Innovative Eavesdropper Attacks on Quantum Cryptographic Systems
Total Page:16
File Type:pdf, Size:1020Kb
Innovative Eavesdropper Attacks on Quantum Cryptographic Systems Elizabeth Newton Department of Physics and Astronomy University of Leeds A thesis presented for the degree of Doctor of Philosophy 31st October 2018 2 The candidate confirms that the work submitted is their own, except where work which has formed part of jointly-authored publications has been included. The contribution of the candidate and the other authors to this work has been explicitly indicated below. The candi- date confirms that appropriate credit has been given within the thesis where reference has been made to the work of others. Chapter5 is based on the work of a jointly-authored publication en- titled `Quantum Secrecy in Thermal States' which, at the time of writing, had been accepted for publication in Journal of Physics B, and is available to view at arXiv.org, quant-ph, arXiv:1711.06592. This was authored by Elizabeth Newton, Anne Ghesqui`ere, Freya L. Wilson, Benjamin T. H. Varcoe and Martin Moseley. The parts of this publication directly attributed to this author are limited to the description and figures relating to the practical experiment. The con- cept was a product of all of the above authors, and the theory and simulations predominantly carried out by A. Ghesqui`ere. This copy has been supplied on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. c 2018 The University of Leeds and Elizabeth Newton i This thesis is dedicated to the Haddon through Knowle physics team. ii Acknowledgements My thanks to the entirety of the experimental quantum information department at the University of Leeds for their help and support. Especially Matthew Everitt and Freya Wilson, who were working on related projects and provided a lot of helpful discussion. In addition, I would like to thank Timothy Newton and Ruth Newton who were willing to help with my maths on occasion, once they had stopped laughing. Also their unwavering moral support. My thanks to Mohsen Razavi for his support and supervision, as well as very helpful discussions. Finally, this project would not have been possible without my super- visor, Ben Varcoe, the king of story time. iii Abstract Quantum cryptography aims to provide secure communications, no matter how powerful or resourceful an eavesdropper is. As long as the eavesdropper is constrained by the laws of physics, she can never break the underlying cryptographic system. One of the key appli- cations in quantum cryptography is key distribution. This involves the creation and sharing of the cryptographic key, the element of the message which provides secrecy between the sender and the recipient. There are two main forms of quantum key distribution. The first uses discrete variables, where information is encoded onto discrete modes of light, such as the polarisation of single photons. The second uses continuous variables, where information is encoded onto an infinite dimensional space, such as the quadratures of coherent states of light, which generally consist of several photons. Here, an additional approach is examined. It falls under the category of continuous variable quantum key distribution, but instead of co- herent states, such as those produced by lasers, it uses thermal states, produced by thermal sources of light. First, the experimental proper- ties of thermal states are examined and compared to those of coherent states, then a simple key distribution model is constructed to test if thermal states are viable as a resource for secrecy. The initial results look promising. When using continuous variables for key distribution, information is encoded by using randomly generated quadratures with a Gaussian distribution. Several methods for discretising these quadratures into iv key bits are examined to see if they have security implications as- sociated with them. It is found that a poor choice of discretisation method can leak information to an eavesdropper. Once the quantum transmission is complete for key distribution, some classical error cor- rection needs to be performed. A new eavesdropping technique for an eavesdropper to attack one of these forms of error correction, cascade, is described. We find that more attention needs to be paid to the clas- sical parts of quantum key distribution in order for it to succeed. v Abbreviations ADC Analogue to Digital Converter ASE Amplified Spontaneous Emission AWGN Additive White Gaussian Noise BB84 Bennett and Brassard 1984 quantum cryptography pro- tocol BS Beam Splitter CSV Comma Separated Variable CVQKD Continuous Variable Quantum Key Distribution DAQ Data AcQuisition