tprak

Theoretical Physics Practical Training
git clone git://popovic.xyz/tprak.git
Log | Files | Refs

main.tex (19933B)


      1 \documentclass[a4paper]{article}
      2 
      3 \usepackage[T1]{fontenc}
      4 \usepackage[utf8]{inputenc}
      5 
      6 \usepackage{mathptmx}
      7 
      8 \usepackage[a4paper, total={6in, 8in}]{geometry}
      9 \usepackage{subcaption}
     10 \usepackage[shortlabels]{enumitem}
     11 \usepackage{amssymb}
     12 \usepackage{amsthm}
     13 \usepackage{mathtools}
     14 \usepackage{braket}
     15 \usepackage{bbm}
     16 \usepackage{graphicx}
     17 \usepackage{float}
     18 \usepackage{yhmath}
     19 \usepackage{tikz}
     20 \usetikzlibrary{calc,decorations.markings}
     21 \usepackage[colorlinks=true,naturalnames=true,plainpages=false,pdfpagelabels=true]{hyperref}
     22 \usepackage[parfill]{parskip}
     23 \usepackage[backend=biber, sorting=none]{biblatex}
     24 \newcommand{\hbbar}{{\raisebox{0.05ex}{$\mathchar '26$}\mkern -9mu\raisebox{-0.15ex}{$\mathchar '26$}\mkern -9muh}}
     25 \addbibresource{uni.bib}
     26 \pagestyle{myheadings}
     27 \markright{Popovic, Vogel\hfill Teleportation and Quantum Cryptography \hfill}
     28 
     29 
     30 \title{University of Vienna\\ Faculty of Physics\\
     31 \vspace{1.25cm}Lab-Course Theoretical Physics 2021S \\ Dispersion relations
     32 }
     33 \author{Milutin Popovic \& Tim Vogel \vspace{1cm}\\ Supervisor: Beatrix Hiesmyr}
     34 \date{11. Juli, 2021}
     35 
     36 \begin{document}
     37 \maketitle
     38 \noindent\rule[0.5ex]{\linewidth}{1pt}
     39 \begin{abstract}
     40 In this report we explore the ideas of teleportation and cryptography. First we discuss what teleportation means in a classical sense, we differ between transporting matter and transporting information. Then we prospect teleportation in the quantum world with a quantum computer. Finally we introduce the OTP encryption technique and explore the possibility of reducing the risk of an eves dropper by choosing the ansatz to generate a key with help of quantum theory, in cases of two and then three mutually unbiased bases.
     41 \end{abstract}
     42 \noindent\rule[0.5ex]{\linewidth}{1pt}
     43 
     44 \tableofcontents
     45 \section{Teleportation}
     46 \subsection{Classical Teleportation}
     47 In science fiction books, movies and video games the idea of teleportation,
     48 that is almost instantaneous transportation, has been endorsed to full extent.
     49 Real life realization of this concept would bring enormous advantages and solve
     50 a lot of problems for humanity. This is partly allready put been into practice via
     51 3D printers, but imagine we have constructed a technology that would allow us
     52 to send matter over large distances almost instantaneously. We can discuss a
     53 scenario where we would like to send an object or even a human body through
     54 this apparatus, questions instantly arise.  At which level would we decompose
     55 the object so , how would we decompose and/or recompose it, how long would it take to send
     56 the pieces from one location to another etc. ? Let's say we want to send a
     57 human, decomposing it on the organ level doesn't really come into question
     58 since the transportation time would be the same as for the whole human.
     59 Going lower than the atom level decomposition would just take up too much
     60 energy, since we would have to split up the atom in electrons, protons and
     61 neutrons. The atom level decomposition sounds most promising since the
     62 molecules are just too massive and would also require a lot of energy to
     63 accelerate and wouldn't make the assembly process easier.
     64 
     65 Now, how fast can we send the human body on the atom level, how long would it
     66 take. An average human body is about $70\ \text{kg}$ and contains
     67 approximately $7\cdot 10^{27}$ \cite{body}.
     68 Let's say we can accelerate these atoms to  $99\%$ the speed of light
     69 ($v=0.99c$). But to accelerate atoms we need to ionize them, so we would need
     70 to send an extra electron with the atom.
