0
1
1
1
0
0
1
0
0
1
1the
pad:
XOR
=
0
1
0
0
0
1
0
0
1
1
0the
ciphertext:
- also "one-time-pad"
- provably secure, i.e. ciphertext provides no information about the plaintext (no cryptanalysis possible)
- problem: key distribution -> quantum cryptography generates a secret key
Vernam
cipher
0
0
1
1
0
1
1
0
1
0
1the
plaintext:
0
1
1
1
0
0
1
0
0
1
1the
pad:
XOR
=
0
1
0
0
0
1
0
0
1
1
0the
ciphertext:
secure
- also "one-time-pad"
- provably secure, i.e. ciphertext provides no information about the plaintext (no cryptanalysis possible)
- problem: key distribution -> quantum cryptography generates a secret key
Vernam
cipher
0
0
1
1
0
1
1
0
1
0
1the
plaintext:
0
1
1
1
0
0
1
0
0
1
1the
pad:
XOR
=
0
1
0
0
0
1
0
0
1
1
0the
ciphertext:
secure
truly
random
- also "one-time-pad"
- provably secure, i.e. ciphertext provides no information about the plaintext (no cryptanalysis possible)
- problem: key distribution -> quantum cryptography generates a secret key
Vernam
cipher
0
0
1
1
0
1
1
0
1
0
1the
plaintext:
0
1
1
1
0
0
1
0
0
1
1the
pad:
XOR
=
0
1
0
0
0
1
0
0
1
1
0the
ciphertext:
used
once
secure
truly
random
- also "one-time-pad"
- provably secure, i.e. ciphertext provides no information about the plaintext (no cryptanalysis possible)
- problem: key distribution -> quantum cryptography generates a secret key
Strategy
of
QC
1
0 

↕


↕


✕

✕


↕

↕
polarizations
orientations
A
photon's
polarization
prepared
in

one
orientation
and
measured
in
the

other
is
undetermined.
- later: more
general
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
BB84
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
truly
random
BB84
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
truly
random
truly
random
BB84
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
truly
random
truly
random
truly
random
BB84
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
truly
random
truly
random
truly
random
BB84
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1
Alice's
bases:
Alice's
states:
Alice's
key:

✕
✕
✕
✕
✕
✕
✕
✕

 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states:
1
1
1
0
0
1
0
1
1
0
1
0
0
0
0
1Bob's
key:

↕
↕
↕
↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
truly
random
truly
random
truly
random
keep
50%
BB84
1
1
1
0
0
1
0
1
1
1
1
0
0
0
1
1
Alice's
key:
Eve's
states:
Bob's
key:


↕
↕
↕
↕
↕
↕
↕ ↕
Alice's
states: 
 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states: 

↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
↕
↕
↕
BB84
- Alice's and Eve's bases omitted
- probability tree
- also: transmission error
1
1
1
0
0
1
0
1
1
1
1
0
0
0
1
1
Alice's
key:
Eve's
states:
Bob's
key:


↕
↕
↕
↕
↕
↕
↕ ↕
Alice's
states: 
 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states: 

↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
↕
↕
↕
BB84
- Alice's and Eve's bases omitted
- probability tree
- also: transmission error
1
1
1
0
0
1
0
1
1
1
1
0
0
0
1
1
Alice's
key:
Eve's
states:
Bob's
key:


↕
↕
↕
↕
↕
↕
↕ ↕
25%
error
Alice's
states: 
 ↕
↕
↕
↕
↕
↕
↕ ↕
Bob's
bases:
Bob's
states: 

↕
↕
↕
↕
↕

✕✕ ✕
✕
✕
✕ ✕ ✕
↕
↕
↕
BB84
- Alice's and Eve's bases omitted
- probability tree
- also: transmission error
Attacks
eavesdropping
➙
man‐in‐the‐middle
➙
multiple
photons
➙
light
pulse
➙
bad
randomness
➙
introduces
error
use
EPR
work
thoroughly
work
thoroughly
work
thoroughly
- quantum phenomena
- "strong" man-in-the-middle
- EPR or: Lamport signatures (believed to be secure against quantum computers)
Attacks
eavesdropping
➙
man‐in‐the‐middle
➙
multiple
photons
➙
light
pulse
➙
bad
randomness
➙
introduces
error
use
EPR
work
thoroughly
work
thoroughly
work
thoroughly
no
cloning
- quantum phenomena
- "strong" man-in-the-middle
- EPR or: Lamport signatures (believed to be secure against quantum computers)
Attacks
eavesdropping
➙
man‐in‐the‐middle
➙
multiple
photons
➙
light
pulse
➙
bad
randomness
➙
introduces
error
use
EPR
work
thoroughly
work
thoroughly
work
thoroughly use
QM
no
cloning
- quantum phenomena
- "strong" man-in-the-middle
- EPR or: Lamport signatures (believed to be secure against quantum computers)
Hilbert
spaces
Unitary
operators
The
no‐cloning
theorem
Measurement
Indistinguishability
of

