20
1 Quantum Wireless Intrusion Detection Mechanism Tien-Sheng Lin 1,2 , I-Ming Tsai 1 , and Sy-Yen Kuo 1 1.Department of Electric Engineering, National Taiwan University, Taipei, Taiwan 2.Department of International Business Management, Lan Yang Institute of Technology, ILan, Taiwan

A Circuit Approach for Implementing Quantum Memory

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Circuit Approach for Implementing Quantum Memory

1

Quantum Wireless Intrusion Detection Mechanism

Tien-Sheng Lin1,2, I-Ming Tsai1, and Sy-Yen Kuo1

1.Department of Electric Engineering, National Taiwan University, Taipei, Taiwan

2.Department of International Business Management, Lan Yang Institute of Technology, ILan, Taiwan

Page 2: A Circuit Approach for Implementing Quantum Memory

2

Outline

• Quantum qubits• The BB84 protocol• The topology• Quantum sharing table• Quantum detection circuit• Conclusions

Page 3: A Circuit Approach for Implementing Quantum Memory

3

Superposition and Entanglement

|ψ⟩=a|0⟩+b|1⟩

|0⟩

|ψ⟩=a|00⟩+b|11⟩

|ψ⟩=a|0⟩+b|1⟩

Where |0⟩ and |1⟩ are two quantum states Where a and b are complex numbers, and |a|2+|b|2=1

Page 4: A Circuit Approach for Implementing Quantum Memory

4

The BB84 ProtocolAlice Bob

Eve

1.Send qubits

2.Measure qubits

3.Announce Bases

4.Derive a secret key

Intercept

Page 5: A Circuit Approach for Implementing Quantum Memory

5

The BB84 Protocol• 1.Alice sends Bob a stream of photons which

have been randomly polarized to one of four states (00, 450, 900, 1350)

• 2.Bob measures the photons in a random sequence of bases

• 3.Alice and Bob publicly announces the sequence of bases they used

• 4.Alice and Bob discard the results that have been measured using different bases, the results left can be used to derive a secret key.

Page 6: A Circuit Approach for Implementing Quantum Memory

6

The BB84 Protocol

0 0 1 0 1 1 0 0 1 0 1 1

0 0 = = 1 1 0 = 1 = = =

Alice

Bob

Key

Page 7: A Circuit Approach for Implementing Quantum Memory

7

Indirect Communication

Alice Candy David Bob

Quantum Sharing Table

Page 8: A Circuit Approach for Implementing Quantum Memory

8

Quantum Sharing Table

|ψ123⟩ Bases |ψc⟩ |ψt⟩ CX1 CX2 R(θ1) R(θ2)

|000⟩ b1b1b3 |z-⟩ |y-⟩ CσZ Cσx R(900) R(300)

|001⟩ b2b1b3 |z-⟩ |y-⟩ Cσx Cσy R(600) R(900)

|010⟩ b1b1b1 |z-⟩ |z+⟩ CH Cσx R(900) R(300)

|011⟩ b2b2b3 |x+⟩ |y-⟩ Cσy Cσy R(600) R(600)

|100⟩ b3b1b2 |z-⟩ |x-⟩ Cσz Cσx R(900) R(450)

|101⟩ b2b2b2 |x-⟩ |x+⟩ CH Cσx R(800) R(500)

|110⟩ b3b3b1 |y+⟩ |z-⟩ Cσx CH R(600) R(400)

|111⟩ b1b2b2 |x-⟩ |x+⟩ CH Cσy R(900) R(900)

Page 9: A Circuit Approach for Implementing Quantum Memory

9

Quantum Detection Circuit

Alice Candy David Bob

X1 X1 X2 X2R(-θ1) R(θ1) R(-θ2) R(θ2)

|ψc⟩&|ψt⟩ |ψc⟩&|ψt⟩ |ψc⟩&|ψt⟩

|ψt⟩

|ψc⟩

Page 10: A Circuit Approach for Implementing Quantum Memory

10

The procedureSender: Alice Candy David Receiver: Bob

|ψc⟩&|ψt⟩

CX2&R(θ2)

|ψxyz⟩&|ψ123⟩

|ψc⟩&|ψt⟩

CX1&R(θ1)

|ψxyz⟩&|ψ123⟩

|ψc⟩&|ψt⟩

CX1& R(θ1)

CX2&R(θ2)

|ψxyz⟩&|ψ123⟩

Acknowledge Acknowledge

Acknowledge Acknowledge

Receive the public from Alice Send quantum identification information to Candy

Receive the secure qubit Measure the secure qubitsEvaluate the

testing rules

Retransmit thepublic keyReceive CX2&R(θ2)Retransmit the information CX1&R(θ1) to CandyApply related quantum gatesSend secure qubits

Retransmit the public keyRetransmit the information CX2&R(θ2) to DavidReceive CX1&R(θ1)Apply related quantum gatesSend secure

qubits

Prepare M pairs of secure qubitsSend the public key to BobSend theinformation CX1&R(θ1) to David Apply related quantum gatesSend secure qubits

• First, quantum information: |ψxyz⟩&|ψ123⟩• Second, quantum information: CX2&R(θ2) and the acknowledge• Third, quantum information: CX1&R(θ1) and the acknowledge• Fourth, quantum information: the secure qubits, |ψc⟩&|ψt⟩

Page 11: A Circuit Approach for Implementing Quantum Memory

11

Conclusions

• Quantum cryptography is unconditional security.

• Quantum sharing table can act as a secret quantum key.

• Quantum detection circuit can resist man-in-the-middle attack.

• The detection circuit can reconstruct the original quantum states of the secure qubits.

Page 12: A Circuit Approach for Implementing Quantum Memory

12

Questions and Discussion

Page 13: A Circuit Approach for Implementing Quantum Memory

13

Three measurement bases:Conjugate

}1,0{1 === −+ zzb

)}10(2

1),10(2

1{2 −=+== −+ xxb

)}10(2

1),10(2

1{3 iyiyb −=+== −+

Page 14: A Circuit Approach for Implementing Quantum Memory

14

Eve attacks

• A. The BB84 protocol: Based on the no-cloning theorem, Eve can not know the measurement bases and measurement position

• B. The detection mechanism: Eve can not know the quantum states of the secure qubits and Bob can detect it.

Page 15: A Circuit Approach for Implementing Quantum Memory

15

Question and answer

• 1.What is the major difference between classical cryptography and quantum cryptography

• Quantum cryptography is the unconditionally security and classical cryptography is conditional security; The property of the quantum cryptography is based on the laws of the physics such as no-cloning theorem, uncertainly principle and quantum teleportation. The property of the classical cryptography is based on the computing power.

Page 16: A Circuit Approach for Implementing Quantum Memory

16

Question and answer

• The major difference between the technology of quantum superposition and the technology of quantum entangled particles.

• To generate, to distribute, to maintain multiple entanglement qubits is the problem.

• The reliability of the quantum computing• The reliability of the quantum communication

Page 17: A Circuit Approach for Implementing Quantum Memory

17

Page 18: A Circuit Approach for Implementing Quantum Memory

18

Page 19: A Circuit Approach for Implementing Quantum Memory

19

Page 20: A Circuit Approach for Implementing Quantum Memory

20