The receiver Bob then performs the measurement using a phase shift as shown in the second Mach-Zehnder interferometer [33]. Bob applies phase shifting as shown in the second Mach-Zehnder to measure the incoming pulses of single photons [33].
Overview
The development of quantum mechanics was initially motivated by two scientific hypotheses that demonstrated the inadequacy of classical physics. The security of QKD is based on the general principles of quantum mechanics involved.
The objective of this study
QKD effectively solves the challenges faced by classical key distribution approaches by providing a provably secure cryptographic building block for external parties to generate cryptographic keys. There are products available that can be used to perform this protocol, for example the id 3000 system [28].
The structure of this study
Polarisation of light
The direction of light in which single photons propagate can be positioned in the polarization components, namely: horizontal state | Gray (00), vertical | Vi (900) and on the diagonal (|−i and |+i) corresponding to (−450 and 450). For example, a qubit that is in the overlap illustrated in equation (2.5) has |α|2 probability to be transmitted in the vertical direction. Suppose we have a light with single photons propagating through a polarizing filter that is set at an angle of 450.
The individual photons that will be transmitted are those that are parallel to the polarization axis, the other light will be blocked. When the axis of the polarizing filter is set to 900, the individual photons oscillate in the direction of the polarizing filter, which is the vertical direction, as shown in Figure 2.3. A polarizing filter set at -450 transmits a linearly polarized state parallel to the filter axis, as shown in Figure 2.4.
Phase
The individual photons in the transmission and reflection axes are recombined at the second beam splitter (BS2). In the Mach-Zehnder interferometer, the path length of the axes (transmission and reflection) must be equal to clearly see the interference of a single photon.
Heisenberg Uncertainty Principle
For example, if one performs some measurement on the qubit without knowing the position of the state, such a measurement produces an ambiguity (perturbation) in the state. This principle around the application of quantum mechanics makes it possible to achieve things that cannot be done in classical physics.
No-cloning theorem
- A single photon source
- A Phase Modulator
- A detector
- A Quantum Random Number Generator
The second channel within the QKD scheme shown in Figure 3.1 is the classical channel which is used to detect eavesdropping that may have occurred during the key exchange process, this process will be more detailed in section 3.2.2. A QKD system is achieved by using special equipment such as a single photon source, a phase modulator, detectors and a quantum random number generator. In a QKD system, attenuated lasers are the most important devices, as they generate the single photon for the light pulse to encode information.
A phase modulator (PM) is an optical modulator designed to control the phase of single photons by keeping the amplitude of the signal constant as illustrated in Figure 3.3 [40]. A detector in QKD systems may be required to count the transmitted single photons and release signal as output. Timing the detection event for single photons in an APD is achieved up to 100 MHz frequency.
The steps to produce a secure key
A quantum channel
Fiber is a medium that implements fiber optic cable to route single photons from point to point. The purpose of these quantum channels in a QKD system is to allow the distribution of single photons to be transferred from Alice to Bob. The distribution of single photons contains the information used by Bob to produce the raw key.
A classical channel
The error evaluation process is the step that Alice and Bob take after obtaining the screened key. When they find the errors, Alice and Bob use an algorithm such as the Cascade algorithm [45]. This algorithm allows Alice and Bob to try a small fraction of the bits in the screened key.
The tested small string can be removed and the remaining targeted key used to perform the debugging. The debugging process is a step that Alice and Bob can perform if they have observed errors in the targeted key. The performance of error correction can be applied to the remaining targeted key, in which they use an algorithm called the hash function [22].
Methods of encoding information
BB84 Protocol
Alice encodes the information in the four polarization states as illustrated in the diagram and Bob measures the single polarized photon using two bases at its location [48]. Alice compares Bob's measurement to the single photon polarization sequence she has implemented for transmission. If there is a base match, they hold the bit and discard the unrelated bases.
Table 3.1 shows how the distribution of individual photons between Alice and Bob is achieved. This approach allows the first interferometer to control the individual photons picked up by the short arm in Alice's interferometer and Bob's interferometer. If there are interfering single photons (super-position), the detector (D1) is triggered and the detector (D2) is triggered in positive phase.
SARG04 Protocol
B92 Protocol
Bob performs measurements on the single incoming photons by applying the polarization filter in one of two directions orthogonal to Alice's polarizations which are 0◦ horizontal or −45◦ diagonal to measure 1 or 0, respectively. Alice and Bob obtain a key without detected polarizer used for each measurement. The first interferometer belongs to Alice and the second interferometer belongs to Bob as shown in Figure 3.11.
