Professional Documents
Culture Documents
Chaotic Quantum Crypto
Chaotic Quantum Crypto
Chaotic Quantum Crypto
ICETE 2010/SECRYPT
Athens, GR,
July 26-28
26 28, 2010
1. INTRODUCTION
2. QUANTUM CRYPTOGRAPHY BASICS
3. K05 & K08: ADVANCED PROTOCOL S for QC
4. CHAOS FUNCTIONS
5. CHAOTIC QUANTUM CRYPTOGRAPHY
6. CONCLUSION
The U.S.
Th U S National
N ti l Security
S it Agency
A (NSA) has
h recommended d d a sett off advanced
d d
cryptographic algorithms, known as Suite B. All algorithms in the Suite B are
consistent with the National Institute of Standards and Technology (NIST)
p
publications.
The public key protocols in Suite B are:
• For key agreement: The Elliptic Curve Menezes-Qu-Vanstone (ECMQV) and
the Elliptic Curve Diffie-Hellman
Diffie Hellman (ECDH)
• For authentication: The Elliptic Curve Digital Signature Algorithm (ECDSA)
• For data encryption: The Advanced Encryption Standard (AES), and
• For hashing: The Secure Hash Algorithm (SHA).
However,
vulnerabilities or insecurities are not absent from many algorithms,
which one by one are broken; for example, the SHA-1 was broken by a
Chinese research team (announced on March 1. 2005, The Australian).
Optical fiber is the medium that currently supports many Tbps of
aggregate data traffic per single fiber using dense wavelength division
multiplexing (DWDM)+; a cable of several hundred fibers supports many
Pbps of aggregate traffic.
traffic
Part of this humongous data is sensitive and vulnerable. And Mr. Evan,
the bad actor, knows how to do it!
Quantum Cryptography
Superposition of states -101
Again, a qubit is not defined in one state or the other but in the
superposition of the two, which is a radical deviation from classical
mechanics.
Based on this:
Quantum cryptography (QC) claims that a secret key can be established
with a sophisticated scheme that is immune to eavesdropping. This secret key
is used for encryption/decryption of messages.
The protocol that is used to establish the secret key is known as quantum key
distribution (QKD). The efficiency of QKD may also deduct the presence or
absence of an eavesdropper.
All possible states of polarization (SoP) of a single photon is better visualized
if we consider the Poincaré sphere; on its surface each point S represents a
particular SoP.
Each SoP is defined in terms of an azimuth α and an ellipticity ε as:
| 1+cos(2α)cos(2ε) |
SOP = | |
|
|cos(2α)sin(2ε)+isin(2α)
(2 ) i (2 ) i i (2 ) |
(Kartalopoulos, 2005)
1. INTRODUCTION
2. QUANTUM CRYPTOGRAPHY BASICS
3. K05 & K08: ADVANCED PROTOCOL S for QC
4. CHAOS FUNCTIONS
5. CHAOTIC QUANTUM CRYPTOGRAPHY
6. CONCLUSION
Alice determines a random association of polarization states and logic states “1” and
“0”.
Bob, uses a random polarization filter to pass the arriving polarized photons. Some
successfully pass and some do not.
Bob, not knowing the successes and failures, tells Alice the sequence of polarization
directions he used.
Alice passes her original “1”1 and “0”0 sequence and determines the ones passing
through Bob’s filter. She then tells Bob which polarizations were successful; this new
sequence determines the quantum key.
© Copyright 2010 S.V. Kartalopoulos
The Quantum Network
Encrypted Traffic
Private via Internet Private
Enclave Enclave
Fiber
(point-to-point,
or mesh!) QKD
QKD
Endpoint
p p
Endpoint
K08: An m‐ary generalized protocol
The K08 subdivides the Poincare sphere in 2m areas to define a m-ary quantum
system, and a {m times n} test key length for n correct polarization states.
That is, the K08 uses an alphabet of 2m symbols.
For example: for m=2, K08 defines four areas of polarizations on the Poincaré
sphere and four symbols in binary notation
(11, 01, 10, 00} or in symbolic {A, B, C, D}.
Each area corresponds to one of the four.
four
This example represents a quantum
quaternary protocol, and polarizations in
the defined areas are uniquely associated
with
i h one off the
h four
f symbols.
b l
Based on this, with n correct polarization
states between Alice and Bob a key length
f the
for th equivalent
i l t bit string
t i n222 is
i established.
t bli h d
In a more general case m areas are defined. (Kartalopoulos, SCN, 2008)
m
In this case, a n cipher key length corresponds to a n2 equivalent (binary) string
or to a (n times m) symbolic alphabet.
Alternatively, for a fixed length message, the key length is greatly compressed.
1. INTRODUCTION
2. QUANTUM CRYPTOGRAPHY BASICS
3. K05 & K08: ADVANCED PROTOCOL S for QC
4. CHAOS FUNCTIONS
5. CHAOTIC QUANTUM CRYPTOGRAPHY
6. CONCLUSION
In this part:
• We review chaos functions as RNGs.
• We describe chaos functions in quantum key establishment, and
• We describe a method that requires substantially fewer random bits in the
stream to establish the key and it is also faster.
Scatter plot
3.7
TABLE 1
For A=2 and IC X=0.1 Xn is monotonic. For A=3, it oscillates between
two prongs, and for A=4
A 4 it is chaotic.
Scatter plots for A=2, 3 and 4. Graphs of iteration values for A=2, 3 and 4.
However, because the random process can be repeated for the same
function and for the same initial conditions,
random numbers are selectable and reproducible.
It is this selectability
y and reproducibility
y that add value to cryptographic
y g
processes, such as QC.
Thus, if both ends of a channel know the function parameters, the initial
conditions and the starting/ending points of the random sequence then they
conditions,
can independently generate the very same random numbers.
Thus, the random numbers generated with a chaos function can be one
of the secret keys of a cryptographic algorithm.
During any QKD session, Alice and Bob may change (dynamically) to
different chaos function parameters and initial conditions. This adds
immenselyy to the securityy of the method.
Since both ends use the same chaotic process, the next key
establishment:
1. INTRODUCTION
2. K05 & K08: ADVANCED PROTOCOL S for QC
3. CHAOS FUNCTIONS
4. CHAOTIC QUANTUM CRYPTOGRAPHY
5. CONCLUSION
We reviewed chaos functions and the conditions that enter the chaotic
regime.
W fi ll integrated
We finally i d these
h concepts and d developed
d l d a quantum key k
establishment process that incorporates chaos functions so that the bit
stream necessary to establish a key is much shorter and much faster. Thus,
we believe that we have made a step closer to the “holy holy grail
grail” in
cryptography.
The End…
Questions?