Chapter 3 Sharing secrets with Quantum key distribution

This chapter covers:

  • Recognize the implications that quantum resources have for security
  • Programming a simulator in Python for a quantum key distribution protocol
  • Implementing the quantum NOT operation
Figure 3.1. In this Chapter, we will be covering topics in simulating quantum hardware and intrinsic operations for the quantum devices.
CH03 FIGxx mental model

3.1 ALL’S FAIR IN LOVE AND ENCRYPTION

In the previous Chapter, we saw that we could use random numbers as a resource to send secret messages like "💖" to our friends. We also saw that by using quantum bits or qubits, we could generate truly random numbers that are impossible for any adversary to predict.

That’s only half the story, though, because we need to share those random numbers with our friends if we want to use the quantum random numbers to communicate securely with them. Those random numbers (often called a key) can be use with encryption algorithms which combine the randomness of the key with information people want to keep secret in such a way that only someone else with the key can see the information. We can see in how two people could use a key (here random binary string) to encrypt and decrypt messages between themselves.

Figure 3.2. Mental model for how you and Eve might use encryption to communicate secretly, even over the Internet or another untrusted network.
CH03 FIG 1 what is encryption

3.2 QUANTUM NOT OPERATIONS

3.2.1 Algorithm for sending a random classical bit string encoded in qubits.

3.3 SHARING CLASSICAL BITS WITH QUBITS

3.4 A TALE OF TWO BASES

3.5 QUANTUM KEY DISTRIBUTION: BB84

3.5.1 Steps of the BB84 protocol:

3.6 USING OUR SECRET KEY TO SEND SECRET MESSAGES

3.7 SUMMARY

sitemap