Entanglement-based Advanced Secure Networking 101
Advanced secure networks leverage entanglement for secure communication while simultaneously supporting a wide variety of applications.
Advanced secure networks leverage entanglement for secure communication while simultaneously supporting a wide variety of applications.
Do you want to download a printable PDF of this white paper? Click here to download it directly.
Overview and background information
The Fundamentals of Advanced Secure Networking
Qubits
Entanglement
Superposition
Teleportation
No-Cloning Theorem
How Advanced Secure Networks Distribute Entanglement
Advanced Secure Networking Hardware
Advanced Secure Networking Software
The Entanglement-based Network Stack
Protocols for Entanglement Distribution
Example of Protocols Being Used for Entanglement Distribution
How Entanglement-based Advanced Secure Networks Perform Quantum Secure Communication
Entanglement-based key generation
Trusted relay networks vs Entanglement-based networks
Common misconceptions along the Advanced Secure Networking journey
Advanced secure networks leverage entanglement for secure communication, but also support a wide variety of applications simultaneously. Throughout this white paper, “advanced secure network” and “entanglement-based network” may be used interchangeably. Protocols, hardware and software components employed by advanced secure networks, and the use cases and applications that are enabled by these networks are explained through the example of a 5-node network. While this example will show what advanced secure networks could actually look like at each layer of the networking stack, it will not and cannot capture what every advanced secure network will look like. This is due to the fact that there are a wide range of possibilities for these networks that vary in architecture, design, and use cases, and with that variety comes incredible versatility. Entanglement-based networks can interconnect quantum computers, quantum sensors, and other quantum devices. By distributing entanglement between these devices, the distributed entanglement can be used to run powerful end user applications such as Advanced Secure Communications, which are resistant to both classical and quantum attacks.
Entanglement-based networks do not exist purely in science fiction or in the distant future: there are already entanglement-based advanced secure networks up and running today.
Click here to watch a video about AliroNet™ and the EPB Quantum Network
Pictured in the graphic above is a schematic for the EPB Quantum Network, which launched in 2023. While this is the first commercial quantum network to be deployed, there are many other advanced secure networks out there, such as quantum network test-beds and lab-managed advanced secure networks. To find out more about the EPB Quantum Network and other advanced secure networks in North America and globally, check out our on-demand webinar.
Entanglement-based networks are advanced secure networks that operate in fundamentally different ways from classical networks, leveraging certain scientific properties of quantum mechanics. It is these unique properties that enable superior communications security, enhanced computational speed and capability, and improved performance across a variety of technologies such as atomic clocks, magnetometers, and gravity gradiometers. The foundational science concepts with particular relevance to advance secure networking include qubits, entanglement, superposition, teleportation, and the no-cloning theorem.
Quantum bits, or qubits, are the quantum analog of classical bits. Just like classical bits are the basic unit of information by classical devices like your phone, your computer, and the internet are built upon, quantum bits are the basic unit of quantum information that quantum computers, quantum sensors, and entanglement-based networks are built on.
There are many different ways of creating qubits. A few of the most common types of qubits are:
While classical bits and quantum bits each carry information in computing and communications applications, they are quite different in behavior. Qubits display many quantum properties, including entanglement, superposition, teleportation, and the no-cloning theorem. It is these properties of qubits that enable quantum technologies to outperform their classical counterparts. More about how qubits are used in advanced secure networks can be found in the on-demand webinar Qubits: Understanding Quantum Information.
Qubits can be coupled together in such a way that measuring one qubit will affect the state of another qubit or qubits. This type of coupling is known as entanglement. Qubits are considered to be entangled when measuring one qubit will instantaneously affect the state of the qubit (or qubits) it is entangled with, even if these qubits are many light years apart. This is exactly the spooky action at a distance that upset Einstein and many other physicists in the early 20th century. Measuring one qubit will affect the state of a qubit it is entangled with faster than light can travel between them, however this does not mean entanglement can be used for faster-than-speed-of-light communication.
Entanglement is said to be distributed between users of an Advanced Secure Network. For example, if two users receive a qubit from an entangled pair, entanglement has been distributed between them. This distributed entanglement can then be consumed by the users to achieve faster and more powerful computation, more precise sensing, bolstered cybersecurity, and other entanglement-powered use cases.
