main.tex (19933B)
1 \documentclass[a4paper]{article} 2 3 \usepackage[T1]{fontenc} 4 \usepackage[utf8]{inputenc} 5 6 \usepackage{mathptmx} 7 8 \usepackage[a4paper, total={6in, 8in}]{geometry} 9 \usepackage{subcaption} 10 \usepackage[shortlabels]{enumitem} 11 \usepackage{amssymb} 12 \usepackage{amsthm} 13 \usepackage{mathtools} 14 \usepackage{braket} 15 \usepackage{bbm} 16 \usepackage{graphicx} 17 \usepackage{float} 18 \usepackage{yhmath} 19 \usepackage{tikz} 20 \usetikzlibrary{calc,decorations.markings} 21 \usepackage[colorlinks=true,naturalnames=true,plainpages=false,pdfpagelabels=true]{hyperref} 22 \usepackage[parfill]{parskip} 23 \usepackage[backend=biber, sorting=none]{biblatex} 24 \newcommand{\hbbar}{{\raisebox{0.05ex}{$\mathchar '26$}\mkern -9mu\raisebox{-0.15ex}{$\mathchar '26$}\mkern -9muh}} 25 \addbibresource{uni.bib} 26 \pagestyle{myheadings} 27 \markright{Popovic, Vogel\hfill Teleportation and Quantum Cryptography \hfill} 28 29 30 \title{University of Vienna\\ Faculty of Physics\\ 31 \vspace{1.25cm}Lab-Course Theoretical Physics 2021S \\ Dispersion relations 32 } 33 \author{Milutin Popovic \& Tim Vogel \vspace{1cm}\\ Supervisor: Beatrix Hiesmyr} 34 \date{11. Juli, 2021} 35 36 \begin{document} 37 \maketitle 38 \noindent\rule[0.5ex]{\linewidth}{1pt} 39 \begin{abstract} 40 In this report we explore the ideas of teleportation and cryptography. First we discuss what teleportation means in a classical sense, we differ between transporting matter and transporting information. Then we prospect teleportation in the quantum world with a quantum computer. Finally we introduce the OTP encryption technique and explore the possibility of reducing the risk of an eves dropper by choosing the ansatz to generate a key with help of quantum theory, in cases of two and then three mutually unbiased bases. 41 \end{abstract} 42 \noindent\rule[0.5ex]{\linewidth}{1pt} 43 44 \tableofcontents 45 \section{Teleportation} 46 \subsection{Classical Teleportation} 47 In science fiction books, movies and video games the idea of teleportation, 48 that is almost instantaneous transportation, has been endorsed to full extent. 49 Real life realization of this concept would bring enormous advantages and solve 50 a lot of problems for humanity. This is partly allready put been into practice via 51 3D printers, but imagine we have constructed a technology that would allow us 52 to send matter over large distances almost instantaneously. We can discuss a 53 scenario where we would like to send an object or even a human body through 54 this apparatus, questions instantly arise. At which level would we decompose 55 the object so , how would we decompose and/or recompose it, how long would it take to send 56 the pieces from one location to another etc. ? Let's say we want to send a 57 human, decomposing it on the organ level doesn't really come into question 58 since the transportation time would be the same as for the whole human. 59 Going lower than the atom level decomposition would just take up too much 60 energy, since we would have to split up the atom in electrons, protons and 61 neutrons. The atom level decomposition sounds most promising since the 62 molecules are just too massive and would also require a lot of energy to 63 accelerate and wouldn't make the assembly process easier. 64 65 Now, how fast can we send the human body on the atom level, how long would it 66 take. An average human body is about $70\ \text{kg}$ and contains 67 approximately $7\cdot 10^{27}$ \cite{body}. 