QUANTUM COMMUNICATIONS CAPABILITY FOR EAVESDROP DEFENSE
20230198633 · 2023-06-22
Assignee
Inventors
Cpc classification
H04L9/0855
ELECTRICITY
H04L9/0858
ELECTRICITY
International classification
Abstract
Entangled quantum photons augment a classically encrypted data message and the augmented message, classical decryption key and quantum photon augmentation key are transmitted on a single classical transmission line to a receiver. Eavesdroppers, i.e., attacks, are detected in accordance with changes to the quantum photons in the augmented message.
Claims
1. A secure communication system comprising: an optical transmitter; a single photon emitter; a photonic transmission line; wherein the optical transmitter prepares a classical data bit message and the single photon emitter prepares quantum bits in a predetermined orientation and salts the classical data bit message with the prepared quantum bits in accordance with a predetermined pattern resulting in a quantum augmented classical data bit message which is transmitted over the photonic transmission line.
2. The secure communication system of claim 1, further comprising a dual quantum bit and classical bit receiver for receiving the transmitted quantum augmented classical data bit message and determining if the quantum augmented classical data bit message was intercepted by an eavesdropper during transmission.
3. The secure communication system of claim 1, wherein the optical transmitter encrypts the classical data bit message prior to the classical data bit message being salted with quantum bits.
4. A process for securing a classical data bit message, comprising: generating a classical data bit message and encrypting the classical data bit message, preparing quantum bits in a predetermined orientation; salting the encrypted classical data bit message with the prepared quantum bits in accordance with a predetermined salting pattern resulting in a quantum augmented classical data bit message; transmitting the quantum augmented classical data bit message over a photonic transmission line; receiving the transmitted quantum augmented classical data bit message at a dual quantum bit and classical bit receiver; and processing the quantum augmented classical data bit message to i. determine if the quantum augmented classical data bit message was intercepted by an eavesdropper during transmission; and ii. decode the quantum augmented classical data bit message to ascertain the message.
5. The process of claim 4, further comprising: transmitting a first key which includes the predetermined salting pattern; and transmitted a second key for decrypting the encrypted classical data bit message, wherein the first key and second key are transmitted over the photonic transmission line.
Description
BRIEF SUMMARY OF THE FIGURES
[0010] Example embodiments will become more fully understood from the detailed description given herein below and the accompanying drawings, wherein like elements are represented by like reference characters, which are given by way of illustration only and thus are not limitative of the example embodiments herein.
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
DETAILED DESCRIPTION
[0021] As shown in
[0022] Referring to
[0023] Referring to
[0024] Referring to
[0025] With respect to determining if an eavesdropper is present, ff all bits arrive according to the salting key within tolerance of error due to the more fragile state of quantum bits, the line is clean (
[0026] The known orientation of the salted bits does not decrease the effectiveness of this eavesdrop detection as this knowledge does not compromise Quanary or reduce its effectiveness. The key advantage to sending quantum bits is that they themselves do not contain any information if simply detected; the information is gained from the correlation of the state sent and the state received. Quanary is the first demonstration of a hybrid classical-quantum encrypted data stream, and the quantum nature of the salted bits is not apparent to the transmitter’s classical detection. Detecting the quantum photons immediately, unavoidably alerts the receiver without the transmitter knowing. The decoy qubits contain no important information, leaving the eavesdropper with encrypted data with an extra layer or encryption that looks like random bits.
[0027] A critical feature of successful implementation of Quanary is the ability to detect an eavesdropper on the transmission line. The experimental set-up of
[0028] In accordance with
[0029] One skilled in the art will appreciate that optimal detection methods may be experimentally investigated and tested and may include, e.g., machine learning and statistical detection. By way of example, using Channel 1 and Channel 2 data generated using the system of
[0030] First, a new algorithm was developed where we cap the running sum (“Cap running sum” algo) so that it does not continue to collect in an unbounded fashion. The effect of this is that the running sum triggers the CUSUM alarm as normal, but when the attack ends, it is a much shorter descent down to non-attack status. In other words, our approach proceeds as follows: [0031] 1. Keep a running sum of values above some fixed threshold [0032] 2. If the running sum is above an alarm threshold, signal an attack is occurring [0033] 3. Cap the running sum to some fixed value slightly above the attack threshold Applying this algorithm to the correlated jamming data from Gong et al which consists of 1000 sample points with a single attack that starts at point 100 and ends at point 300, the Cap running sum algo detected the attack at step 109 (~0.072 second delay) and detected attack ended at step 306 (~0.048 second delay). The Cap running sum algo accurately predicts start and end with little lag. But once we started producing data from our experimental set-up (
