Skip to main content
  1. Notes/
  2. Physics/

🪙 BB84 Quantum Cryptography Protocol

·3 mins· 0 · 0 ·
quantum computing quantum encryption
Chia-Wei
Author
Chia-Wei
A master student at National Tsing-Hua University
Table of Contents

Quantum cryptography protocol BB84 #

BB84 is the quantum key distribution scheme which developed by Charles Bennett and Gilles Brassard in 1984. The name of BB84 originates from the prefix-alphabet of the name of these two scientists, “B” to “Bennett” and “Barassard”, “84” from the year of the paper is proposed.

Dr. Charles H. Bennett, who is known for quantum teleportation and quantum cryptography.
Credit by: <a href="https://en.wikipedia.org/wiki/Charles_H._Bennett_%28physicist%29"   target="_blank">
    https://en.wikipedia.org/wiki/Charles_H.<em>Bennett</em>(physicist)</a>
Dr. Charles H. Bennett, who is known for quantum teleportation and quantum cryptography. Credit by: https://en.wikipedia.org/wiki/CharlesH._Bennett(physicist)

Gilles Grassard, who is known for quantum cryptography and quantum teleportation.
Credit by: <a href="https://en.wikipedia.org/wiki/Gilles_Brassard"   target="_blank">
    https://en.wikipedia.org/wiki/Gilles_Brassard</a>
Gilles Grassard, who is known for quantum cryptography and quantum teleportation. Credit by: https://en.wikipedia.org/wiki/Gilles_Brassard

This protocol is designed for the one-time pad (OTP) encryption technique. Based on the no-clone theorem and superposition property of the quantum states, we can avoid any disturbance from stealing any information during the process of private key communication. That is the reason why that it relies on two condition (a) there should exist the authenticated classical channel to verify the properties from the private key communication, and (b) it requires that the information gain is only possible when disturbing basis is not orthogonal to information.

One-Time Pad Encryption #

In cryptography, there are two types of encryption: symmetric and asymmetric encryption. Suppose Alice want to send the message to Bob by encryption. She can encrypt the message by a sequence of operations to encode it into scrambled characteristics (ciphertext), then send it to Bob. For the symmetric encryption, it means that if Bob would like to decode the ciphertext, he should perform the same operations which is so-called the “key” on them. However, for asymmetric encryption, the keys are different from Alice and Bob.

Security #

The security of this one-time pad encryption had been proved by Claude Shannon in 1949. If the following conditions are met, it’s hard to decode the ciphertext:

  1. The key must be long as the message (plaintext).
  2. The key should be generated randomly from chaotic and uncertain source
  3. The key only be used once and should be destroyed after communication.
  4. The key should be kept completely secret.

Example #

Suppose Alice want to send the message “Hello” to Bob. First, she can encode these words into the binary expression which can be shown as:

01001000 01100101 01101100 01101100 01101111  --palintext

Use the random generated ciphertext which both sides agree with to encrypt the message:

00101011 01100101 01110100 00110110 00011110  --private key

Then, Alice can apply the “XOR” operation on these two binary sequences that she obtains:

    01001000 01100101 01101100 01101100 01101111
XOR 00101011 01100101 01110100 00110110 00011110
----------------------------------------------------
    01100011 00000000 00011000 01011010 01110001  --ciphertext

Finally, Alice can send ciphertext to Bob without any concern. Even though eavesdropper retrieve the message during the communication, but he still can’t decode this ciphertext without the private key. That’s why Alice and Bob should keep the key completely secret to prevent eavesdropper decoding the message. As Bob receiving the message, he just performs the same operation on the ciphertext then he can get the correct information from Alice.

Description #

The image illustrates BB84 protocol.
Image illustrates the BB84 protocol. Ref: https://web.archive.org/web/20200130165639/http://researcher.watson.ibm.com/researcher/files/us-bennetc/BB84highest.pdf

Quantum Coin Tossing protocol is followed as image.
Quantum Coin Tossing protocol is followed as image. Ref: https://web.archive.org/web/20200130165639/http://researcher.watson.ibm.com/researcher/files/us-bennetc/BB84highest.pdf