68 Let's say we can accelerate these atoms to $99\%$ the speed of light 69 ($v=0.99c$). But to accelerate atoms we need to ionize them, so we would need 70 to send an extra electron with the atom. 71 To transport one such atom of the human body from one location to the other 72 we quickly notice that distance is not a priority factor, e.g from earth to sun 73 (distance $150\cdot10^9\ \text{m}$), it would take around $t = 8.5\ \text{min}$ 74 for one such atom. But we need to send $7\cdot 10^{27}$ atoms, so sending them 75 one by one is not an option. If we can send one mole of particles ($N_A = 6.022 76 \cdot 10^{23}$) per second this would reduce the time required to transport 77 them significantly to about three hours and 15 minutes plus the transportation 78 time of one such atom to the destination. However if we sent all the atoms of a 79 human body, we would still need to deploy the information needed to reconstruct 80 it. In that case we could think about only sending the blueprint, since atoms 81 are not unique and can be a prerequisite for teleportation 82 on the other side of the teleport. 83 84 The idea of the blueprint type approach would be to map the human body 85 ($2x1x1m$) to a discrete space with a resolution of one lattice position 86 ($10^{-10}$) which is either filled with an atom (hydrogen, oxygen, calcium, 87 kalium) or doesn't contain an atom at all. This would allow us only to send 88 information, that is the blueprint, to the destination where we would 89 ultimately reconstruct the human body. This can be done by sending bits of 90 information, for instance one lattice position only requires three bits since 91 we need to encode 5 pieces of information, $\log_2(5) \simeq 3$.We can't round 92 down since we need to store at least 5 pieces of information . Alternatively we 93 could encode the information in two bits, or no bits at all. Meaning if the 94 encoder finds two bits then there is an atom of a specific kind and if it finds 95 no bits there is no atom. On the other hand a number with the resolution of 96 $10^{-10}$ has $10^{10}$ possibilities and can be encoded in $\log_2(10^{10}) 97 \simeq 34$ bits. We have $2\cdot10^{30}$ positions to cover, ultimately needing 98 around $\log_2((2\cdot10^{30})^5) \simeq 504$ bits. A light pulse frequency of 99 $5\cdot 10^{14}$ this would take us about $12\ \text{ps}$ to send all those 100 bits. 101 102 \subsection{Quantum Teleportation} 103 Consider a scenario where Alice is given a unknown quantum system, e.g. a qubit. 104 Even though she is not interested in what state the system is, she knows that 105 Bob wants the same quantum system. By examining different scenarios she 106 concludes that sending the qubit through a quantum channel, there will be a non 107 vanishing possibility that the state is changed. Thus she wants to send Bob the 108 information needed to construct an accurate copy of the quantum system. 109 110 Let's say that both Alice and Bob own an qubit, where the overall quantum state 111 is an entangled state, e.g. one of the Bell states. 