     71 To transport one such atom of the human body from one location to the other
     72 we quickly notice that distance is not a priority factor, e.g from earth to sun
     73 (distance $150\cdot10^9\ \text{m}$), it would take around $t = 8.5\ \text{min}$
     74 for one such atom. But we need to send $7\cdot 10^{27}$ atoms, so sending them
     75 one by one is not an option. If we can send one mole of particles ($N_A = 6.022
     76 \cdot 10^{23}$)  per second this would reduce the time required to transport
     77 them significantly to about three hours and 15 minutes plus the transportation
     78 time of one such atom to the destination. However if we sent all the atoms of a
     79 human body, we would still need to deploy the information needed to reconstruct
     80 it. In that case we could think about only sending the blueprint, since atoms
     81 are not unique and can be a prerequisite for teleportation
     82 on the other side of the teleport.
     83 
     84 The idea of the blueprint type approach would be to map the human body
     85 ($2x1x1m$) to a discrete space with a resolution of one lattice position
     86 ($10^{-10}$) which is either filled with an atom (hydrogen, oxygen, calcium,
     87 kalium) or doesn't contain an atom at all.  This would allow us only to send
     88 information, that is the blueprint, to the destination where we would
     89 ultimately reconstruct the human body. This can be done by sending bits of
     90 information, for instance one lattice position only requires three bits since
     91 we need to encode 5 pieces of information, $\log_2(5) \simeq 3$.We can't round
     92 down since we need to store at least 5 pieces of information . Alternatively we
     93 could encode the information in two bits, or no bits at all. Meaning if the
     94 encoder finds two bits then there is an atom of a specific kind and if it finds
     95 no bits there is no atom. On the other hand a number with the resolution of
     96 $10^{-10}$ has $10^{10}$ possibilities and can be encoded in $\log_2(10^{10})
     97 \simeq 34$ bits. We have $2\cdot10^{30}$ positions to cover, ultimately needing
     98 around $\log_2((2\cdot10^{30})^5) \simeq 504$ bits. A light pulse frequency of
     99 $5\cdot 10^{14}$ this would take us about $12\ \text{ps}$ to send all those
    100 bits.
    101 
    102 \subsection{Quantum Teleportation}
    103 Consider a scenario where Alice is given a unknown quantum system, e.g. a qubit.
    104 Even though she is not interested in what state the system is, she knows that
    105 Bob wants the same quantum system. By examining different scenarios she
    106 concludes that sending the qubit through a quantum channel, there will be a non
    107 vanishing possibility that the state is changed. Thus she wants to send Bob the
    108 information needed to construct an accurate copy of the quantum system.
    109 
    110 Let's say that both Alice and Bob own an qubit, where the overall quantum state
    111 is an entangled state, e.g. one of the Bell states.
    112 \begin{align}
    113     |e_1\rangle_{AB} := |\psi^-\rangle_{AB} =
    114     \frac{1}{\sqrt{2}}\bigg(|0\rangle_A \otimes|1\rangle_B - |1\rangle_A
    115     \otimes |0\rangle_B\bigg),\\
    116     |e_2\rangle_{AB} := |\psi^+\rangle_{AB} =
    117     \frac{1}{\sqrt{2}}\bigg(|0\rangle_A \otimes|1\rangle_B + |1\rangle_A
    118     \otimes |0\rangle_B\bigg),\\
    119     |e_3\rangle_{AB} := |\phi^-\rangle_{AB} =
    120     \frac{1}{\sqrt{2}}\bigg(|0\rangle_A \otimes|0\rangle_B - |1\rangle_A
    121     \otimes |1\rangle_B\bigg),\\
    122     |e_4\rangle_{AB} := |\phi^-\rangle_{AB} =
    123     \frac{1}{\sqrt{2}}\bigg(|0\rangle_A \otimes|0\rangle_B + |1\rangle_A
    124     \otimes |1\rangle_B\bigg),\\
    125 \end{align}
    126 Without loss of generality we choose the state $|\phi^+\rangle_{AB}$ that Alice
    127 and Bob have and the unknown quantum state
    128 \begin{align}
    129     |\phi\rangle_G = \alpha |0\rangle + \beta |1\rangle
    130 \end{align}
    131 with the normalization condition $|\alpha|^2 + |\beta|^2 = 1$.
