Performance Evaluations of Quantum Key Distribution System Architectures
Performance Evaluations of Quantum Key Distribution System Architectures
Performance Evaluations of Quantum Key Distribution System Architectures
30
January/February 2015
The Emergence
of QKD-Enabled Cryptography
QKD systems are emerging in the cryptographic solution space, where many claim they function as unconditionally secure key distribution devices. (The term key
distribution is somewhat misleading as QKD systems
generate or grow shared secret keys from previously
established keys and dont merely distribute them.)
Figure 1 illustrates a QKD system configured to
generate shared secret key K for use in external bulk
encryptors. The architecture consists of a sender Alice,
a receiver Bob, an optical fiber quantum channel, and
a classical channel (that is, a conventional networked
Alice
Network
interface
CPU
Quantum
module
Bob
Classical channel
Quantum channel
Shared key K
Plaintext m
Encryptor
Network
interface
CPU
Quantum
module
Shared key K
Ciphertext Ek(m)
Encryptor
Plaintext m
Figure 1. Quantum key distribution (QKD) system. The architecture consists of a sender Alice, a receiver Bob, an optical fiber quantum
channel, and a classical channel. Alice and Bob each consist of a CPU, network interface, and quantum channel module (QCM). Additional
administrative and control signals are omitted for clarity.
connection). Alice and Bob each consist of a CPU, network interface, and quantum channel module (QCM).
The quantum channel is sensitive to physical disturbances such as ambient light and generally employs
otherwise unused dark fiber. The quantum and classical channels are often separated due to security and
performance sensitivities but might be multiplexed on
a single fiber.
QKD systems can be paired withand configured
to increase the security posture oftraditional symmetric encryption algorithms, such as Data Encryption Standard (DES), 3DES, and Advanced Encryption
Standard, through frequent rekeying. Alternatively,
QKD is often discussed in conjunction with one-timepad (OTP) encryptionenabling unconditionally
secure communicationsas it provides a feasible solution to OTPs stringent requirements: a truly random
key, key length equal to or greater than the length of the
message to be encrypted, and a key thats never reused.1
However, the challenge is to provide sufficient key
generation rates to meet realistic applications. For example, the ID Quantique Cerberis QKD server advertises
key generation rates up to 3 Kbps over a transmission
distance of 50 km.2 Other commercial offerings from
SeQureNet, QuintessenceLabs, MagiQ Technologies,
and Quantum Communication Technology have similar performance limitations.3
Implementation Nonidealities
In this article, we focus on a prepare-and-measure
BB84 QKD system with polarization-based encoding,
where qubits are encoded and decoded using four polarization states , , , and . The states are encoded by
randomly selecting a bit value (0 or 1) and a basis (horizontal/vertical or diagonal/antidiagonal ) and
decoded by randomly selecting a measuring basis ( or
). (See the QKD Prepare-and-Measure Encoding
sidebar.) The BB84 protocol assumes several idealities,
including610
on-demand single photon sources in Alice,
perfect single photon detection in Bob,
a lossless quantum channel, and
perfect basis alignment across the quantum channel.
However, these critical assumptions arent valid in
real-world systems. Reliable on-demand single photon
sources arent currently available, single photon detectors
31
TRENDS IN CRYPTOGRAPHY
ractical quantum key distribution (QKD) implementations often use prepare-and-measure protocols wherein a sender Alice prepares a quantum bit (qubit) by encoding a randomly selected
bit and basis, and a receiver Bob measures the qubit according to a
randomly selected basis. If Alices and Bobs bases agree, the encoded
qubit is read correctly with a very high probability; otherwise, a
random result occurs. Prepare-and-measure protocols primarily use
two types of modulation techniques, as Table A illustrates.
Polarization-based protocols encode and decode qubits using
horizontal (H = 0 degrees), vertical (V = 90 degrees), diagonal (D
Phase-based BB84
Receiver (Bob)
Sender (Alice)
Receiver (Bob)
Encoded
bit value
Encoding
basis
Encoded
polarization
state ()
in degrees
Measuring
basis
Measured
bit value
Encoded
bit value
Encoding
phase shift
(A in
radians)
Measuring
phase shift
(B in
radians)
Phase
interference
(B A
in radians)
Measured
bit value
H/V
H=0
H/V
H/V
H=0
D/A
0 or 1
/2
3/2
0 or 1
H/V
V = 90
H/V
H/V
V = 90
D/A
0 or 1
/2
/2
0 or 1
D/A
A = 45
H/V
0 or 1
/2
/2
0 or 1
D/A
A = 45
D/A
/2
/2
D/A
D = 45
H/V
0 or 1
3/2
3/2
0 or 1
D/A
D = 45
D/A
3/2
/2
Note: H, V, D, and A represent the horizontal, vertical, diagonal, and antidiagonal polarization states; these polarization states are sometimes
represented with bidirectional arrows , , , and . Furthermore, while H/V and D/A represent the rectilinear and diagonal orthogonal basis
sets, theyre often represented as and .