[0034] In order to mitigate this issue, we analyze the first differences of the data. The first difference is the change in counts between successive time steps, i.e., y.sub.t = x.sub.t - x.sub.t-1. Unlike with the raw channel data, we see that the first differences are much more stable, which allowed us to develop an attack detection method. To do this, we first notice that the non-attack data have much larger first differences than the attack data. For example, in
[0035] We transform these insights into an attack detection scheme where we count how often the first difference has a “large” value in the last N steps. Channels that are not being attacked consistently have “large” values whereas channels that are being attacked do not consistently have “large” values. More concretely, our attack detection scheme is as follows: [0036] a. Look at 250 previous steps [0037] i. The last N steps [0038] b. Count how many times the absolute value of the first difference is above 300 [0039] i. 300 is our definition of “large” [0040] c. If the count is below 34 then signal an attack [0041] i. 34 is the lowest count number across all 250 step windows in the channels that are not being attacked
[0042] We evaluated this approach on the Channel 1 and Channel 2 data from October 28.sup.th, October 31.sup.st, and November 2.sup.nd. The results of this approach are shown in
[0043]
[0044] A more detailed example of a hybrid classical-quantum encrypted data stream referenced above is described below. Initially, a quantum salting key determining the placement of the transmission’s decoy qubits amongst the classical bits is agreed upon between the sender (transmitter) and receiver. In an exemplary quantum salting key, or shared secret, 1 s represent classical data and 0 s represent quantum data. A quantum state is agreed upon for the qubits. Since the qubits are primarily used for eavesdropping detection, it doesn’t matter what the state is or how easy it is to guess. In this specific example, all the qubits Alice sends are 0 s and the quantum salting key between Alice and Bob is as follows:
TABLE-US-00001 Alice and Bob’s Shared Secret:: 101100101001011111000001010101000100010
[0045] Next, a message is generated and encrypted using classical methods, such as AES-256.
EXAMPLE
[0046] TABLE-US-00002 Alice’s plaintext message: ‘Leidos intends to purchase Gibbs & Cox.’ Alice’s AES-encrypted message: b‘\xce]y\x99\x91\x92,\x8a\xf6\x92\x0b \xab\xfb8>(D\x82\xdeJ[\xe29\x08\xf9\xb0Q\xbc\xc0\xe7Q\x07~ [\xde\xe3\xdb’.
[0047] Qubits are then prepared in the agreed-upon states, entangling photons via polarization or superposition, which is known to those skilled in the art. Note that the decoy qubits are added to the stream after standard encoding and are detected before decoding. This means that the qubits may be added to most standard block encryptions, with qubits inserted around blocks.
[0048] Following the agreed-upon salting key, the quantum bits (Q*) are interjected among the classical message’s bits (e.g., 206, 93, 121 et seq.) as the message is being sent/transmitted:
TABLE-US-00003 Alice sends her salted message to Bob: 206 Q* 931 121 Q* 153 Q* 145 1 46 44 Q* 138 246 Q* 146 11 171 Q* 251 56 Q* 62 Q* 40 Q* 68 Q* 130 Q* 222 74 91 146 226 57 Q* 8 249 Q* 176 81 Q* 188 192 Q* 29 231 81 7 Q* 126 91 222 227 Q* 219
[0049] Bob’s receiver detects the quantum states of the Q* to determine the presence of a potential eavesdropper. If all the Os sent by Alice arrive at Bob, then there is no eavesdropper, as shown:
TABLE-US-00004 NO EAVESDROPPING DETECTED! Bob measured: { ‘0’ : 17} and Bob received the message: ‘Leidos intends to purchase Gibbs & Cox.’.
[0050] However, an eavesdropper’s detection of the qubits collapses them to classical states, which will be randomly distributed as Os and 1 s. If the eavesdropper disturbs all the qubits. Bob will receive a random distribution of 1 s and 0 s. If the eavesdropper does not disturb all qubits, there will be more of the original qubits, but disturbance will still be detectable, as shown:
TABLE-US-00005 WARNING: EAVESDROPPING DETECTED! Bob measured: {‘1’ : 4, ‘0’ : 15} and Bob received the message: ‘Leidos intends to purchase Gibbs & Cox.’.
[0051] As mentioned previously, noisy environments create interactions with data which can also collapse quantum systems, so there are known, industry-standard analysis methods used in the detection to ensure the detected eavesdropper is real and not background noise: e.g., quality of photon generation, error correction and metrology may be used to ensure that our data and our measurement methods are accurate enough to detect the eavesdropper.
[0052] While the specific embodiments described above implement entanglement, the application of Quanary is modular and extensible to other types of quantum properties, such as superposition. Superposition is a quantum effect for systems that can be in any number of combinations; those systems are most probably in a state-combination of all possible states. This creates inter-state dependence, similar to entanglement, and experiments have shown that superposition is another viable quantum property for communication use.