112 \begin{align} 113 |e_1\rangle_{AB} := |\psi^-\rangle_{AB} = 114 \frac{1}{\sqrt{2}}\bigg(|0\rangle_A \otimes|1\rangle_B - |1\rangle_A 115 \otimes |0\rangle_B\bigg),\\ 116 |e_2\rangle_{AB} := |\psi^+\rangle_{AB} = 117 \frac{1}{\sqrt{2}}\bigg(|0\rangle_A \otimes|1\rangle_B + |1\rangle_A 118 \otimes |0\rangle_B\bigg),\\ 119 |e_3\rangle_{AB} := |\phi^-\rangle_{AB} = 120 \frac{1}{\sqrt{2}}\bigg(|0\rangle_A \otimes|0\rangle_B - |1\rangle_A 121 \otimes |1\rangle_B\bigg),\\ 122 |e_4\rangle_{AB} := |\phi^-\rangle_{AB} = 123 \frac{1}{\sqrt{2}}\bigg(|0\rangle_A \otimes|0\rangle_B + |1\rangle_A 124 \otimes |1\rangle_B\bigg),\\ 125 \end{align} 126 Without loss of generality we choose the state $|\phi^+\rangle_{AB}$ that Alice 127 and Bob have and the unknown quantum state 128 \begin{align} 129 |\phi\rangle_G = \alpha |0\rangle + \beta |1\rangle 130 \end{align} 131 with the normalization condition $|\alpha|^2 + |\beta|^2 = 1$. 132 133 We can describe these three particles with the following state 134 \begin{align} 135 |\Phi\rangle_G \otimes |\phi^+\beta_{AB} &= (\alpha|0\rangle_G +\beta |1\beta_G) 136 \otimes \frac{1}{\sqrt{2}} (|00\rangle_{AB} + |11\rangle_{AB})=\\ 137 &= \frac{1}{\sqrt{2}} (\alpha |00\rangle_{GA}\otimes |0\rangle_B 138 \alpha|01\rangle_{GA}\otimes |1\rangle_B\\ 139 &\;\;\;\;\;\;\;\;\;\;\;\;+\beta |10\rangle_{GA}\otimes |0\rangle_B + \beta 140 |11\rangle_{GA}\otimes 141 |1\rangle_B)\label{eq:factor}. 142 \end{align} 143 To formally write $\alpha$ and $\beta$ at Bobs states we need to 144 express the equation as the tensor product of the kets with the subscript 145 $GA$ with the subscript $B$, which can be done by rewriting the $GA$ kets as 146 a superposition of the Bell states 147 \begin{align} 148 |00\rangle_{GA} &= \frac{1}{\sqrt{2}}(|\phi^+\rangle_{GA}+ 149 |\phi^-\rangle_{GA}),\\ 150 |11\rangle_{GA} &= \frac{1}{\sqrt{2}}(|\phi^+\rangle_{GA} - 151 |\phi^-\rangle_{GA}),\\ 152 |01\rangle_{GA} &= \frac{1}{\sqrt{2}}(|\psi^+\rangle_{GA}+ 153 |\psi^-\rangle_{GA}),\\ 154 |10\rangle_{GA} &= \frac{1}{\sqrt{2}}(|\psi^+\rangle_{GA}- 155 |\psi^-\rangle_{GA}). 156 \end{align} 157 158 Substituting these into equation \ref{eq:factor} we get 159 \begin{align} 160 |\Phi\rangle_G \otimes |\phi^+\rangle_{AB} = \frac{1}{2} \big(& 161 |\psi^-\rangle \otimes ( -\beta|0\rangle + \alpha |1\rangle)\\ 162 +&|\psi^+\rangle \otimes ( \beta|0\rangle + \alpha|1\rangle)\\ 163 +&|\phi^-\rangle \otimes ( \alpha|0\rangle -\beta |1\rangle)\\ 164 +&|\phi^+\rangle \otimes ( \alpha|0\rangle + \beta|1\rangle) 165 \big). 166 \end{align} 167 Thus the unitäry transformation operators are 168 \begin{align} 169 U_{1} = 170 \begin{pmatrix} 171 0 & -1\\ 172 1 & 0 173 \end{pmatrix} \;\;\;\;\;\;\; 174 U_{2} = 175 \begin{pmatrix} 176 0 & 1\\ 177 1 & 0 178 \end{pmatrix}\\ 179 U_{3} = 180 \begin{pmatrix} 181 1 & 0\\ 182 0 & -1 183 \end{pmatrix} \;\;\;\;\;\;\; 184 U_{4} = 185 \begin{pmatrix} 186 1 & 0\\ 187 0 & 1 188 \end{pmatrix}. 189 \end{align} 190 With this Alice can send the unknown state $|\phi\rangle_G$ to Bob. For this 191 Alice needs to make a measurement in one of the Bell basis components 192 $\{|e_\lambda\rangle\}_{\lambda=1,2,3,4}$. Depending on this she operates on 193 the ket via $U_\lambda |\phi\rangle_B$ and bob needs to preform the opposite 194 measurement of $U_\lambda^\dagger$. 195 196 What if we would like to find out what state Bob possesses before or after Alice 197 performing the measurement on the system, without Bob knowing the outcome of 198 the measurement. 