BB84 and Quantum Key Distribution
Quantum Key Distribution
Quantum Key Distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key, which can then be used to encrypt and decrypt messages.
Quantum Key Distribution (QKD) uses quantum mechanics principles to secure a communication channel, ensuring that any attempt to eavesdrop can be detected immediately.
This often gets confused with Quantum Cryptography, which is the science of exploiting quantum mechanical properties to perform cryptographic tasks. QKD is just the best known example of Quantum Cryptographic task.
For example, if Alice and Bob come up with a common secret key which they can use to encrypt and decrypt the files shared among each other.
Impact of Quantum Computing
Quantum computing will have a massive impact on the currently deployed cryptographic algorithms.
Cryptographic Algorithm | Type | Purpose | Quantum Computer Impact |
---|---|---|---|
AES-256 | Symmetric Key | Encryption | Larger key sizes needed |
SHA-256, SHA-3 | Hash Functions | Larger output needed | |
RSA | Public Key | Signatures | Isn’t secure anymore |
ECDSA, ECDH (Elliptic Curve Cryptography) | Public Key | Signatures | Isn’t secure anymore |
DSA (Finite Field Cryptography) | Public Key | Signatures | Isn’t secure anymore |
The emergence of quantum computing poses a significant threat to traditional cryptography methods; organizations should start planning to upgrade to quantum-resistant algorithms.
Implementing larger key sizes for AES and SHA algorithms can help mitigate some of the security risks posed by quantum computers.
Quantum Channels
A quantum channel is a communication channel which can transmit quantum information such as the state of qubit. There are 4 potential qubit states.
Basis | 0 | 1 |
---|---|---|
Rectilinear (+) | 🡑 | 🡒 |
Diagonal (x) | 🡔 | 🡕 |
When working with quantum communications, it’s essential to ensure the integrity and isolation of the quantum channel to prevent interference.
BB84
So, what is BB84? and how does it fit into this? Developed by Charles Bennett and Gilles Brassard in 1984, it is the first quantum cryptography protocol and is provably secure.
BB84 is foundational for modern quantum cryptography, using properties like quantum entanglement and the no-cloning theorem to secure communications.
To maintain its security, it relies on two principles of quantum mechanics:
- Heisenberg’s Uncertainty Principle : we cannot know both the position and momentum of a particle at quantum level, it is impossible to create an independent and identical copy of an arbitrary unknown quantum state. (No-Cloning Theorem)
- Entanglement : Quantum particles are not always independent of each other and can be entangled, when you measure one particle, the superposition of the other instantly collapses.
It has a complexity of Bounded-error Quantum Polynomial time (BQP) which is the class of decision problems solvable by a quantum computer in polynomial time.
BB84 Protocol
BB84 works with the following eight steps:
- Alice chooses
- a random string of bits.
- Alice chooses a random basis to encode each bit with.
- Alice encodes the bits using the chosen basis and sends qubits to Bob through a quantum channel.
- Bob receives the qubit states through the common quantum channel.
- Bob chooses a random basis to encode each receiving qubit state with.
- Bob measures the polarization of the received qubit states.
- After receiving the qubit states, Bob and Alice discuss their choses basis over a classical channel, remove the different basis.
- Resulting shared secret is the Sifted Key which can be used to encrypt and decrypt the data.
Always ensure the randomness of the initial bit sequence in BB84 to prevent vulnerabilities to attacks such as MITM.
Security of BB84
Each randomly chosen basis by Bob has a 50% likelihood of being correct and 50% likelihood of being incorrect. The size of the sifted key would be roughly half of the initially used bits.
In the event that Eve tries to intercept the quantum channel between Alice and Bob, since she cannot make identical copies of the qubits, she would have to communicate individually with Alice, and then with Bob. This would mean that Bob’s likelihood of choosing the same basis as Alice will be reduced to 25% with the probability of being incorrect becoming 75%. With this they can easily detect if their communication is being intercepted.
Be aware of the risks of interception in quantum channels; maintaining strict protocol adherence is crucial for security.
One drawback for BB84 is that the bits chosen by Alice have to be random, if not, Eve is able to imitate Alice and successfully conduct a Man in the Middle (MITM) attack.
The security of quantum key distribution like BB84 relies heavily on detecting discrepancies in key distribution phases, which are indicative of interception attempts.