A Talk on Quantum Cryptography or How Alice Outwits Eve

Alice and Bob wish to communicate without the archvillainess Eve eavesdropping on their conversation. Alice, decides to take two college courses, one in cryptography, the other in quantum mechanics. During the courses, she discovers she can use what she has just learned to devise a cryptographic communication system that automatically detects whether or not Eve is up to her villainous eavesdropping. Some of the topics discussed are Heisenberg’s Uncertainty Principle, the Vernan cipher, the BB84 and B92 cryptographic protocols. The talk ends with a discussion of some of Eve’s possible eavesdropping strategies, opaque eavesdropping, translucent eavesdropping, and translucent eavesdropping with entanglement.

[1]  Simon J. D. Phoenix,et al.  Quantum cryptography: How to beat the code breakers using quantum mechanics , 1995 .

[2]  J. Rarity,et al.  Single photon interference in 10 km long optical fibre interferometer , 1993 .

[3]  C. G. Peterson,et al.  Practical quantum cryptography for secure free-space communications , 1999 .

[4]  Samuel J. Lomonaco,et al.  A Quick Glance at Quantum Cryptography , 1998, Cryptologia.

[5]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[6]  J. Franson,et al.  Quantum cryptography in free space. , 1996, Optics letters.

[7]  Paul G. Kwiat,et al.  Quantum cryptography for secure free-space communications , 1999, Photonics West.

[8]  P. Townsend Secure key distribution system based on quantum cryptography , 1994 .

[9]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[10]  H. F. Chau,et al.  Quantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances , 1998, IACR Cryptol. ePrint Arch..

[11]  Paul D. Townsend,et al.  A Quantum Key Distribution Channel Based on Optical Fibre , 1994 .

[12]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[13]  J. Franson,et al.  Quantum Cryptography Using Polarization Feedback , 1994 .

[14]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[15]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[16]  John Myers,et al.  ASPECTS OF ENTANGLED TRANSLUCENT EAVESDROPPING IN QUANTUM CRYPTOGRAPHY , 1997 .

[17]  Andrew Chi-Chih Yao,et al.  Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[18]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[19]  Peterson,et al.  Daylight quantum key distribution over 1.6 km , 2000, Physical review letters.

[20]  Paul D. Townsend,et al.  Quantum cryptography on multiuser optical fibre networks , 1997, Nature.

[21]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.