Quantum Hacking
With increased interest in and availability of QKD
technologies, quantum hacking has become a specialty area.11 QKD systems are vulnerable to attacks
over the quantum channel, including man in the
January/February 2015
Description
Authentication
Authentication occurs over the classical channeltypically a point-to-point networked connectionand might
or might not involve encryption. (QKD security proofs dont require the classical channel to be encrypted.) The
authenticated classical channel is used to control the QKD process, and transactional authentication is assumed
to ensure secure transmission.
Quantum exchange
The sender encodes information onto quantum bits (qubits) using a randomly selected basis and bit value, and
sends them to the receiver over the quantum channeltypically a dedicated optical fiber. The receiver randomly
selects a basis to measure each qubit. This phase generates raw key bits in which the quality of randomness can
be assured through certified quantum random number generators in both the sender and receiver.79
The sender and receiver exchange basis information for each qubit. If the receiver measures the qubit in the
same basis as the sender encoded it, the bit value will be obtained with a high degree of accuracy. If the receiver
measures qubits in the wrong basis, a random result occurs and it needs to be sifted out from both the senders
and receivers raw key bits. This results in a shared sifted key (in both Alice and Bob) approximately half the
length of the raw key. Note that the sender and receiver expose only the bases and not the bit values.
Error estimation
The sender and receiver exchange a portion of sifted key bits over the public channel to estimate the sifted keys
quantum bit error rate (QBER). If the estimated QBER is higher than a user-defined threshold, an unauthorized
third party is assumed to be eavesdropping on the quantum channel, and the process is aborted and restarted.
The estimated QBER can be used as an input parameter for error reconciliation.
Error reconciliation
Error reconciliation is a two-way error correction of discrepancies between the distributed sifted key bits.
Reconciliation occurs over the classical channel and leaks information about the potential key based on the
efficiency of the algorithm selected. The actual QBER is calculated after error reconciliation and used as the
primary QKD secret key check. If the QBER is higher than a predetermined security threshold, eavesdropping is
assumed and the process is aborted and restarted.
Entropy loss attempts to quantify the amount of information exposed to an eavesdropper during the key
distribution process based on the QBER and amount of information exposed during error reconciliation.
While the QBER is relatively fixed for a given architecture, the amount of information lost can be thought of as
exposed parity bits on a variable number of increasingly smaller block sizes based on the number and placement
of errors in the sifted key.
Privacy amplification
Privacy amplification is an information theory technique that ensures the eavesdropper has negligible
information regarding the final key based on the entropy loss estimation. This results in a smaller, securer key.
A hash of the privacy-amplified key is produced and shared with the sender and receiver to ensure the final key
is the same. If the hashes match, the QKD system has successfully generated shared secret keying material.
TRENDS IN CRYPTOGRAPHY
|V
PV = ||2
|= |H+ |V
Detector
|= |H+ |V
(1)
|H
(2)
PH = ||2
Detector
34
1
1
|H +
|V
2
2
January/February 2015
photon sources; transmission mediums; error reconciliation methods; privacy amplification solutions; photon detector technologies; and various combinations of
optical, electro-optical, and electronic devices.
QKD systems are designed to securely distribute cryptographic keys, and securityperformance tradeoffs
should factor in the systems purpose and operational
environment. System performance is generally defined
by the desired capability (that is, a secret key rate) and
the intended application (that is, a transmission distance), while security is described by theoretical proofs
tempered by nonideal implementations assuming a
quality random key certified by the National Institute of
Standards and Technology.79
The creation of an ideal single photon source is an
excellent example of a securityperformance tradeoff.
Because on-demand single photon sources arent currently feasible, Alice attenuates a classical laser pulse
down from millions of photons to a mean photon number (MPN) of 0.1, according to QKD security proofs.7
A Poisson distribution probabilistically represents this
low energy level
P (n |)=
ne
,
n!
TRENDS IN CRYPTOGRAPHY
Alice QCM
Signal pulse
generator
Pulse
modulator
Decoy state
generation
Quantum-level
attenuator
Optical
security layer
Beam coupler
Switch
Timing pulse
generator
Power monitor
feedback
PolM
S
DET
Bob QCM
Input stage
filter
Polarization
correction
controller
Polarization
detector
Single photon
detectors
DET
DET
DET
DET
Figure 2. Decomposed Alice and Bob quantum channel modules (QCMs). The quantum communication path is used to prepare and measure
polarization-based qubits. Each subsystem includes one or more optical components and controllers modeled in a modular fashion with
configurable operational parameters.