199 200 Before the measurement Bob's state is 201 \begin{align} 202 \varrho_{GAB} &= 203 (|\Phi\rangle_G \otimes |\phi^+\beta_{AB})(\langle\Phi|_G^\dagger\otimes 204 \langle\phi^+|_{AB}^\dagger)=\\ 205 &= 206 \begin{pmatrix}0 & 0 & 0 & 0 & 0 & 0 & 0 & 0\\0 & \frac{|\beta|^{2}}{2} & - 207 \frac{|\beta|^{2}}{2} & 0 & 0 & \frac{\alpha\beta^*}{2} & - 208 \frac{\alpha\beta^*}{2} & 0\\0 & - 209 \frac{|\beta|^{2}}{2} & \frac{|\beta|^{2}}{2} & 0 & 0 & - \frac{\alpha 210 \beta^*}{2} & \frac{\alpha \beta^*}{2} & 211 0\\0 & 0 & 0 & 0 & 0 & 0 & 0 & 0\\0 & 0 & 0 & 0 & 0 & 0 & 0 & 0\\0 & 212 \frac{\alpha^* 213 \beta}{2} & - \frac{\alpha^* \beta}{2} & 0 & 0 & \frac{|\alpha|^{2}}{2} & - 214 \frac{|\alpha|^{2}}{2} & 0\\0 & 215 - \frac{\alpha^* \beta}{2} & \frac{\alpha^* \beta}{2} & 0 & 0 & - 216 \frac{|\alpha|^{2}}{2} & \frac{|\alpha|^{2}}{2} & 217 0\\0 & 0 & 0 & 0 & 0 & 0 & 0 & 0\end{pmatrix}. 218 \end{align} 219 taking the trace over the $GA$ components gets us 220 \begin{align} 221 \text{Tr}_{GA}(\varrho_{GAB}) = \frac{1}{2} 222 \begin{pmatrix} 223 1 & 0 \\ 224 0 & 1 225 \end{pmatrix} 226 \end{align} 227 where we used $|\alpha|^2 + |\beta|^2 = 1$. 228 229 On the other hand after the measurement, Bob still doesn't know the outcome 230 and cannot apply the measurement $U_\lambda^\dagger$ for a 231 $\lambda$ provided by Alice. With this Bob has a chance of $\frac{1}{4}$th to 232 get the state $|\phi\rangle_G$. 233 \subsection{Teleportation on a Quantum computer} 234 We want to consider an algorithm, consisting of Hadamard gates, CNOT gates, and a measurement in the computational basis $(\ket{0},\ket{1})$ at the end. The Hadamard gates are given as $H=\frac{1}{\sqrt{2}}\begin{pmatrix} 235 1 & 1 \\ 236 1 & -1 \\ 237 \end{pmatrix}$ 238 and the CNOT gates as $\ket{0}\bra{0}\bigotimes\mathbb{I}+\ket{1}\bra{1}\bigotimes\sigma_1$. 239 The algorithm contains the following steps: 240 We input a set of three qubits, all in the state $\ket{0}$. We shall name them $q_1,q_2$ and $q_3$. At first we apply a Hadamard gate to $q_3$, followed by a CNOT gate to $q_2$ and $q_3$ in the second step. Then we apply a CNOT gate to the first two qubits, whereas a Hadamard gate is applied to the third one. For the last three steps, we start by applying a Hadamard gate onto the first two qubits in step three. For the fourth step we use a CNOT gate onto $q_2$ and $q_3$ and finally, we apply a Hadamard gate to the same two qubits and end with a measurement. So, if we input the state $I=\ket{000}$, going through all the above mentioned steps, we obtain as a result: 241 \begin{equation} 242 O=\frac{1}{2}(\ket{000}+\ket{010}+\ket{100}+\ket{110}) 243 \end{equation} 244 This means, Bob obtains the original $\ket{0}$ in any way he measures, and thus a teleportation is successful. What if we now consider an arbitrary state, given by: 245 \begin{equation} 246 \ket{\psi}=\alpha\ket{0}+\beta\ket{1}=q_1 247 \end{equation} 248 This means, our input now looks like 249 \begin{equation} 250 (\alpha\ket{0}+\beta\ket{1})\ket{00} 251 \end{equation} 252 As to expect, this input yields a different result: 253 \begin{equation} 254 O=\frac{\alpha}{2}(\ket{000}+\ket{010}+\ket{100}+\ket{110)}+\frac{\beta}{2}(\ket{001}+\ket{011}-\ket{101}-\ket{111}) 255 \end{equation} 256 \begin{equation} 257 =\frac{1}{\sqrt{2}}((\ket{\phi^+}+\ket{\psi^+})\alpha\ket{0}+(\ket{\phi^-}+\ket{\psi^-})\beta\ket{1}) 258 \end{equation} 259 This again completes a successful teleportation, since Bob will measure the Eigenvalue of $\ket{0}$ with a probability of $|\alpha|^2$ and the one of $\ket{1}$ with a probability of $|\beta|^2$, which is the same as measuring the initial state in the first place. 260 261 \section{Quantum Cryptography} 262 \subsection{One-Time-Pad} 263 Nowadays computers use sequences of bits, of 0's and 1's to encode information. 