Quantum superposition refers to the ability of a quantum system, like a qubit, to be in multiple states simultaneously.
A classical bit can only have one of two values: 0 or 1. Qubits can have the value zero, one, or some combination of these values - and there are infinite such combinations of these values. When qubits are in a combination of values, we say that it is in a superposition of these values. This might sound abstract, so let’s use an analogy that mirrors this phenomenon, as depicted in the illustrative example of a skateboarder provided by the National Institute of Standards and Technology (NIST).
Imagine a skateboarder on a halfpipe ramp. In classical terms, the skateboarder could be either at the bottom (location zero) or at the top (location one) of the ramp. In quantum mechanics, however, the skateboarder (akin to a qubit) can exist simultaneously at both locations and everywhere in between. This superposition state is a combination of potential positions.^{[NIST] }
Prior to measurement a qubit can exist in a superposition state of one of its quantum properties, such as polarization. However, the act of measuring this qubit’s quantum property of polarization forces it to 'choose' one of two possible states (either horizontal or vertical), collapsing the superposition. In this way, measurement affects the state of quantum systems. Prior to observation, a quantum system can only be described in terms of probabilities: there's a certain probability of finding a qubit has horizontal polarization, and another probability of finding a qubit has vertical polarization. Once it is measured or observed, the qubit settles into one of its possible states. This phenomenon is famously exemplified in the thought experiment of Schrödinger's cat, where a cat in a box is considered to be simultaneously alive and dead until someone opens the box and observes the cat as alive or dead.
Quantum teleportation can be thought of as a way of moving quantum information from one place to another, but instead of moving a physical qubit, its state is transferred. The process of quantum teleportation uses distributed entanglement in order to make this transfer without physically sending that information through the network’s infrastructure.
Above is a simple example of quantum teleportation. There are two nodes, Alice and Bob. Alice and Bob are already sharing entanglement between two of their qubits: qubits A and B. Alice has an additional qubit, qubit C. This is the qubit that has a secret state on it. Alice wants to teleport this state to Bob's location. In order to do that, Alice is going to perform a Bell state measurement between qubits A and C. This act of measuring A and C teleports qubit C to Bob's qubit B.
The no-cloning theorem states that it is impossible to create an exact copy of an arbitrary unknown quantum state. This is a rule that emerges directly from the principles of quantum mechanics (the way quantum information behaves) and has profound implications for how information is handled in quantum systems. Quantum information is delicate and complex.
In quantum mechanics, particles such as photons can exist in various states represented by their wave functions. These states might include the position, momentum, spin, or polarization of these particles. Quantum states are probabilistic rather than deterministic, meaning they provide probabilities of finding a particle in a particular state rather than certainties.
The reason quantum states can't be perfectly copied boils down to two key features of quantum mechanics: the linearity of quantum operations and the measurement problem.
The fact that quantum information cannot be copied the way classical bits can be copied may seem like a limitation, but it’s also quite useful: because quantum information can’t be cloned without changing the state, any eavesdropping attempt on quantum communications can be easily detected.
Advanced secure networks are multipurpose entanglement-based networks that can support a wide variety of applications simultaneously. This is possible through distributing entanglement across the network. At a high level, this is accomplished by generating pairs of entangled photons, which are encoded with quantum information through their quantum state, and distributing them to different network nodes. These entangled qubits can then be used to transmit quantum information with a high level of security due to the quantum properties previously discussed. Quantum repeaters can be used to extend the range of advanced secure networks across far distances.
In the following example, Alice and Bob will use an entanglement-based advanced secure network for Advanced Secure Communication. They are located 200 kilometers apart, which means they cannot use a single point-to-point connection for their entanglement channel; point-to-point connections typically support links of up to 50 to 100 kilometers. However, by using three quantum repeaters evenly spaced between them, Alice and Bob will be able to utilize the advanced secure network to secure their communications.
Throughout this white paper, a blue line is used to represent Alice and Bob's entanglement-based channel and a red line represents Alice and Bob's classical channel.
