Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
35 views7 pages

Answer On Quantum Cryptography

Uploaded by

alabiabdulmuiz04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views7 pages

Answer On Quantum Cryptography

Uploaded by

alabiabdulmuiz04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

NAME: OMIDIRAN ABDULRAHMAN ABIOLA

MATRIC NO: EEG/2021/083

TITLE: RESEARCH ON QUANTUM CRYPTOGRAPHY

1. How do satellite-based QKD systems function?


The paper describes the foundational BB84 protocol, which is crucial for understanding satellite-
based QKD. Satellite-based QKD extends this principle by using satellites as intermediaries to
distribute quantum keys over long distances.

"The BB84 protocol involves encoding information in quantum states, such as polarized
photons, and transmitting them over a quantum channel. The security of this protocol
relies on the no-cloning theorem and the fact that any eavesdropping attempt introduces
detectable errors." (Section 4, p. 10)

Satellite-based systems apply these principles in free-space communication between satellites


and ground stations.

Visualization:

`
Satellite QKD

This diagram illustrates satellite-based QKD. Alice on Earth prepares photons with random
polarizations. The satellite relays these photons to Bob on Earth. Alice and Bob publicly
compare their measurement bases, discarding mismatches to establish a shared secret key.
Supporting Evidence and External Validation:

General Functionality:
European Space Agency (ESA) on Satellite QKD: https://www.esa.int/Applications/Telec
ommunications_Integrated_Applications/Quantum_cryptography
"Quantum key distribution with entangled photons from an entangled source on board a
low-Earth-orbit satellite": https://www.nature.com/articles/s41566-020-0669-1

2. What are the hardware requirements for a QKD system?


The paper describes essential components for implementing QKD protocols like BB84:

Devices for preparing quantum states.


Quantum channels for transmitting qubits.
Single-photon detectors for measurement.
Classical communication channels for error correction and reconciliation.
"In the BB84 protocol, Alice prepares qubits in one of two mutually unbiased bases and
sends them to Bob over a quantum channel. Bob measures each qubit in one of these
two bases." (Section 4, p. 10)

These components are critical for encoding, transmitting, and decoding quantum information
securely.

Visualization:

This info-graphic shows the essential hardware components of a QKD system: a single-
photon source, a quantum channel (optical fiber), single-photon detectors, and a classical
communication channel
Supporting Evidence and External Validation:

Key Components:
ID Quantique - QKD Components: https://www.idquantique.com/quantum-safe-cryptog
raphy/products/

3. How does quantum one-time pad encryption work?


The paper describes how QKD can be used to generate secure keys for encryption schemes like
the one-time pad.

"The one-time pad achieves perfect secrecy... The ciphertext is independent of the
plaintext because the key is uniformly random and used only once." (Section 2, p. 5)

In quantum cryptography, keys generated via QKD replace classical random keys, ensuring
secure encryption even against quantum adversaries.

Visualization:

Quantum OTP

This flowchart illustrates the Quantum One-Time Pad process. Alice and Bob establish a
shared secret key using QKD. Alice XORs her plaintext with this key to create ciphertext,
which she sends to Bob. Bob XORs the ciphertext with the same key to decrypt the
message.
Supporting Evidence and External Validation:

Quantum One -Time Pad:


"Achieving perfect secrecy with quantum key distribution": https://journals.aps.org/pra/
abstract/10.1103/PhysRevA.68.042307

4. What are quantum digital signatures, and how do they work?


Based on general principles of quantum cryptography described in the paper, quantum digital
signatures would involve distributing unique quantum states as signature tokens that can be
verified without being forged or repudiated.

Visualization:

Quantum Signature

This process diagram shows the steps in a quantum digital signature. The sender prepares
entangled qubits and distributes them to verifiers. The sender then performs a quantum
operation based on the message to be signed. Finally, the verifiers measure their qubits and
compare the results to validate the signature.
Supporting Evidence and External Validation:

Quantum Digital Signatures (QDS):


"Quantum Digital Signature Schemes: A Survey": https://arxiv.org/abs/2008.05808

5. What is quantum bit commitment, and why is it considered insecure?


The paper provides an extensive discussion on quantum bit commitment and its insecurity:

"Quantum bit commitment involves Alice committing to a bit value by encoding it into a
quantum state and sending it to Bob while keeping some information to reveal it later...
Unconditionally secure bit commitment is impossible due to entanglement." (Section 5, p.
15)

This insecurity arises because Alice can use entanglement to delay her choice of commitment
until reveal time without detection.

Visualization:

Quantum Bit Commitment

This timeline illustrates the quantum bit commitment process. Alice commits to a bit by
sending a quantum state to Bob. Alice can exploit entanglement to change her bit after
sending the state, making the commitment insecure.
Supporting Evidence and External Validation:

Insecurity of Quantum Bit Commitment:


"Impossibility of unconditionally secure quantum bit commitment": https://journals.aps.o
rg/prl/abstract/10.1103/PhysRevLett.74.3794

6. How does quantum random number generation work?


Randomness is fundamental to protocols like BB84:

"Alice chooses bases randomly to encode her qubits... The randomness ensures that any
eavesdropper cannot predict or replicate her choices." (Section 4, p. 10)

Quantum random number generators (QRNGs) exploit inherent randomness in quantum


mechanics—such as photon polarization—to generate truly random numbers.

Visualization:

QRNG

This diagram illustrates a QRNG using a beam splitter. A photon hits a beam splitter with
equal probability of being reflected or transmitted. Detectors record the outcome, with
reflection representing 0 and transmission representing 1, creating a random bit.
Supporting Evidence and External Validation:

Quantum Random Number Generation (QRNG):


ID Quantique - Quantum Random Number Generators: https://www.idquantique.com/ra
ndom-number-generation/products/quantum-random-number-generators/
"Real-time demonstration of high bit rate quantum random number generation with
coherent laser light": https://www.nature.com/articles/s41598-023-30584-1

7. How does quantum secure direct communication differ from QKD?


Based on general principles:

QKD: Focuses on generating secure keys for later use in encryption.


QSDC: Transmits messages directly over a quantum channel without prior key exchange.
Both rely on quantum mechanics for security but differ in their approach to message
transmission.

Visualization:

QKD vs QSDC

This comparison table highlights the key differences between QKD and QSDC. QKD
generates a secret key for later use in classical encryption. QSDC transmits the message
directly over a quantum channel.
Supporting Evidence and External Validation:

Quantum Secure Direct Communication (QSDC):


"Quantum secure direct communication": https://www.sciencedirect.com/science/articl
e/abs/pii/S037596010300438X

You might also like