264 To represent the English alphabet, which consists of 26 letters, in a sequence 265 of bits, we need a series of 0's and 1's that have 26 possible outcomes. With 266 $N$ bits we can represent $2^N$ possible outcomes, which means the English 267 alphabet can be encoded in $\log_2(26) \rightarrow 5$ bits. Even thought $2^5 268 = 32$, we need to keep in mind that we need to encode at least $26$ different 269 outcomes which would then leave $6$ outcomes empty. Introducing capital 270 letters and special characters like ``!?\%\$\#...'', we ultimately need $8$ 271 bits defining $1$ byte. This type of character encoding ($8$-bit) is the 272 standard for electronic communication and is referred as ``American Standard 273 Code for Information Interchange'', ASCII for short. 274 275 The One-Time-Pad (OTP) is a encryption technique, that uses a one time single 276 use pre-shared key. Let's say we want to encrypt the massage "BYE" in ASII 277 encoding this would be 278 \begin{align} 279 010000100101100101000101. 280 \end{align} 281 With this bit sequence we add another randomly generated one which is called 282 the key. The operations used are the basic boolean algebra operations. 283 \begin{table}[H] 284 \centering 285 \begin{tabular}{l|c} 286 Massage: & $010000100101100101000101$\\ 287 Key: & $110101100110010101110011$ \\ 288 \hline 289 Code: & $100101000011110000110110$ 290 \end{tabular} 291 \end{table} 292 The same key decrypts the code into the massage. 293 \begin{table}[H] 294 \centering 295 \begin{tabular}{l|c} 296 Code : & $100101000011110000110110$\\ 297 Key: & $110101100110010101110011$ \\ 298 \hline 299 Massage : & $010000110100111101000011$ 300 \end{tabular} 301 \end{table} 302 303 It is mathematically proved, that if the key is really randomly generated, at 304 least the same length as the massage, only used once and only the sender and 305 the receiver are in possession of the key this encryption method is not 306 crackable. 307 308 \subsection{BB-84 Protocol} 309 To make OTP encryption more secure, a protocol based on quantum mechanics, the 310 BB-84 protocol is introduced. The BB-84 protocol allows us to generate a random key such that 311 it is much harder for an eavesdropper ``Eve'' to acquire it. The protocol calls for two 312 mutually unbiased bases and thus four possible outcomes. 313 This can be for example a polarized photon that is either 314 horizontally ($|H\rangle$), vertically ($|V\rangle$), $+45^\circ$ or 315 $-45^\circ$ polarized. We can translate $|H\rangle, |+45^\circ\rangle \equiv 0$ and 316 $|V\rangle, |-45^\circ\rangle \equiv 1$. In the Bra-Ket notation we can write 317 \begin{align} 318 |+45^\circ\rangle = \frac{1}{\sqrt{2}}(|H\rangle + |V\rangle),\\ 319 |-45^\circ\rangle = \frac{1}{\sqrt{2}}(|H\rangle - |V\rangle) 320 \end{align} 321 which can be achieved by rotating the polarization filter by $\pm 45^\circ$ in 322 the x-z axis. 323 324 All in all Alice has four states in her repertoire to choose from which 325 she then sends to Bob. Bob on the other hand can analyze the incoming photons 326 based on their polarization with a dual channel analyzer, where the $|H/V\rangle$ 327 analyzer distracts photons left/right and the $|\pm45^\circ\rangle$ analyzer distracts 328 photons left/right. 