    132 
    133 We can describe these three particles with the following state
    134 \begin{align}
    135     |\Phi\rangle_G \otimes |\phi^+\beta_{AB} &= (\alpha|0\rangle_G +\beta |1\beta_G)
    136     \otimes \frac{1}{\sqrt{2}} (|00\rangle_{AB} + |11\rangle_{AB})=\\
    137     &= \frac{1}{\sqrt{2}} (\alpha |00\rangle_{GA}\otimes |0\rangle_B
    138     \alpha|01\rangle_{GA}\otimes |1\rangle_B\\
    139     &\;\;\;\;\;\;\;\;\;\;\;\;+\beta |10\rangle_{GA}\otimes |0\rangle_B + \beta
    140     |11\rangle_{GA}\otimes
    141     |1\rangle_B)\label{eq:factor}.
    142 \end{align}
    143 To formally write $\alpha$ and $\beta$ at Bobs states we need to
    144 express the equation as the tensor product of the kets with the subscript
    145 $GA$ with the subscript $B$, which can be done by rewriting the $GA$ kets as
    146 a superposition of the Bell states
    147 \begin{align}
    148     |00\rangle_{GA} &= \frac{1}{\sqrt{2}}(|\phi^+\rangle_{GA}+
    149     |\phi^-\rangle_{GA}),\\
    150     |11\rangle_{GA} &= \frac{1}{\sqrt{2}}(|\phi^+\rangle_{GA} -
    151     |\phi^-\rangle_{GA}),\\
    152     |01\rangle_{GA} &= \frac{1}{\sqrt{2}}(|\psi^+\rangle_{GA}+
    153     |\psi^-\rangle_{GA}),\\
    154     |10\rangle_{GA} &= \frac{1}{\sqrt{2}}(|\psi^+\rangle_{GA}-
    155     |\psi^-\rangle_{GA}).
    156 \end{align}
    157 
    158 Substituting these into equation \ref{eq:factor} we get
    159 \begin{align}
    160     |\Phi\rangle_G \otimes |\phi^+\rangle_{AB} = \frac{1}{2} \big(&
    161      |\psi^-\rangle \otimes ( -\beta|0\rangle + \alpha |1\rangle)\\
    162     +&|\psi^+\rangle \otimes ( \beta|0\rangle +  \alpha|1\rangle)\\
    163     +&|\phi^-\rangle \otimes ( \alpha|0\rangle -\beta |1\rangle)\\
    164     +&|\phi^+\rangle \otimes ( \alpha|0\rangle +  \beta|1\rangle)
    165         \big).
    166 \end{align}
    167 Thus the unitäry transformation operators are
    168 \begin{align}
    169     U_{1} =
    170     \begin{pmatrix}
    171         0 & -1\\
    172         1 & 0
    173     \end{pmatrix} \;\;\;\;\;\;\;
    174     U_{2} =
    175     \begin{pmatrix}
    176         0 & 1\\
    177         1 & 0
    178     \end{pmatrix}\\
    179     U_{3} =
    180     \begin{pmatrix}
    181         1 & 0\\
    182         0 & -1
    183     \end{pmatrix} \;\;\;\;\;\;\;
    184     U_{4} =
    185     \begin{pmatrix}
    186         1 & 0\\
    187         0 & 1
    188     \end{pmatrix}.
    189 \end{align}
    190 With this Alice can send the unknown state $|\phi\rangle_G$ to Bob. For this
    191 Alice needs to make a measurement in one of the Bell basis components
    192 $\{|e_\lambda\rangle\}_{\lambda=1,2,3,4}$. Depending on this she operates on
    193 the ket via $U_\lambda |\phi\rangle_B$ and bob needs to preform the opposite
    194 measurement of $U_\lambda^\dagger$.
    195 
    196 What if we would like to find out what state Bob possesses before or after Alice
    197 performing the measurement on the system, without Bob knowing the outcome of
    198 the measurement.