non‐orthogonal
states
QC
Revisited
3.
Quantum
mechanics:
Hilbert
spaces
Quantum
states
are
described
by

unit
vectors
in
a
complex
vector

space
with
an
inner
product.
a
vector:
an
inner
product:
orthogonality: ψ|φ = 0
the
norm: |ψ = ψ|ψ
ψ|φ
|ψ
Hilbert
spaces
{|0 , |1 }
We
consider
the
computational
basis.
a
vector:
an
inner
product:
orthogonality:
the
norm:
|ψ = α|0 + β|1
ψ|φ = α∗
α + β∗
β
|ψ = |α|2 + |β|2
α∗
α + β∗
β = 0
->
blackboard
0|1 =
1
0
0
1
= 0
0|+ =
1
0
1√
2
1√
2
=
1
√
2
= 0
|0 = 1 · |0 + 0 · |1 |1 = 0 · |0 + 1 · |1
|+ =
|0 + |1
√
2
|− =
|0 − |1
√
2
|− =
1
√
2
2
+ −
1
√
2
2
=
1
2
+
1
2
= 1
blackboard:
examples
Hilbert
spaces
the
tensor
product:
the
natural
inner
product
here:
ψ ⊗ φ|ψ ⊗ φ = ψ|ψ φ|φ
|ψ ⊗ |φ ≡ |ψφ
->
blackboard
{|0 , |1 }
{|00 , |01 , |10 , |11 }
11|01 = 1|0 1|1 = 0 · 1 = 0
blackboard:
examples
an
operator:
its
Hermitian
adjoint:
a
unitary
operator:
Unitary
operators
U†
U = I
U†
ψ|φ = ψ|Uφ
Unitary
operators
describe
the
evolution

of
closed
quantum
systems.
= αU|ψ + βU|φ
U(α|ψ + β|φ )
->
blackboard
X|0 ≡
0 1
1 0
1
0
=
0
1
≡ |1
Y †
Y ≡
0 i∗
−i∗
0
0 −i
i 0
=
1 0
0 1
≡ I
blackboard:
examples
Unitary
operators
Unitary
operators

preserve
inner
products.
Uψ|Uφ = ψ|U†
U|φ
= ψ|I|φ = ψ|φ
The
no‐cloning
theorem
It
is
impossible
to
copy
an
arbitrary

unknown
quantum
state.
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ ⊗ s|φ ⊗ s = ψ ⊗ ψ|φ ⊗ φ
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ ⊗ s|φ ⊗ s = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ|φ s|s = ψ|φ ψ|φ
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ ⊗ s|φ ⊗ s = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ|φ s|s = ψ|φ ψ|φ
⇒ ψ|φ = ψ|φ 2
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ ⊗ s|φ ⊗ s = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ|φ s|s = ψ|φ ψ|φ
⇒ ψ|φ = ψ|φ 2
⇒ ψ|φ = 1 ∨ ψ|φ = 0
- cloning possible if all states are equal or
orthogonal
The
no‐cloning
theorem
U(|ψ ⊗ |s ) = |ψ ⊗ |ψ
U(|φ ⊗ |s ) = |φ ⊗ |φ
contra-
diction
⇒



U(ψ ⊗ s)|U(φ ⊗ s) = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ ⊗ s|φ ⊗ s = ψ ⊗ ψ|φ ⊗ φ
⇒ ψ|φ s|s = ψ|φ ψ|φ
⇒ ψ|φ = ψ|φ 2
⇒ ψ|φ = 1 ∨ ψ|φ = 0
- cloning possible if all states are equal or
orthogonal
|ψ = α|0 + β|1
measured
state
with
probability |α|2
|β|2
|0 |1
We
cannot
determine
an
arbitrary
state.
Measurement
changes
the
state.
Measurement
- for unit vectors, probabilities sum to one
Measurement
General
measurements
are
described
by

a
collection
of
measurement
operators

on
the
state
space.
{Mi}
There
is
a
probability
for
each
result.
p(i) = ψ|M†
i Mi|ψ
Measurement
The
completeness
equation
expresses

that
the
probabilities
sum
to
one.
ψ| i M†
i Mi|ψ = ψ|I|ψ = ψ|ψ = 1
⇒ i p(i) = i ψ|M†
i Mi|ψ =
i M†
i Mi = I
Indistinguishability
of

non‐orthogonal
states
There
is
no
measurement
to

distinguish
between
any
non‐
orthogonal
quantum
states.
|ψ1 |ψ2 ψ1|ψ2 = 0
Ei := f(j)=i M†
j Mj
Indistinguishability
of

non‐orthogonal
states
ψ1|E1|ψ1 = 1 ψ2|E2|ψ2 = 1
Indistinguishability
of

non‐orthogonal
states
ψ1|E1|ψ1 = 1 ψ2|E2|ψ2 = 1
i ψ1|Ei|ψ1 = ψ1|I|ψ1 = ψ1|ψ1 = 1
Indistinguishability
of