329 330 To construct a randomly generated key Alice writes down 331 a random sequence of bits, for a each $0$ she chooses from the states $|H\rangle$ or 332 $|+45^\circ\rangle$ and for each $1$ she chooses from the states $|V\rangle$ 333 and $|-45^\circ\rangle$. These polarized photons are sent to Bob's analyzer, 334 which leads to two possibilities, he either chose the correct basis on his 335 analyzer or he doesn't. Meaning that in the mean Bob chooses the right basis 336 $\frac{1}{2}$ of the time. After all photons are sent, Alice and Bob need to compare 337 the basis they chose (which they can do completely publicly) and cross of the 338 results where they choose the wrong basis. With this we have a randomly 339 generated key that can be used for OTP encryption. 340 341 The only way a third person, we called her Eve, can interfere is if she places 342 herself between Alice and Bob. For this Eve needs to measure the polarization 343 of the photon Alice sent, and then with this information send a photon to Bob. 344 If she doesn't send anything to Bob, Bob will notice somebody is interfering 345 and Eve would get caught. When the basis is then compared Eve will have the 346 same key Alice has. 347 348 Let us explore what would Bob get. Eve has a $\frac{1}{2}$ chance to choose the 349 same basis that Alice choose. This ultimately leads to a $\frac{1}{4}$ chance that Bob 350 and Alice have the wrong key, since Bob also needs to choose a basis. 351 352 To reduce the possibility that a third person is eavesdropping, Alice and Bob 353 need to compare a small part of their measurement results. This results in the 354 protocol needing to being carried out much longer for the sake of security. 355 356 \subsection{Six-State-Protocol} 357 The ``Six-state-protocol'' SSP is a generalization of the BB-84 protocol, where 358 instead of two, three mutually unbiased basis are used resulting in 6 states. 359 Thus, Alice and Bob have the chance of $\frac{1}{3}$ to choose the same basis, 360 meaning they would have to cross out $\frac{2}{3}$ of the results before 361 getting the key. 362 363 For Eve to not get detected there are two scenarios. In the first scenario she 364 would need to choose the same basis as Alice and Bob, that is a probability 365 of $\frac{1}{3}$ for each measurement. In the second scenario Eve 366 chooses the wrong basis but Bob measures in the right basis. Eve picking the 367 wrong basis happens with the probability of $\frac{2}{3}$, \textbf{after} that 368 Bob measuring in the correct basis would happen with the probability of 369 $\frac{1}{2}$, since we are dealing with MUBs. Meaning Eve remains undetected 370 with a probability of $\frac{1}{3}$. 371 372 For Eve to get detected she would need to measure the wrong results 373 ($\frac{2}{3}$) and \textbf{after} Bob needs to measure the wrong results 374 ($\frac{1}{2}$). Ultimately Eve gets detected with the probability of 375 $\frac{1}{3}$. 376 377 The probability to detect Eve trivially scales with the number of measurements, 378 meaning $P(\text{detected}) = 1 - (\frac{2}{3})^n$ where $n$ are the 379 number of measurements. On the other hand the chance of not being detected 380 after $n$ measurements is $P(\text{not detected}) = 1 - P(\text{detected}$, 381 of course this doesn't mean Eve managed to get the right key. For Eve to pick 382 the get the right key she would also additionally need to choose the right 383 basis. 384 385 To even further minimize the risk of an eavesdropper Alice and Bob could 386 compare small parts of their qubit string like in the BB-84 protocol. 387 \nocite{six-state} 388 \nocite{teleportation} 389 \printbibliography 390 \end{document}