Each of the five nodes in this network contains:
The Bell state measurement stations are used for the elementary entanglement generation protocol and the entanglement swapping protocol. In addition to the above hardware, Alice’s and Bob’s nodes will also use quantum random number generators (QRNGs) to provide true randomness for carrying out BBM92, one of the canonical entanglement-based Advanced Secure Communications protocols. In BBM92, QRNGs are used to generate secure cryptographic keys by providing true randomness at a certain step of the protocol: measurement basis selection. True randomness is essential for ensuring the security of Advanced Secure Communications, not only for the security against eavesdropping but also for ensuring the cryptographic keys generated are not susceptible to predictive algorithms or any known pattern analysis.
Classical communication is used for heralding results, timing and synchronization, and other operations that don’t require entanglement as a resource, but support entanglement distribution. Advanced Secure Networks will not be used to completely replace classical networks, but instead will be used together with classical networks to enable higher performance and new applications that neither network can accomplish on its own.
There are two important things to note about entanglement-based advanced secure network hardware. First, while repeaters (the intermediary nodes used to extend the distance of distributed entanglement) are not commercially available off-the-shelf, the components that they consist of are. Second, hardware used by these networks can differ in types of components used as well as the makes, models and vendors of those components.
Components will continue to evolve, and the requirements for each network will differ, so that there may never be a completely uniform set of components used for all entanglement-based networks. While there may never be complete uniformity, standardization, management software, and the implementation of best practices will ensure a smooth evolution of components into the future.
There are many factors to consider when designing an advanced secure network. Use of an entanglement-based quantum network simulator with enough accuracy and the capabilities to model, verify, and validate network designs is vital for an efficient and effective entanglement-based advanced secure network design process. An entanglement-based quantum network simulator is also useful for upgrading and scaling an entanglement-based advanced secure network.
This example is relatively simple. In networks with many more nodes and in more complex topologies, there will be myriad possible paths for distributing entanglement between end users. With so many hardware components and protocols required to distribute entanglement, control and orchestration software will be vital to keeping the network running smoothly. Software is needed to configure, manage, run and utilize entanglement-based networks efficiently and effectively. Even for very simple entanglement-based advanced secure networks like this example, with relatively few components, it's nearly impossible to manually configure and manage hardware for applications such as Advanced Secure Communication. This software handles other important entanglement distribution-related tasks such as transmission and routing of information in real-world scenarios that must be responsive to noise, photon loss, and probabilistic protocols. Retransmitting information in response to these real-world scenarios, and at multiple layers of the stack, is critical.
Additionally, while this network example was relatively simple - with only one path between Alice and Bob - there could be many paths to choose from. Software can be used to select pathing that optimizes for factors like security and throughput. Advanced secure networks will vary greatly in terms of hardware deployed, and thus it's also vital that the software used to manage the network be hardware agnostic - giving the network the most flexibility for expanding the network and adding or upgrading hardware components.
The entanglement-based network stack is the implementation of protocols needed to accomplish the primary objectives of advanced secure networking: distributing entanglement, and then utilizing that distributed entanglement for a specific use case. The stack is typically broken into five layers, starting from the bottom:
Each layer of the stack will be examined through the example of using an entanglement-based advanced secure network and the BBM92 protocol for entanglement-based key generation. While specifics of all the protocols used in the stack could differ, this example will still give a good overview of how an entanglement-based secure network operates.
This example begins at the bottom of the network stack with the first three layers contributing to entanglement distribution, and works up to the application layer: entanglement-based key generation. For an advanced secure network to be able to best meet the needs of its users and run their desired applications, there are some specifications that entanglement distribution must meet:
Meeting the requirements for distributed entanglement involves a lot of coordination between different parts of the network: the appropriate hardware and software needs to be put into place, protocols and topology must be carefully implemented, logistical considerations need to be taken into account, as well as the integration of existing classical systems. While entanglement-based Advanced Secure Networks share the same general goals of distributing entanglement and then utilizing that distributed entanglement for a set purpose, different users will have unique requirements that shift the specifications of the network. For example, users may wish to run a wide variety of applications and could face constraints such as budget, logistics, or environmental factors that impact how a network is implemented.
There are three main processes / protocols involved in distributing entanglement for end user applications:
Elementary entanglement generation, or EEG.
Used to distribute entanglement between nearby devices. Note that for local area quantum networks, repeaters or other scaling technologies are not necessary. In this case, EEG alone can be used for entanglement distribution.
Entanglement purification, sometimes known as entanglement distillation
Used to ensure that the quality, or fidelity, of the entanglement is at a high enough level throughout the entire entanglement distribution process so it can be used for end user applications.
