Post

BB84 and Quantum Key Distribution

Quantum Key Distribution

Quantum Key Distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key, which can then be used to encrypt and decrypt messages.

Quantum Key Distribution (QKD) uses quantum mechanics principles to secure a communication channel, ensuring that any attempt to eavesdrop can be detected immediately.

This often gets confused with Quantum Cryptography, which is the science of exploiting quantum mechanical properties to perform cryptographic tasks. QKD is just the best known example of Quantum Cryptographic task.

For example, if Alice and Bob come up with a common secret key which they can use to encrypt and decrypt the files shared among each other.

Impact of Quantum Computing

Quantum computing will have a massive impact on the currently deployed cryptographic algorithms.

Cryptographic AlgorithmTypePurposeQuantum Computer Impact
AES-256Symmetric KeyEncryptionLarger key sizes needed
SHA-256, SHA-3 Hash FunctionsLarger output needed
RSAPublic KeySignaturesIsn’t secure anymore
ECDSA, ECDH (Elliptic Curve Cryptography)Public KeySignaturesIsn’t secure anymore
DSA (Finite Field Cryptography)Public KeySignaturesIsn’t secure anymore

The emergence of quantum computing poses a significant threat to traditional cryptography methods; organizations should start planning to upgrade to quantum-resistant algorithms.

Implementing larger key sizes for AES and SHA algorithms can help mitigate some of the security risks posed by quantum computers.

Quantum Channels

A quantum channel is a communication channel which can transmit quantum information such as the state of qubit. There are 4 potential qubit states.

Basis01
Rectilinear (+)🡑🡒
Diagonal (x)🡔🡕

When working with quantum communications, it’s essential to ensure the integrity and isolation of the quantum channel to prevent interference.

BB84

So, what is BB84? and how does it fit into this? Developed by Charles Bennett and Gilles Brassard in 1984, it is the first quantum cryptography protocol and is provably secure.

BB84 is foundational for modern quantum cryptography, using properties like quantum entanglement and the no-cloning theorem to secure communications.

To maintain its security, it relies on two principles of quantum mechanics:

  • Heisenberg’s Uncertainty Principle : we cannot know both the position and momentum of a particle at quantum level, it is impossible to create an independent and identical copy of an arbitrary unknown quantum state. (No-Cloning Theorem)
  • Entanglement : Quantum particles are not always independent of each other and can be entangled, when you measure one particle, the superposition of the other instantly collapses.

It has a complexity of Bounded-error Quantum Polynomial time (BQP) which is the class of decision problems solvable by a quantum computer in polynomial time.

BB84 Protocol

BB84 works with the following eight steps:

  • Alice chooses
  • a random string of bits.
  • Alice chooses a random basis to encode each bit with.
  • Alice encodes the bits using the chosen basis and sends qubits to Bob through a quantum channel.
  • Bob receives the qubit states through the common quantum channel.
  • Bob chooses a random basis to encode each receiving qubit state with.
  • Bob measures the polarization of the received qubit states.
  • After receiving the qubit states, Bob and Alice discuss their choses basis over a classical channel, remove the different basis.
  • Resulting shared secret is the Sifted Key which can be used to encrypt and decrypt the data.

BB84 Protocol The BB84 Protocol

Always ensure the randomness of the initial bit sequence in BB84 to prevent vulnerabilities to attacks such as MITM.

Security of BB84

Each randomly chosen basis by Bob has a 50% likelihood of being correct and 50% likelihood of being incorrect. The size of the sifted key would be roughly half of the initially used bits.

In the event that Eve tries to intercept the quantum channel between Alice and Bob, since she cannot make identical copies of the qubits, she would have to communicate individually with Alice, and then with Bob. This would mean that Bob’s likelihood of choosing the same basis as Alice will be reduced to 25% with the probability of being incorrect becoming 75%. With this they can easily detect if their communication is being intercepted.

Be aware of the risks of interception in quantum channels; maintaining strict protocol adherence is crucial for security.

One drawback for BB84 is that the bits chosen by Alice have to be random, if not, Eve is able to imitate Alice and successfully conduct a Man in the Middle (MITM) attack.

The security of quantum key distribution like BB84 relies heavily on detecting discrepancies in key distribution phases, which are indicative of interception attempts.

References

This post is licensed under CC BY 4.0 by the author.