[0053] The flexibility of Quanary extends to the type of quantum information used for communications; as quantum communications works with either continuous variable (CV) quantum information or discrete variable (DV) quantum information. Continuous variable entanglement applies to such systems as those with inherently equidistant energy levels. Examples include atomic ensembles, or the amplitude of a quantum optical wave or light beams. In these cases, information is stored in continuous variables such as position, momentum, phase, and amplitude. Examples of discrete systems include atoms, quantum dots, and photons; any system with two distinct states such as the polarization of a photon or the energy levels of an atom. Any two energy levels or polarizations can then be chosen to represent a classical bit. Quantum communications has been experimentally proven with both DV and CV. While previous work with DV information was constrained by the difficulty of single photon generation, recent studies have mitigated much of the earlier concerns with this modality, allowing Quanary to integrate more discretely classical data, making it indistinguishable from the classical data for most eavesdroppers. For different use cases, Quanary’s modularity easily allows us to employ CV communications as well.
[0054] As quantum systems stabilize, more unique opportunities for communications will arise, and Quanary is designed to be extensible. Quanary’s modularity allows it to be agnostic to the method of encryption and transmission used and enables an agile response to the rapidly changing and developing fields of quantum communications and computing, and cryptography.
[0055] The following documents are evidence of the state of the prior art and would be known to one having ordinary skill in the art. The documents are incorporated herein by reference for their teachings: [0056] Pirandola, Stefano, et al. “Advances in quantum cryptography.” Advances in Optics and Photonics 12.4 (2020): 1012-1236. [0057] Lu, Hua, et al. “Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel.” Physical Review A 84.4 (2011): 042344. [0058] Minder, M., et al. “Experimental quantum key distribution beyond the repeaterless secret key capacity.” Nature Photonics 13.5 (2019): 334-338. [0059] Di Giuseppe, Giovanni, Francesco De Martini, and Danilo Boschi. “Experimental test of the violation of local realism in quantum mechanics without Bell inequalities.” Physical Review A 56.1 (1997): 176. [0060] Lima, Gustavo, et al. “Experimental Bell-inequality violation without the postselection loophole.” Physical Review A 81.4 (2010): 040101. [0061] Hosseinidehaj, Nedasadat, et al. “Satellite-based continuous-variable quantum communications: State-of-the-art and a predictive outlook.” IEEE Communications Surveys & Tutorials 21.1 (2018): 881-919. [0062] Wang, Shuang, et al. “Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme.” Quantum Science and Technology 3.2 (2018): 025006. [0063] Li, Ya-Ping, et al. “Experimental realization of a reference-frame-independent decoy BB84 quantum key distribution based on Sagnac interferometer.” Optics letters 44.18 (2019): 4523-4526. [0064] Takesue, Hiroki, et al. “Experimental quantum key distribution without monitoring signal disturbance.” Nature Photonics 9.12 (2015): 827. [0065] Zhao, Yi, et al. “Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems.” Physical Review A 78.4 (2008): 042333. [0066] Pang, Xiao-Ling, et al. “Hacking quantum key distribution via injection locking.” Physical Review Applied 13.3 (2020): 034008. [0067] Lee, Min Soo, et al. “Quantum hacking on a free-space quantum key distribution system without measuring quantum signals.” JOSA B 36.3 (2019): B77-B82. [0068] Zhu, Feng, et al. “Experimental long-distance quantum secure direct communication.” Science Bulletin 62.22 (2017): 1519-1524. [0069] Shi, Yu, and Edo Waks. “Deterministic generation of multi-dimensional photonic cluster states using time-delay feedback.” arXiv preprint arXiv:2101.07772 (2021). [0070] Bracht, Thomas K., et al. “Swing-up of quantum emitter population using detuned pulses.” arXiv preprint arXiv:2111.10236 (2021). [0071] Aoki, Takao, et al. “Quantum error correction beyond qubits.” Nature Physics 5.8 (2009): 541-546. [0072] Kohlrus, Jan, et al. “Quantum communications and quantum metrology in the spacetime of a rotating planet.” EPJ quantum technology 4.1 (2017): 1-13. [0073] Usuki, T., et al. “Single-photon generator for optical telecommunication wavelength.” Journal of Physics: Conference Series. Vol. 38. No. 1. IOP Publishing, 2006. [0074] Yuan, Renzhi, and Julian Cheng. “Free-space optical quantum communications in turbulent channels with receiver diversity.” IEEE Transactions on Communications 68.9 (2020): 5706-5717. [0075] Gong, Y., Wonfor, A., Hunt, J. H., White, I. H., & Penty, R. V. (2021). Experimental demonstration of confidential communication with quantum security monitoring. Scientific Reports, 11(1), 1- 16,
[0076] The embodiments described and claimed herein are not to be limited in scope by the specific examples herein disclosed since these examples are intended as illustrations of several aspects of the embodiments. Any equivalent examples are intended to be within the scope of the embodiments. Indeed, various modifications of the embodiments in addition to those shown and described herein will become apparent to those skilled in the art from the foregoing description. Such modifications are also intended to fall within the scope of the appended claims. All references including patents, patent applications and publications cited herein are incorporated herein by reference in their entirety and for all purposes to the same extent as if each individual publication or patent or patent application was specifically and individually indicated to be incorporated by reference in its entirety for all purposes.