Entanglement swapping.
Used to extend the distance of the entanglement distributed by EEG. Using swapping and EEG together aids in distributed entanglement across far distances.
These processes, or protocols, align with the bottom three layers of the entanglement-based network stack. EEG is a physical layer protocol, where entanglement is distributed between neighboring nodes. Entanglement purification is a link layer protocol, creating robust entanglement generation. Entanglement swapping is a network layer protocol, crucial to creating end-to-end entanglement across distance.
Elementary Entanglement Generation
In Elementary Entanglement Generation (EEG), entanglement is distributed between two nearby quantum nodes. There are many protocols, and even families of protocols, for performing EEG. The example shown in the graphic below depicts a meet-in-the-middle scheme. Another common EEG scheme is that of a midpoint source - where an entangled pair is created at a single midpoint and then each of these entangled qubits is transmitted to the two desired nearby nodes.
The first step of this meet-in-the-middle technique is to generate an entangled pair consisting of at least one photonic qubit at each of the two neighboring nodes. This is achieved with an entanglement source. Then a photonic qubit from each of the two entangled pairs is transmitted via optical fiber to a probabilistic Bell state measurement station, consisting of a beam splitter and two single photon detectors.
The two qubits must arrive at the Bell state measurement station at exactly the same time. Quantum memories can be used to help ensure this exact timing. Depending on which side of the beam splitter the photons exit - which can be confirmed by checking the clicks of the photon detectors - it’s possible to determine if entanglement generation was successful. If it was not, then the process is repeated.
Entanglement Purification
In entanglement purification, multiple entangled states with lower fidelity are used to create a single entangled state with higher fidelity. Purification protocols require a certain level of fidelity to be effective, so it’s important to ensure fidelity has not degraded too much before the purification is performed.
Qubits and the quality of their quantum information are fragile. In this example, the fidelity of the entanglement decays due to noise. Noise refers to many different factors that can cause loss of quantum information, such as:
To combat noise and keep fidelity at a high enough level to run end-user applications, purification must be performed many times throughout the entanglement distribution process.
There are many different purification protocols that can be implemented. This example uses a Controlled-NOT (or CNOT) gate in the purification protocol. CNOT gates are essential components of gate-based quantum computers. CNOT gates are often used to entangle and disentangle quantum states in quantum computing algorithms. However, they can also be used in entanglement-based networks.
This example uses a relatively simple version of a purification protocol with CNOT gates: Alice and Bob share two entangled pairs. Ѱ_{1 }is an entangled pair whose fidelity they are trying to increase. Ѱ_{2} is the entangled pair they are using to help accomplish this improvement. CNOT gates operate on two qubits. It's important to note that when it comes to optical components and using photonic qubits in photonic systems, the CNOT gate will be probabilistic. Alice and Bob first apply CNOT gates to their two qubits respectively, with the control qubit being from Ѱ1 and the target qubit being from Ѱ_{2}. Alice and Bob next measure their half of the pair of qubits from Ѱ_{2} and compare the results. If they get the same result, then the distillation is considered a success and they will keep Ѱ_{1}. The fidelity of Ѱ_{1} will be at least as high, but often higher, than before. If Alice and Bob get different results, then the distillation or purification is considered a failure. They will discard Ѱ_{1} and try again.
Entanglement Swapping
Entanglement swapping enables the extension of entanglement between two pairs of qubits over longer distances. In the example, there are two pairs of entangled photons, with one photon from each pair converging at the same midpoint node. This setup facilitates the "swapping" of entanglement, effectively linking the two initially separate pairs into a single, extended entangled pair.
To accomplish this, the two qubits at the middle node are measured in a clever way by performing a Bell state measurement, at which point the two qubits that were previously entangled with qubits at the center node will become entangled to one another - creating a longer distance entanglement. This process is similar to the meet-in-the-middle elementary entanglement generation scheme discussed above. Using EEG and then performing entanglement swapping distributes entanglement to non-neighboring nodes. Using purification ensures that the fidelity of this entanglement remains high.
The following example demonstrates entanglement distribution on Alice and Bob's network. For brevity, this example assumes that all of the probabilistic processes work on the first attempt.
The goal of this example is to distribute entanglement between Alice and Bob, located 200 km away.