device ECL External (or Extended) Cavity Laser EK91 Ekert 1991 quantum cryptography protocol FFT Fast Fourier Transform FLFSR Fibonacci Linear Feedback Shift Register FWHM Full Width at Half Maximum GPS Global Positioning System LDPC Low Density Parity Check LED Light Emitting Diode MDRA Multi Dimensional Reconciliation Algorithm ND Neutral Density NIST National Institute of Standards and Technology OD Optical Density OSA Optical Spectrum Analyser PBS Polarising Beam Splitter PC Personal Computer POVM Positive Operator Valued Measurement QKD Quantum Key Distribution RMS Root Mean Squared SEC Sliced Error Correction SLED Super LuminEscent Diode (Sometimes SLD) SNR Signal to Noise Ratio TEC ThermoElectric Cooling USB Universal Serial Bus XOR eXclusive OR logic gate vi vii viii Contents 1 Background1 1.1 Correlation functions and thermal light . .2 1.1.1 Coherence and correlations . .2 1.1.2 First order coherence . .3 1.1.3 Second order coherence . .6 1.1.4 The detector correlation function . 12 1.1.5 Linewidth broadening . 16 1.1.6 Detector integration times and second order correlations . 19 1.2 Information Theory . 20 1.2.1 Mutual information . 21 1.2.2 Conditional entropy . 23 1.2.3 Joint Entropy . 24 1.2.4 Conditional Mutual Information . 24 1.2.5 Multivariate mutual information . 25 1.2.6 Information in practice . 25 1.3 Cryptography . 27 1.3.1 Unconditional security . 27 1.3.2 The Quantum Revolution . 28 1.3.3 Quantum computers - The ultimate hackers . 29 1.3.4 Classical cryptography and the quantum eavesdropper . 30 1.3.5 Classical solutions . 32 1.3.6 Quantum Key Distribution . 33 1.3.7 Early Protocols . 34 1.3.8 Single photon protocols . 40 ix CONTENTS 1.3.9 Coherent State QKD . 40 1.3.10 Continuous variable QKD . 40 1.4 Novel contributions of this thesis . 44 2 Cryptographic Protocols 45 2.1 Central Broadcast schemes . 45 2.1.1 Uni-Dimensional CVQKD . 45 2.1.2 Classical central broadcast schemes . 46 2.2 Discretisation . 54 2.2.1 Sliced Error Correction . 55 2.2.2 Problems in Discretisation . 57 2.2.3 Measurement in CVQKD . 57 2.2.4 Transmission . 58 2.2.5 Detection . 58 2.2.6 Initial Discretisation . 58 2.2.7 Further Discretisation . 59 2.2.8 Classical Inspiration . 59 2.2.9 Shannon-Hartley Theorem . 60 2.2.10 Hartley's Law . 61 2.2.11 Lloyd's Algorithm . 61 2.3 Reconciliation . 62 2.3.1 Advantage distillation . 63 2.3.2 Information reconciliation . 67 2.3.3 Cascade . 67 2.3.4 LDPC codes . 69 2.3.5 Privacy amplification . 74 3 Thermal state protocol 75 3.1 Introduction . 75 3.2 Protocol . 75 3.3 Discussion . 76 x CONTENTS 4 Laser Characterisation 77 4.1 Lasers . 77 4.1.1 Super luminescent diodes . 78 4.2 Experiment . 79 4.2.1 Equipment . 80 4.2.2 Wavelength spectrum . 86 4.2.3 Coherence Time and the expected g(2)(0) peak height . 89 4.2.4 Thermal-coherent threshold . 90 4.2.5 Ensuring correct alignment . 99 4.2.6 Fourier transform . 101 4.2.7 Power spectral density . 103 4.2.8 Ruling out noise . 105 4.2.9 The effect of loss . 107 4.2.10 Creating pseudo-thermal light . 110 5 Secrecy in Thermal States 115 5.1 Experimental demonstration of a central broadcast scheme . 115 5.1.1 Experimental Methods . 115 5.1.2 Validation . 117 5.1.3 Key rate . 119 5.1.4 Party planning . 123 5.1.5 Calculating the mutual information . 124 5.2 Conclusions . 131 6 Classical Post-processing 133 6.1 Discretisation . 133 6.1.1 Simulations . 133 6.1.2 Methods . 133 6.1.3 Results . 140 6.1.4 Relation to the classical . 145 6.1.5 Conclusions . 147 6.2 Reconciliation . 148 6.2.1 Simulations . 148 6.2.2 Coding cascade . 151 xi CONTENTS 6.2.3 Eavesdropping strategies for cascade . 154 6.2.4 Conclusions . 162 7 Conclusions and Future work 165 Glossary 168 References 171 xii List of Figures 1.1 Young's double slit experiment. .4 1.2 The Michelson interferometer. .7 1.3 The Hanbury Brown Twiss interferometer. .8 1.4 A general experimental set-up to examine second order coherence.9 1.5 Mutual Information . 23 1.6 Conditional entropy . 24 1.7 Joint entropy . 25 1.8 Conditional mutual information . 26 1.9 Multivariate mutual information . 26 1.10 The XOR table. 28 1.11 An example of XOR. 28 1.12 Symmetric key cryptography systems. 34 1.13 Rectilinear and diagonal photon polarisations. 35 1.14 Possible measurement outcomes during BB84. 36 1.15 Photon and measurement bases over the course of the BB84 protocol. 38 1.16 The EK91 protocol. 39 1.17 Amplitude and phase squeezed light. 41 2.1 Central broadcast schemes. 47 2.2 Central broadcast with a seperate source. 52 2.3 Bit assignment in sliced error correction . 56 2.4 Hartley's law. 61 2.5 Advantage distillation . 66 2.6 Cascade . 68 2.7 LDPC graph. 70 xiii LIST OF FIGURES 2.8 Decoding LDPC. ..