    199 
    200 Before the measurement Bob's state is
    201 \begin{align}
    202     \varrho_{GAB} &=
    203     (|\Phi\rangle_G \otimes |\phi^+\beta_{AB})(\langle\Phi|_G^\dagger\otimes
    204     \langle\phi^+|_{AB}^\dagger)=\\
    205     &=
    206 \begin{pmatrix}0 & 0 & 0 & 0 & 0 & 0 & 0 & 0\\0 & \frac{|\beta|^{2}}{2} & -
    207     \frac{|\beta|^{2}}{2} & 0 & 0 & \frac{\alpha\beta^*}{2} & -
    208     \frac{\alpha\beta^*}{2} & 0\\0 & -
    209 \frac{|\beta|^{2}}{2} & \frac{|\beta|^{2}}{2} & 0 & 0 & - \frac{\alpha
    210     \beta^*}{2} & \frac{\alpha \beta^*}{2} &
    211 0\\0 & 0 & 0 & 0 & 0 & 0 & 0 & 0\\0 & 0 & 0 & 0 & 0 & 0 & 0 & 0\\0 &
    212     \frac{\alpha^*
    213 \beta}{2} & - \frac{\alpha^* \beta}{2} & 0 & 0 & \frac{|\alpha|^{2}}{2} & -
    214     \frac{|\alpha|^{2}}{2} & 0\\0 &
    215 - \frac{\alpha^* \beta}{2} & \frac{\alpha^* \beta}{2} & 0 & 0 & -
    216     \frac{|\alpha|^{2}}{2} & \frac{|\alpha|^{2}}{2} &
    217 0\\0 & 0 & 0 & 0 & 0 & 0 & 0 & 0\end{pmatrix}.
    218 \end{align}
    219 taking the trace over the $GA$ components gets us
    220 \begin{align}
    221     \text{Tr}_{GA}(\varrho_{GAB}) = \frac{1}{2}
    222     \begin{pmatrix}
    223         1 & 0 \\
    224         0 & 1
    225     \end{pmatrix}
    226 \end{align}
    227 where we used $|\alpha|^2 + |\beta|^2 = 1$.
    228 
    229 On the other hand after the measurement, Bob still doesn't know the outcome
    230 and cannot apply the measurement $U_\lambda^\dagger$ for a
    231 $\lambda$ provided by Alice. With this Bob has a chance of $\frac{1}{4}$th to
    232 get the state $|\phi\rangle_G$.
    233 \subsection{Teleportation on a Quantum computer}
    234 We want to consider an algorithm, consisting of Hadamard gates, CNOT gates, and a measurement in the computational basis $(\ket{0},\ket{1})$ at the end. The Hadamard gates are given as $H=\frac{1}{\sqrt{2}}\begin{pmatrix}
    235     1 & 1 \\
    236     1 & -1 \\
    237 \end{pmatrix}$
    238 and the CNOT gates as $\ket{0}\bra{0}\bigotimes\mathbb{I}+\ket{1}\bra{1}\bigotimes\sigma_1$.
    239 The algorithm contains the following steps:
    240 We input a set of three qubits, all in the state $\ket{0}$. We shall name them $q_1,q_2$ and $q_3$. At first we apply a Hadamard gate to $q_3$, followed by a CNOT gate to $q_2$ and $q_3$ in the second step. Then we apply a CNOT gate to the first two qubits, whereas a Hadamard gate is applied to the third one. For the last three steps, we start by applying a Hadamard gate onto the first two qubits in step three. For the fourth step we use a CNOT gate onto $q_2$ and $q_3$ and finally, we apply a Hadamard gate to the same two qubits and end with a measurement. So, if we input the state $I=\ket{000}$, going through all the above mentioned steps, we obtain as a result:
    241 \begin{equation}
    242     O=\frac{1}{2}(\ket{000}+\ket{010}+\ket{100}+\ket{110})
    243 \end{equation}
    244 This means, Bob obtains the original $\ket{0}$ in any way he measures, and thus a teleportation is successful. What if we now consider an arbitrary state, given by:
    245 \begin{equation}
    246     \ket{\psi}=\alpha\ket{0}+\beta\ket{1}=q_1
    247 \end{equation}
    248 This means, our input now looks like
    249 \begin{equation}
    250     (\alpha\ket{0}+\beta\ket{1})\ket{00}
    251 \end{equation}
    252 As to expect, this input yields a different result:
    253 \begin{equation}
    254     O=\frac{\alpha}{2}(\ket{000}+\ket{010}+\ket{100}+\ket{110)}+\frac{\beta}{2}(\ket{001}+\ket{011}-\ket{101}-\ket{111})
    255 \end{equation}
    256 \begin{equation}
    257     =\frac{1}{\sqrt{2}}((\ket{\phi^+}+\ket{\psi^+})\alpha\ket{0}+(\ket{\phi^-}+\ket{\psi^-})\beta\ket{1})
    258 \end{equation}
    259 This again completes a successful teleportation, since Bob will measure the Eigenvalue of $\ket{0}$ with a probability of $|\alpha|^2$ and the one of $\ket{1}$ with a probability of $|\beta|^2$, which is the same as measuring the initial state in the first place.