The first step is to perform EEG to create entanglement between each pair of neighboring nodes. Once the EEG protocol for each pair of neighboring nodes has been successful, there will be entanglement between Alice and Repeater1, and between Repeater1 and Repeater2 and so on. Entanglement must be present before entanglement swapping can be performed. Throughout this example, remember that it may be helpful to perform EEG multiple times between each neighboring node in order to purify the entanglement and ensure fidelity stays high enough for Alice and Bob to make use of the distributed entanglement. The entire entanglement distribution process described in the example, from EEG to purification to swapping, will be performed many times because Alice and Bob need to use more than just one shared entangled pair.
Now that entanglement exists between each pair of neighboring nodes, the nodes are ready for entanglement swapping.
Entanglement swapping at Repeater1 extends entanglement from Alice to Repeater2, which is closer to Bob. A swap at Repeater3 will extend entanglement to Bob and Repeater2 which is closer to Alice. These entanglement swaps could happen one at a time, at the same time, or in any order.
Now another swap is performed at Repeater2, which extends entanglement between Alice and Bob directly.
Purification would likely be performed throughout this process many times to keep entanglement quality high, and this process of EEG and swapping would be performed many times so that Alice and Bob share multiple entangled pairs instead of just one entangled pair.
While entanglement-based networks have vast capabilities that can be simultaneously enabled or executed, the focus in this example is on Advanced Secure Communication. There are many types of information that must remain private, such as information related to defense and military, intellectual property, financial information, medical information, etc. Keeping information secure can be a matter of personal, organizational, and even national security. In this example, Alice and Bob are using an entanglement-based advanced secure network to communicate their top secret information. They will use entanglement-based key generation to secure their communications with the BBM92 protocol.
Using BBM92 begins with the distribution of entanglement between Alice and Bob, in a process like the previous example. This process is performed many times, in order to distribute a sufficient amount of high-fidelity entanglement between Alice and Bob. Once there is sufficient entanglement between Alice and Bob, the key generation process can begin. Remember that in the example, Alice and Bob are using distributed entanglement for the purposes of Advanced Secure Communication, and specifically for key generation, to generate a key to secure their top secret information.
Entanglement-based key generation utilizes distributed entanglement to generate a shared secret key between end users. This method has information-theoretic security, which means regardless of how strong an adversary’s computational resources, whether classical or quantum, the key cannot be broken. This is especially important considering the impending nature of Q-Day. Learn more about Q-Day and how organizations can prepare for it in this on-demand webinar “What is Q-Day?”
Beyond the strength of the key itself, entanglement-based key generation is also secure in implementation as the key will never be revealed anywhere on the network. This shared quantum secret key can be used in many ways by classical networks. In this example, Alice and Bob use their shared secret key with a symmetric encryption algorithm, such as AES256, to encrypt and decrypt messages and thus secure their communication. In the graphic below, Alice and Bob are connected via classical and entanglement-based channels.
A quantum key is generated using the entanglement-based channel, with help from the classical channel. The quantum key is then used by the classical channel to help secure Alice and Bob's classical communications. BBM92 is the canonical entanglement-based key generation protocol, along with E91.
There are six main steps of BBM92:
The graphic below is an example of generating a key via BBM92.
Measurement bases are ways to view and measure qubits. Alice and Bob choose a measurement basis for each of their qubits from the distributed entangled pairs. Choice of each measurement basis is chosen independently and randomly. In this example, quantum random number generators are used for basis selection to ensure true randomness. This example also uses the canonical choices for bases: the Z-basis which has possible measurement results in terms of zero and one, and the X-basis which has possible measurement results in terms of plus or minus.
These bases coincide with the Z-axis and the X-axis of the Bloch sphere representation of qubits respectively.
As an analogy to help visualize these bases, imagine a collection of blocks. These blocks can be at any angle. The Z-basis views the blocks in terms of being at a completely vertical or completely horizontal angle. When the angle of a block is measured in the Z-basis, the result can only be either horizontal or vertical. The X-basis views the blocks in terms of being tilted 45 degrees left of vertical or tilted 45 degrees right of vertical. When the angle of a block is measured in the X-basis, the result can only be one of these angles.