The key exchange process between Alice and Bob for this method is achieved using two quantum states encoded in two possible phase shifts in the first interferometer [35]. Alice generates bits using the two possible phase shifts 0 for bit 0 and π2 for bit 1 in the interferometer. Bob measures the input pulses of individual photons using the phase shift ΦB =π for bit 1 and ΦB = 3π2 for bit 0.
Eavesdropping within a quantum channel
Polarisation encoding with Eve
Phase encoding with Eve
The id 3000 system is a fiber based system developed in the year 2005 by IDquantique in Switzerland. The system was developed to generate and share random secure keys between two remote parties. The id 3000 system is designed to support the phase coding of a BB84 and SARG protocol.
A key component of the id 3000 system is an interface that allows participants to record experimental data electronically. The id 3000 system is shown in Figure 4.1, Alice is the transmitter and Bob is the receiver. The electronic components ensure high-level performance in monitoring the available devices in the system.
Bob’s system
Fibre optics
Double bursting occurs due to stress within the fiber as light propagating in the fast axis travels at a higher group velocity and is therefore split between polarizations which may undergo dispersion [57]. Because of such challenges, fibers with 20 dB loss limit transmission when the distance is too long.
Internal design of the id 3000 system
- Laser Diode (LD)
- Circulator (C)
- Avalanche Photo-Diode (APD)
- Beam Splitter (BS)
- Delay Line (DL)
- Phase Modulator (PM)
- Coupler 10:90 (10/90)
- Classical Detector (CD)
- Variable Attenuator (VA)
- Faraday Mirror (FM)
In the id 3000 system, this circulator is used to randomly route the light pulses through port 3 going towards the beam splitter. In the id 3000 system, an APD detects return pulses and counts the transmitted single photons including the noise. A Delay Line (DL) is a device designed to enable a signal to be delayed by a number of samples in order for an id 3000 system to achieve perfect transmission.
Phase modulation (PM) in the id 3000 system maintains the amplitude of the single photon pulses and encodes bit values on the pulses. The id 3000 system provides the variable attenuators (VA1 and VA2) to attenuate light pulses to single photons, operating on a range of 1.5 - 20 dB. It is used in the id 3000 system to ensure that the polarization of light is maintained [59].
Transmission in the id 3000 system
Cryptomenu application
The role of this specific feature is to allow the setting of the hardware parameters. For optimal setup, it is advisable to access the initialization file placed in the windows in the file called cryptoini. Once the parameters are set, they can be saved and viewed on the console screen.
To achieve optimal key exchange it is important that both stations apply the same measurement. The phase modulator uses interference from a single photon pulse when Bob releases a series of pulses that attenuates Alice to single photons and performs phase modulation on the individual single photon pulse.
Clavis application
A hardware check to verify that the subsystems running on the system are working properly. The subsystems being monitored are temperature by checking the power supplied by Bob and Alice. The hardware check includes checking the amount of output power for the laser in Bob's station and confirming the probability of noise in the APDs of Bob's system.
Once the system has achieved the above task, it performs a Raw Key production, which is performed by exchanging single photon pulses. The key buffer distills the raw key bits stored in the computer's memory to produce the cryptographic key.
Demonstration of the BB84 and SARG04
Checking the status
Measuring the noise
Checking the line length
Experimental preparation for the id 3000 system Table 5.9: Line length detection for 12 km performed via the id 3000 system based on the SARG04 protocol. For this performance, the id 3000 system is designed to produce a detection rate of no more than 10% for optimal results.
Generating files for key exchange
Bob first downloads Alice's data file and Bob's data file to perform a raw key exchange.
Obtaining the actual Raw Key
From the detection ports that Bob ran during the BB84 implementation, detector 1 and 2 managed to detect 10188 and 21630 respectively.
Comparison of BB84 and SARG04
This was further implemented during the 2010 FIFA World Cup for the Quantum Stadium Project with an improved version of the id 3000 system [67]. Using the id 3000 system with 12 km of fiber in the system, a secure key was exchanged between Alice and Bob over a distance of 12 km. The id 3000 system was set up to perform the key distribution process, which was controlled via a computer for Alice and Bob.
The first step was used to validate the system temperature and the system measured at 47.7°C. The third step was used to demonstrate the line length in which users can exchange the key. Universally valid reformulation of the Heisenberg uncertainty principle on noise and perturbations in measurement.