    260 
    261 \section{Quantum Cryptography}
    262 \subsection{One-Time-Pad}
    263 Nowadays computers use sequences of bits, of 0's and 1's to encode information.
    264 To represent the English alphabet, which consists of 26 letters, in a sequence
    265 of bits, we need a series of 0's and 1's that have 26 possible outcomes. With
    266 $N$ bits we can represent $2^N$ possible outcomes, which means the English
    267 alphabet can be encoded in $\log_2(26) \rightarrow 5$ bits.  Even thought $2^5
    268 = 32$, we need to keep in mind that we need to encode at least $26$ different
    269 outcomes which would then leave $6$ outcomes empty.  Introducing capital
    270 letters and special characters like ``!?\%\$\#...'', we ultimately need $8$
    271 bits defining $1$ byte. This type of character encoding ($8$-bit) is the
    272 standard for electronic communication and is referred as ``American Standard
    273 Code for Information Interchange'', ASCII for short.
    274 
    275 The One-Time-Pad (OTP) is a encryption technique, that uses a one time single
    276 use pre-shared key. Let's say we want to encrypt the massage "BYE" in ASII
    277 encoding this would be
    278 \begin{align}
    279         010000100101100101000101.
    280 \end{align}
    281 With this bit sequence we add another randomly generated one which is called
    282 the key. The operations used are the basic boolean algebra operations.
    283 \begin{table}[H]
    284     \centering
    285     \begin{tabular}{l|c}
    286         Massage: &  $010000100101100101000101$\\
    287         Key:     &  $110101100110010101110011$ \\
    288         \hline
    289         Code:   &   $100101000011110000110110$
    290     \end{tabular}
    291 \end{table}
    292 The same key decrypts the code into the massage.
    293 \begin{table}[H]
    294     \centering
    295     \begin{tabular}{l|c}
    296         Code : &  $100101000011110000110110$\\
    297         Key:     & $110101100110010101110011$ \\
    298         \hline
    299         Massage :   & $010000110100111101000011$
    300     \end{tabular}
    301 \end{table}
    302 
    303 It is mathematically proved, that if the key is really randomly generated, at
    304 least the same length as the massage, only used once and only the sender and
    305 the receiver are in possession of the key this encryption method is not
    306 crackable.
    307 
    308 \subsection{BB-84 Protocol}
    309 To make OTP encryption more secure, a protocol based on quantum mechanics, the
    310 BB-84 protocol is introduced. The BB-84 protocol allows us to generate a random key such that
    311 it is much harder for an eavesdropper ``Eve'' to acquire it. The protocol calls for two
    312 mutually unbiased bases and thus four possible outcomes.
    313 This can be for example a polarized photon that is either
    314 horizontally ($|H\rangle$), vertically ($|V\rangle$), $+45^\circ$ or
    315 $-45^\circ$ polarized. We can translate $|H\rangle, |+45^\circ\rangle \equiv 0$ and
    316 $|V\rangle, |-45^\circ\rangle \equiv 1$.  In the Bra-Ket notation we can write
    317 \begin{align}
    318         |+45^\circ\rangle = \frac{1}{\sqrt{2}}(|H\rangle + |V\rangle),\\
    319         |-45^\circ\rangle = \frac{1}{\sqrt{2}}(|H\rangle - |V\rangle)
    320 \end{align}
    321 which can be achieved by rotating the polarization filter by $\pm 45^\circ$ in
    322 the x-z axis.