The probability of which result will be returned after measurement depends on how close the angle of the block is to the angle of the basis state. For example, a block that's mostly vertical will be more likely to be measured as vertical than horizontal when measuring in the Z-basis. With different measurement bases the same qubits are still being observed and measured, but through different lenses. Alice and Bob measure each received qubit in the selected basis. The measurement process collapses the qubit’s quantum state - which is a superposition of multiple states - into exactly one of the two possible basis states.
Note: Remember that in every protocol discussed in this paper, measurements have been made with the same measurement stations: performing teleportation, EEG, entanglement swapping, and measuring the target qubit in the purification protocol. These measurements have been carried out in part by single photon detectors.
If Alice and Bob measure their qubit on the same basis, then they will get the same result.
For example, if they both measure in the Z-basis and Alice gets results zero, then Bob must also get result zero. Similarly, if they both measure in the X-basis and Alice gets the result minus, then Bob must also get the result minus. However, if Alice and Bob measure in different bases, then there can be any combination of measurement results. For example, if Alice measures in the Z-basis and Bob measures in the X-basis, possible results are:
Alice measuring 0 and Bob measuring +, Alice measuring 0 and Bob measuring –, Alice measuring 1 and Bob measuring +, and Alice measuring 1 and Bob measuring –.
Once measurement is complete, Alice and Bob convert all of the measurement results from quantum states into classical bits, or zeros and ones. When measuring in the Z-basis, the measurement results are already in bits. When measuring in the X-basis, + is converted to 0, and – is converted to 1. Assuming that there is no noise, when Alice and Bob measure a qubit in the same basis, then they will always receive the same value.
If Alice and Bob measure in different bases, then there is a 50% chance that they will receive a different value. This is because there's a 50% chance of getting measurement results 0 and –, 1 and + which yield different values. There is also a 50% chance that they will receive the same bit values. This is because there is a 50% chance of getting measurement results 0 and + or 1 and –, which yield the same values.
The relationship between bases selected and matching bit values is very important for the security of the BBM92 protocol. To perform sifting, Alice and Bob share their choices of measurement basis over a public authenticated classical channel and discard all results in which they use different measurement bases. The resulting bits are considered to be sifted. In the absence of noise or an eavesdropper, this means that Alice and Bob should agree on all remaining values, as they will agree on all measurement bases for these bits.
Alice and Bob choose a sample of the remaining sifted results and compare them to estimate quantum bit error rate, or QBER. There is a tradeoff here between taking a larger sample to get a better estimate of QBER, and taking a smaller sample that leaves more bits to be used for key material.
Alice and Bob are estimating the percentage of mismatched bit pairs out of the sifted material. In the perfect case, where there is no noise and no eavesdropper, the qubit error rate will be 0% because all of Alice and Bob’s sifted measurement results will agree under these perfect conditions. If there is no noise but the qubit error rate is greater than zero, then Alice and Bob know with 100% certainty that an eavesdropper is present.
An eavesdropper, Eve, must choose a measurement basis when measuring the intercepted qubits, just as Alice and Bob do, to discover the quantum information they contain. However, Alice and Bob's qubit measurement bases are not sent over the network until after their measurement occurs. This means that Eve will not have the ability to intercept that information prior to their measurement, and thus could choose a different basis than Alice and Bob when Alice and Bob do agree on a measurement basis.
However, if Eve measures an intercepted qubit in a different basis, then there is a 50% chance that Alice and Bob will receive different values leading to non-zero qubit error rate. This is depicted in the graphic below of how an eavesdropper can contribute to qubit error rate.
Obtaining any information about the key material requires an eavesdropper to measure the system in some way. Because of quantum mechanics, the act of measuring disturbs the system and produces observable detectable anomalies. All such anomalies contribute to the qubit error rate, but neither Alice nor Bob can distinguish whether these anomalies came from environmental noise or errors, or an eavesdropper.
In real-world entanglement-based advanced secure networks, noise will often be present and the qubit error rate will be greater than zero. Because the source of each error cannot be determined, we assume the worst case scenario (at least from a security perspective) that all errors are caused by an eavesdropper. The BBM92 protocol tolerates up to 11% qubit error rate, which corresponds to a fidelity of 89%. However, there's a tradeoff between security confidence and throughput, so the exact value will differ based on individual user requirements. If qubit error rate exceeds the user-established tolerance limit, the protocol determines that too much information was leaked to potential eavesdropper. The generated key is discarded and a new one is generated, typically on a different quantum channel.