non‐orthogonal
states
ψ1|E1|ψ1 = 1 ψ2|E2|ψ2 = 1
⇒ ψ1|E2|ψ1 = 0 ⇒
√
E2|ψ1 = 0
i ψ1|Ei|ψ1 = ψ1|I|ψ1 = ψ1|ψ1 = 1
Indistinguishability
of

non‐orthogonal
states
ψ1|E1|ψ1 = 1 ψ2|E2|ψ2 = 1
⇒ ψ1|E2|ψ1 = 0 ⇒
√
E2|ψ1 = 0
|ψ2 = α|ψ1 + β|φ |β| < 1
i ψ1|Ei|ψ1 = ψ1|I|ψ1 = ψ1|ψ1 = 1
Indistinguishability
of

non‐orthogonal
states
ψ1|E1|ψ1 = 1 ψ2|E2|ψ2 = 1
⇒ ψ1|E2|ψ1 = 0 ⇒
√
E2|ψ1 = 0
|ψ2 = α|ψ1 + β|φ |β| < 1
i ψ1|Ei|ψ1 = ψ1|I|ψ1 = ψ1|ψ1 = 1
⇒
√
E2|ψ2 = α
√
E2|ψ1 + β
√
E2|φ
Indistinguishability
of

non‐orthogonal
states
ψ2|E2|ψ2
Indistinguishability
of

non‐orthogonal
states
ψ2|E2|ψ2 = α∗
α ψ1|E2|ψ1 + α∗
β ψ1|E2|φ
+β∗
α φ|E2|ψ1 + β∗
β φ|E2|φ
Indistinguishability
of

non‐orthogonal
states
= |β|2
φ|E2|φ
ψ2|E2|ψ2 = α∗
α ψ1|E2|ψ1 + α∗
β ψ1|E2|φ
+β∗
α φ|E2|ψ1 + β∗
β φ|E2|φ
Indistinguishability
of

non‐orthogonal
states
= |β|2
φ|E2|φ
≤ |β|2
i φ|Ei|φ = |β|2
φ|I|φ
ψ2|E2|ψ2 = α∗
α ψ1|E2|ψ1 + α∗
β ψ1|E2|φ
+β∗
α φ|E2|ψ1 + β∗
β φ|E2|φ
Indistinguishability
of

non‐orthogonal
states
= |β|2
φ|E2|φ
≤ |β|2
i φ|Ei|φ = |β|2
φ|I|φ
= |β|2
φ|φ = |β|2
< 1
ψ2|E2|ψ2 = α∗
α ψ1|E2|ψ1 + α∗
β ψ1|E2|φ
+β∗
α φ|E2|ψ1 + β∗
β φ|E2|φ
Indistinguishability
of

non‐orthogonal
states
= |β|2
φ|E2|φ
≤ |β|2
i φ|Ei|φ = |β|2
φ|I|φ
= |β|2
φ|φ = |β|2
< 1 contra-
diction
ψ2|E2|ψ2 = α∗
α ψ1|E2|ψ1 + α∗
β ψ1|E2|φ
+β∗
α φ|E2|ψ1 + β∗
β φ|E2|φ
QC
Revisited
1
0 

↕

↕


✕

✕


↕

↕
states
bases
A
state
prepared
in
one
basis
and

measured
in
a
non‐orthogonal
one

is
undetermined.
- remember: photons polarized in different orientations
- now: vectors in non-orthogonal bases
QC
Revisited
states
bases
0
1
{|+ , |− }{|0 , |1 }
|0
|1
|+
|−
|+ :=
|0 + |1
√
2
|− :=
|0 − |1
√
2
- draw in
2D
QC
Revisited
Measuring
states
in
a
non‐orthogonal
basis:
QC
Revisited
|− =
|0 − |1
√
2
Measuring
states
in
a
non‐orthogonal
basis:
QC
Revisited
|− =
1
√
2
|0 + −
1
√
2
|1
|− =
|0 − |1
√
2
Measuring
states
in
a
non‐orthogonal
basis:
QC
Revisited
|− =
1
√
2
|0 + −
1
√
2
|1
|− =
|0 − |1
√
2
Measuring
states
in
a
non‐orthogonal
basis:
p(0|−) =
1
√
2
2
=
1
2
QC
Revisited
|− =
1
√
2
|0 + −
1
√
2
|1
|− =
|0 − |1
√
2
Measuring
states
in
a
non‐orthogonal
basis:
p(0|−) =
1
√
2
2
=
1
2
= −
1
√
2
2
= p(1|−)
4.
Usage
Using
optical
fiber
(USA):
148.7
km
Through
the
air
(EU):
144
km
SECOQC
- state of the art
- several companies, lots of research
- big EU project
Quantum Cryptography

Quantum Cryptography