Score:2

Sending photons in Quantum Cryptography

hn flag

Bob has two detectors + and x. You can see it in the picture I sent. Alice sends a photon with vertical polarization and Bob uses the + detector and the detector is detecting Alice's photon.

Bob's + detector detects when the polarization of the photon from Alice is either vertical or horizontal. (because it is + detector)

Bob can only tell if his detector is detecting a photon or not, if it is detecting, how does he know that the photon that causes his detector to give an output is vertical or horizontal?

enter image description here

Maarten Bodewes avatar
in flag
It looks like you mean [tag:quantum-key-distribution]. It is usually not considered part of quantum-cryptography.
poncho avatar
my flag
@MaartenBodewes: actually, I believe that QKD is considered the prime example of Quantum Cryptography (that is, using the properties of Quantum Mechanics to achieve a cryptographical goal)
poncho avatar
my flag
On the other hand, if the question is "how do photon polarization detectors work?", perhaps this be better answered on the physics stack exchange...
Maarten Bodewes avatar
in flag
@poncho In e.g. the Wikipedia article it mentions that it is not quantum cryptography. I kind-of agree that it doesn't have much to do with cryptographic algorithms. That said, key establishment is very much cryptography in my opinion and it definitely uses quantum effects. So yeah, OK, it's quantum-crypto. In any case, I'll tag it QKD in addition (even if it is a subset and usually no other tags are required, I guess it won't hurt, and it's not like there is a lot of discussion running specific algorithms on a QC anyway).
Score:1
ci flag

Bob randomly chooses to measure each photon in either one of two bases: the horizontal-vertical basis or the $45^o$ basis. The former can distinguish a horizontal from a vertical photon, while the latter can distinguish a $+45^{o}$ photon from a $-45^o$ photon.

What Bob doesn't know, is whether he measured the photon via the same basis it is aligned by. For example, Bob may measure a $-45^o$ photon via the horizontal-vertical detector, which will give him an unreliable result. That is why, as you notice in the line before last of your diagram there is a "compatibility" property. After sending all the necessary photons to Bob, Alice uses a classical channel to communicate to Bob the bases she used when sending each photon, and Bob tells her for each one whether he used the compatible detector or not.

Since the bases themselves don't reveal the orientation of the photon (For example: knowing it is the horizontal-vertical basis doesn't tell you whether the photon was sent with the horizontal or vertical polarization) there's in theory no security problem in doing that. So, Alice and Bob throw away all the photon values that weren't sent and measured with the same basis (hence, such photons are incompatible) so they are left only with the photon values (bits) that are identical (have the same $1/0$ value) which they can then use as a key.

Of course, if very few photons are sent, an attacker listening on this channel might get lucky and orient his detector exactly like Bob did, and hence recover the key also. So in general such a protocol becomes more secure the more photons are sent. But there are probably many other attacks which are more complicated, involving weak measurements and so on. This is a separate topic.

Paul Uszak avatar
cn flag
Re. last para. So the attacker's advantage would be through pure guesswork? And so a 256 bit key would be guessed as in other protocols at $P=\frac{1}{{2}^{256}}$?
Amit avatar
ci flag
No, since recall the classical channel communication is, AFAIK also assumed to be unencrypted (otherwise why do we need to agree on a key) so an attacker verifies whether he guessed the correct basis by intercepting this also. If he did, he measures the same bit as Bob did and he knows that.
Amit avatar
ci flag
BTW this protocol is called BB84 in case you or anyone else want to learn more about it, in particular the security analysis...
Tatsuya avatar
hn flag
Although Alice and Bob use same + basis, it can be either vertical or horisontal, right? How can all the photons that they have left is all identical?
Amit avatar
ci flag
@Tatsuya No, Alice and Bob randomly select either the x or + basis without knowing whether they used the same one or not. But the basis itself does not determine the value sent under this basis. + basis can distinguish $0^o$ from $90^o$ photons, and x can distinguish $45^o$ from $-45^o$ photons. The values are encoded in the angles (polarizations) of the photons, not in the basis. Alice is the one that selects the secret polarization for each photon she sends. For example if she selects a $+45^o$ it can only be correctly measured via the x basis.
Amit avatar
ci flag
Note that both $0^o$ and $+45^o$ encode the $1$ bit value while both $90^o$ and $-45^o$ encode the $0$ bit value, or any other such prearranged agreement, where orthogonal polarizations in the same basis represent opposite bit values.
Tatsuya avatar
hn flag
Ok. If she selected +45 and Bob has measured by chance correctly it with the x basis. How will he know whether it is + 45 or -45? Because Bob's basis can detect +45 and -45. Does detector tell Bob whether it is +45 or -45?
Amit avatar
ci flag
@Tatsuya Yes, that's what detection in the $45^o$ basis means. Note however that only when the photon transmission is finished will they both know (via exchanging information about the used bases) that this photon was indeed sent *and* measured in the x basis, so indeed they will keep its value and not throw it away.
Tatsuya avatar
hn flag
How does the detector tell Bob that is +45 or -45?
Tatsuya avatar
hn flag
Let us [continue this discussion in chat](https://chat.stackexchange.com/rooms/144563/discussion-between-tatsuya-and-amit).
Tatsuya avatar
hn flag
Why can't Bob just use a detector that has all 8 directions in one? Is it impossible?
Amit avatar
ci flag
@Tatsuya Correct, a single measurement alters the state of the photon. You need to study quantum mechanics to understand measurement, it is not related to Cryptography
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.