1 of 37

Key Distribution

Alice

Bob

Goal: agree on a uniformly random secret key

. . .

2 of 37

Key Distribution

Alice

Bob

Once Alice and Bob have agreed on a secret key:

s = 01011

s = 01011

m = 11100

 

=

3 of 37

Key Distribution

Alice

Bob

s = 01011

s = 01011

m = 11100

 

= 1

Once Alice and Bob have agreed on a secret key:

4 of 37

Key Distribution

Alice

Bob

s = 01011

s = 01011

m = 11100

 

= 10

Once Alice and Bob have agreed on a secret key:

5 of 37

Key Distribution

Alice

Bob

s = 01011

s = 01011

m = 11100

 

= 101

Once Alice and Bob have agreed on a secret key:

6 of 37

Key Distribution

Alice

Bob

s = 01011

s = 01011

m = 11100

 

= 1011

Once Alice and Bob have agreed on a secret key:

7 of 37

Key Distribution

Alice

Bob

s = 01011

s = 01011

m = 11100

 

= 10111

Once Alice and Bob have agreed on a secret key:

8 of 37

Key Distribution

Alice

Bob

s = 01011

s = 01011

m = 11100

c = 10111

c = 10111

 

= 10100

 

= 10111

 

For all m, this ciphertext is uniformly distributed from the point of view of an eavesdropper who doesn’t know s.

(i.e. when s is uniformly random)

So, IF there were a way for Alice and Bob to perform “key distribution” (i.e. agree on a uniformly random secret key only known by the two of them), then they would be able to communicate with “unconditional” security!

Once Alice and Bob have agreed on a secret key:

9 of 37

Key Distribution

Alice

Bob

s = 01011

s = 01011

m = 11100

c = 10111

c = 10111

 

= 10100

 

= 10111

 

For all m, this ciphertext is uniformly distributed from the point of view of an eavesdropper who doesn’t know s.

(i.e. when s is uniformly random)

So, IF there were a way for Alice and Bob to perform “key distribution” (i.e. agree on a uniformly random secret key only known by the two of them), then they would be able to communicate with “unconditional” security!

Means that security holds no matter how much computational power an eavesdropper has

Once Alice and Bob have agreed on a secret key:

10 of 37

Key Distribution

Alice

Bob

Goal: agree on a uniformly random secret key

Eve

Key distribution with unconditional security is impossible classically.

. . .

11 of 37

Key Distribution

Alice

Bob

0

Eve

Key distribution with unconditional security is impossible classically.

Goal: agree on a uniformly random secret key

12 of 37

Key Distribution

Alice

Bob

0

Eve

Key distribution with unconditional security is impossible classically.

Goal: agree on a uniformly random secret key

13 of 37

Key Distribution

Alice

Bob

0

Eve

0

Key distribution with unconditional security is impossible classically.

Goal: agree on a uniformly random secret key

14 of 37

Key Distribution

Alice

Bob

0

Eve

0

1

Key distribution with unconditional security is impossible classically.

Goal: agree on a uniformly random secret key

15 of 37

Key Distribution

Alice

Bob

0

Eve

0

1

1

Key distribution with unconditional security is impossible classically.

Goal: agree on a uniformly random secret key

16 of 37

Key Distribution

Alice

Bob

0

Eve

0

1

1

1

Key distribution with unconditional security is impossible classically.

Goal: agree on a uniformly random secret key

17 of 37

Key Distribution

Alice

Bob

0

Eve

0

1

1

1

1

Classically Eve can ”read” the public communication without disturbing it.

Key distribution with unconditional security is impossible classically.

Goal: agree on a uniformly random secret key

18 of 37

Quantum Key Distribution

Alice

Bob

Eve

Goal: agree on a uniformly random secret key

 

 

 

 

19 of 37

Quantum Key Distribution

Alice

Bob

Eve

Goal: agree on a uniformly random secret key

 

20 of 37

Quantum Key Distribution

Alice

Bob

Eve

Goal: agree on a uniformly random secret key

Is it or ?

 

21 of 37

Quantum Key Distribution

Alice

Bob

Eve

Goal: agree on a uniformly random secret key

 

22 of 37

Quantum Key Distribution

Alice

Bob

Eve

Goal: agree on a uniformly random secret key

Is it or ?

 

23 of 37

Quantum Key Distribution

Alice

Bob

Eve

If Eve measures in the wrong basis,

she disturbs the state!

Key distribution with unconditional security is possible quantumly.

[Bennett, Brassard ‘84]

Alice and Bob can leverage this idea to detect eavesdropping!

Goal: agree on a uniformly random secret key

 

“BB84”

24 of 37

The BB84 protocol for key distribution

Alice

Bob

25 of 37

The BB84 protocol for key distribution

Alice

Bob

26 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

27 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

28 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

 

29 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

H C H C C H C C C C

0 1 1 0 1 1 0 0 1 0

 

should agree with

at all locations where

=

Note:

30 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

H C H C C H C C C C

0 1 1 0 1 1 0 0 1 0

 

Consistency check:

31 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

H C H C C H C C C C

0 1 1 0 1 1 0 0 1 0

 

 

32 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

H C H C C H C C C C

0 1 1 0 1 1 0 0 1 0

 

 

33 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

H C H C C H C C C C

0 1 1 0 1 1 0 0 1 0

 

1, 5, 8

 

34 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

H C H C C H C C C C

0 1 1 0 1 1 0 0 1 0

 

1, 5, 8

0 1 0

 

35 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

H C H C C H C C C C

0 1 1 0 1 1 0 0 1 0

 

1, 5, 8

0 1 0

 

36 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

H C H C C H C C C C

0 1 1 0 1 1 0 0 1 0

 

1, 5, 8

0 1 0

 

37 of 37

The BB84 protocol for key distribution

Alice

Bob

H C C H C H H C H C

0 1 0 0 1 1 0 0 1 0

H C H C C H C C C C

0 1 1 0 1 1 0 0 1 0

 

 

 

1, 5, 8

0 1 0

Use remaining outcomes as the key!