Mean photon
number
Signal
0.5
60
251,501
41,140
Pulses
sent
Detection
count
Decoy
0.2
30
124,837
8,854
Vacuum
Approx. 0+
10
41,662
Total
100
418,000
50,000
QBER
0.0119
15,439
Mean photon
number
Signal
0.8
70
217,825
47,775
Decoy
0.1
20
62,179
2,223
Vacuum
Approx. 0+
10
30,996
Total
100
311,000
50,000
Pulses
sent
Detection
count
QBER
0.0164
Pulses sent
Detection
count
926,269
41,529
463,235
8,459
154,496
12
1,544,000
50,000
QBER
Final key
size
0.0033
15,562
17,975
Pulses sent
Detection
count
781,727
47,930
223,123
2,063
112,150
1,117,000
50,000
QBER
Final key
size
0.0051
18,020
maximum detection rates (due to long dead times necessary to prevent erroneous after pulse detections).14
SPD performance is further limited by dark counts and
jitter time (that is, variance in detector response once
a photon is received). Although these limitations can
be partially mitigated by advanced control circuitry,
theyre inherent to the devices material makeup and
operational environment. In addition, SPDs can play
an important role in security as the capability to precisely determine the number of photons receivedand
therefore multiphoton pulses senthelps to mitigate
photon-splitting attacks on the quantum channel.
In this study, we consider the efficiency, maximum
count rate, dead time, jitter time, dark count probability,
and temperature sensitivity of avalanche photodiodes,
superconducting nanowire SPDs, and transition edge
sensors (see Table 3). We determine system performance from a simulated transmission of 1,000,000
qubits through the architecture, reporting the scenario
detection count and operational time. As the relatively
low detection counts indicate, QKD systems generally have poor throughput due to the sources Poissonian nature (1/10 pulses contains a photon) and high
transmission losses through the fiber channel (approximately 50 percent over 15 km).
Avalanche photodiodes are classical optical detectors reverse-biased with higher-than-normal voltage,
causing them to become sensitive to single photons.
Despite their seemingly poor performance, avalanche
photodiodes are implemented with inexpensive thermal-electric coolers owing to their relatively low production costs and ability to operate in close proximity
to room temperature.
37
TRENDS IN CRYPTOGRAPHY
Table 3. Single photon detector (SPD) evaluation for secret key generation.
Competing
detector
technologies
Detector
efficiency
at 1,550
nm
Maximum
detection
rate (Hz)
Dead time
(s)
Jitter
time
(ps)
Dark
count
(1/s)
Operating
temperature
(K)
Relative
cost
Photon
resolving
Scenario
detection
count
Scenario
operation
time (s)
Ideal SPD
100%
Approx. 0+
0.0
0.0
295
N/A
39,016
Avalanche
photodiode
10%*
10 kHz*
100*
370*
Approx.
91*
200*
Low
4,059
100
Superconducting
nanowire SPD
57%*
1 GHz*
0.01*
30*
Approx.
0+*
1.5 to 4*
High
22,457
0.001
Transition edge
sensor
95%*
100 kHz*
10*
100,000*
Approx.
0+*
0.1*
High
37,323
10
* Values are from Single-Photon Detectors for Optical Quantum Information Applications.14 The ideal SPD is a baseline to compare performance parameters.
Orientation (deg)
(a)
270
225
180
135
90
45
0
Pulse polarization
Transmitted at Alice
Received at Bob
10
15
Polarization rate of change
20
Rate (deg/ms)
30
30
(b)
25
Polarization controller
Correction threshold
Polarization error rate
25
20
15
5
0
10
15
20
25
30
Rate (%/sec)
20
(c)
>20%
15
QBER threshold
System QBER
10
5
0
10
15
Time (sec)
20
25
30
Figure 3. Polarization correction for aerial fiber disturbances. During this simulated 30-second quantum communication
period, Alice sends Bob 15 million reference pulses T subject to physical disturbances. Under normal operating conditions
or moderate stresses, the polarization error can be corrected. However, when significant environmental or physical stresses
exist, adverse effects on key throughput are likely.
ur future efforts will include studying alternate QKD architectures, exploring emerging
applications such as satellite-based QKD, and modeling notional capabilities. We also want to model and
conduct multicriteria performance analyses to mitigate the risk of unwanted emergent behaviors, discover
unknown dependencies, and confidently meet strict
performance and security requirements.
Acknowledgments
The Laboratory for Telecommunication Sciences grant
5743400-304-6448 supported this work. The views expressed
in this article are those of the authors and do not reflect the
official policy or position of the US Air Force, the US Department of Defense, or the US government.
References
1. C. Elliott, Quantum Cryptography, IEEE Security & Privacy, vol. 2, no. 4, 2004, pp. 5761.
2. Layer 2 Link Encryption with Quantum Key Distribution,
39
TRENDS IN CRYPTOGRAPHY
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Installed in a Field Environment of Tokyo Metropolitan Area, J. Lightwave Technology, vol. 32, no. 1, 2014,
pp. 141151.
Logan O. Mailloux is a commissioned officer in the US
www.computer.org/itpro
40