    323 
    324 All in all Alice has four states in her repertoire to choose from which
    325 she then sends to Bob. Bob on the other hand can analyze the incoming photons
    326 based on their polarization with a dual channel analyzer, where the $|H/V\rangle$
    327 analyzer distracts photons left/right and the $|\pm45^\circ\rangle$ analyzer distracts
    328 photons left/right.
    329 
    330 To construct a randomly generated key Alice writes down
    331 a random sequence of bits, for a each $0$ she chooses from the states $|H\rangle$ or
    332 $|+45^\circ\rangle$ and for each $1$ she chooses from the states $|V\rangle$
    333 and $|-45^\circ\rangle$. These polarized photons are sent to Bob's analyzer,
    334 which leads to two possibilities, he either chose the correct basis on his
    335 analyzer or he doesn't. Meaning that in the mean Bob chooses the right basis
    336 $\frac{1}{2}$ of the time. After all photons are sent, Alice and Bob need to compare
    337 the basis they chose (which they can do completely publicly) and cross of the
    338 results where they choose the wrong basis. With this we have a randomly
    339 generated key that can be used for OTP encryption.
    340 
    341 The only way a third person, we called her Eve, can interfere is if she places
    342 herself between Alice and Bob. For this Eve needs to measure the polarization
    343 of the photon Alice sent, and then with this information send a photon to Bob.
    344 If she doesn't send anything to Bob, Bob will notice somebody is interfering
    345 and Eve would get caught. When the basis is then compared Eve will have the
    346 same key Alice has.
    347 
    348 Let us explore what would Bob get. Eve has a $\frac{1}{2}$ chance to choose the
    349 same basis that Alice choose. This ultimately leads to a $\frac{1}{4}$ chance that Bob
    350 and Alice have the wrong key, since Bob also needs to choose a basis.
    351 
    352 To reduce the possibility that a third person is eavesdropping, Alice and Bob
    353 need to compare a small part of their measurement results. This results in the
    354 protocol needing to being carried out much longer for the sake of security.
    355 
    356 \subsection{Six-State-Protocol}
    357 The ``Six-state-protocol'' SSP is a generalization of the BB-84 protocol, where
    358 instead of two, three mutually unbiased basis are used resulting in 6 states.
    359 Thus, Alice and Bob have the chance of $\frac{1}{3}$ to choose the same basis,
    360 meaning they would have to cross out $\frac{2}{3}$ of the results before
    361 getting the key.
    362 
    363 For Eve to not get detected there are two scenarios. In the first scenario she
    364 would need to choose the same basis as Alice and Bob, that is a probability
    365 of $\frac{1}{3}$ for each measurement. In the second scenario Eve
    366 chooses the wrong basis but Bob measures in the right basis. Eve picking the
    367 wrong basis happens with the probability of $\frac{2}{3}$, \textbf{after} that
    368 Bob measuring in the correct basis would happen with the probability of
    369 $\frac{1}{2}$, since we are dealing with MUBs.  Meaning Eve remains undetected
    370 with a probability of $\frac{1}{3}$.
    371 
    372 For Eve to get detected she would need to measure the wrong results
    373 ($\frac{2}{3}$) and \textbf{after} Bob needs to measure the wrong results
    374 ($\frac{1}{2}$). Ultimately Eve gets detected with the probability of
    375 $\frac{1}{3}$.
    376 
    377 The probability to detect Eve trivially scales with the number of measurements,
    378 meaning $P(\text{detected}) = 1 - (\frac{2}{3})^n$ where $n$ are the
    379 number of measurements. On the other hand the chance of not being detected
    380 after $n$ measurements is $P(\text{not detected}) = 1 - P(\text{detected}$,
    381 of course this doesn't mean Eve managed to get the right key. For Eve to pick
    382 the get the right key she would also additionally need to choose the right
    383 basis.
    384 
    385 To even further minimize the risk of an eavesdropper Alice and Bob could
    386 compare small parts of their qubit string like in the BB-84 protocol.
    387 \nocite{six-state}
    388 \nocite{teleportation}
    389 \printbibliography
    390 \end{document}