Session 1 - Basics
The first challenge - Secure message transmission
We have our protagonists, Alice and Bob that want to communicate securely using some channel.
We have an eavesdropper, Eve, who might have access to the communication channel that Alice and Bob use.
To transmit their messages securely, Alice and Bob use a secret key, that is known only to the two of them, and not to Eve.
These are called private-key cryptosystems.
Such an encryption scheme consists of two processes,
- The encoding of the message given the key by applying the encoding function,
This is done by Alice. Note that is called the plain-text and is called the cipher-text. - The decoding of the encrypted message given the key by applying the decoding function,
This is done by Bob.
Obviously, we want such a scheme to give us the correct message after decoding. Therefore, we demand,
Such a scheme of encoding is called correct! It is easy to come up with an example of such a scheme, for example let
But as you realise, sending the message as it is is as insecure as it gets. So, we need a notion of security.
A encryption/decryption scheme is called secure if for all prior distributions
For example, if Alice would be equally likely to send any
It is easy to come up with an example of such a secure scheme as well, we can just ignore the message and send randomly any cipher-text
To design a scheme that is both correct and secure
Both the trivial schemes we designed didn't even use a key. How necessary is a key?
An encryption scheme can be both secure and correct if the number of possible keys is at least as large as number of possible messages.
Let
Eve computes
Also
To illustrate the proof, let us look at an encoding/decoding scheme.
Let Alice send two bit messages,
| Message | K=1 | K=0 |
|---|---|---|
Let's say Alice send the message
But after obtaining the cipher-text
This implies that the scheme is not secure.
So can we come up with a scheme that is both secure and correct with
One-time pad (Classical)
Alice and Bob following encoding/decoding scheme,
It is easy to check that this scheme is correct, i.e for any
We prove that is is also secure.
Note that the security of a scheme highly depends on the knowledge of the eavesdropper about the secret key, encoded in the distribution
Here, a critical assumption that we make is that in Eve's perspective, all keys are equally likely, i.e
And let's assume there is some prior distribution over the messages,
The goal is to show that for all
Therefore this scheme has no extra "information" in the cipher-text given no-knowledge of the key.
How can this be extended to a quantum bit?
Quantum One Time Pad
How to hide the quantum information from an eavesdropper?
Let's say Alice sends a quantum state
Encoding by Alice
Again, we need to provide the definition of correctness and security of this scheme.
- The scheme is correct if
- The scheme is secure if
Let us design a one time pad for qubits, with a key size of
This is a correct scheme! But is it secure?
Although for
Ensuring security in QOTP
We use
Clearly the scheme is correct. But is it secure? Yes, by the following lemma
This can be generalised to encoding
The Min-Entropy
In this section, we want to understand the privacy of the secret key that we use for the other cryptographic protocols.
Let's say Alice owns a classical register with the key of size
Ideally, we want this state to be of the form
To start with assume that the state of Alice and Eve is uncorrelated, but Alice (from the perspective of Eve!) has a state
Shannon Entropy?
One might be tempted to measure the uncertainty of the obtained key in terms of the Shannon Entropy of
We can check that the following distribution,
has the
But this means that if Eve guesses the key to
So overall, even though the Shannon Entropy might be very high, the protocol is not cryptographically that secure. We need a better measure for uncertainty.
Min-Entropy
Calculating the minimum entropy for the previous distribution, we get for all sizes of the key,
Effectively, the min entropy measures what Eve can do with the best guess of the key which is exactly
We have the following inequalities,
Conditional Min-Entropy
Given a classical quantum state, we want to define a quantity that captures the information Eve can gain about the classical register
For a classical quantum state
For the uncorrelated state
Therefore, we get
The final goal for today is to understand general "quantum" conditional min entropy.
Quantum conditional min-entropy
How can a quantum system gain maximum side information about another system? If it is completely correlated with the other system. In quantum mechanics, a stronger form of correlation also exists in form of the maximally entangled state.
It is a quantum state that is "correlated" in all basis. We use this to define the conditional min-entropy for general quantum states. Intuitively, to be the adversary, we want to do the best quantum operation on Eve's end to gain maximum correlation with the "key" system, possibly in all basis!
This is equivalent to the following definition,
The proof of this equivalence will be shown in the next session.
Right now, we look at the following exercise. Compute the
Compute the