If QBER is within acceptable bounds, no eavesdropper is detected. Alice and Bob then use the remaining bits that were not consumed in estimating QBER to generate a final key. While the remaining bits could also be used as the final generated key, typically classical post-processing techniques will be performed on the remaining bits, such as information reconciliation and privacy amplification protocols, in order to generate an even more secure final key.
The example in the table below shows the steps of BBM92.
In this example, there's no noise and there's no eavesdropper. In reality, a network will likely experience noise and potentially an eavesdropper. There are also only nine entangled pairs in the example. In practice, far more than nine entangled pairs will be used. For example, generating a key of 256 bits requires more than 256 entangled pairs, as bits are lost to sifting and when sampling to estimate qubit error rate.
Step 1. In row 1 of the table, first step of BBM92, Alice and Bob use their quantum random number generators to select a measurement basis for each qubit that they received. For the first pair, Alice’s quantum random number generator selected the X-basis, while Bob’s quantum random number generator selected the Z-basis. For the second pair, both Alice and Bob will measure in the X-basis. This process continues until enough bases have been selected to create a sufficiently sized key, as well as to account for qubit loss during sifting and for estimating the QBER. For brevity, this example only performs this process nine times. In a real-world scenario, this would be performed many more times.
Step 2. Next, Alice and Bob measure their qubits in the selected bases. Row 2 of the table shows the results Alice and Bob receive. Remember that when Alice and Bob use the same measurement basis and there is no noise or eavesdropper, they will agree on measurement results. When Alice and Bob use different measurement bases, there's only a 50% chance that they will agree on measurement results. For the first pair, Alice and Bob measured + and 1, respectively. For the second pair Alice and Bob both measured -, and so on for each qubit pair.
Step 3. Alice and Bob convert their measurement results to bits with + becoming 0 and - becoming 1. When Alice and Bob have the same measurement basis (and there is no noise or eavesdropper present) they will also agree on bit values. Row 3 in the table above shows the result of converting to bits in this example.
Step 4. Next Alice and Bob perform sifting: sharing their choices of measurement basis over a public authenticated classical channel, keeping the bits in which they use the same measurement basis, and throwing away the bits in which they use different measurement bases. As seen in row 4 of the table, for the first pair of bits Alice used the X-basis and Bob used the Z-basis, and so they throw away those bits. For the second pair of bits, Alice and Bob both use the X-basis, so they'll keep these bits. This process continues for all pairs of bits - in this case, all nine pairs.
Step 5. Now Alice and Bob use a sample of the remaining bits to estimate qubit error rate. They choose the second and fifth pair as their sample. They find that the values agree for both pairs and so qubit error rate is estimated to be 0% and fidelity to be 100%.
Step 6. Finally, Alice and Bob use the remaining bits as their generated final key. They have generated the key 1 0 1. In this example, no classical post-processing was performed. In practice, post-processing techniques such as information reconciliation and privacy amplification would be used. Notice that in this example, the nine entangled pairs generate a key of only three bits. While this is not an exact ratio of entangled pairs to resulting bits for key material, this example shows that many entangled pairs will be needed to facilitate Advanced Secure Communication with the BBM92 protocol.
A shared secret key can be used in many ways by a classical network. In the example, Alice and Bob generated their key to be used by a symmetric encryption algorithm in order to encrypt and decrypt classical messages.
Shared secret keys can be used for other things beyond encryption and decryption, such as for passwords, generating new keys via use of a key derivation function, identity authentication via challenge-response protocols, message authentication via message authentication codes, and many other useful security functions.
This example covered the three bottom layers of the entanglement-based networking stack, but skipped to the application layer with Advanced Secure Communication via BBM92. The transport layer was not utilized in this example. This doesn't mean the transport layer is not important. It's incredibly useful for many applications. Quantum teleportation is a transport layer protocol; it’s an entanglement-based protocol that utilizes distributed entanglement to communicate quantum information across the network, and is even considered an application all on its own.
Many distributed quantum applications require communication of quantum information between devices. Teleportation is the protocol that can be used to accomplish this. The way in which information is sent via teleportation also has useful properties for cybersecurity purposes. Quantum teleportation can be used to communicate quantum information to endpoints on the network without that information ever being exposed on the network itself. This means that even if intermediary nodes between communicating users become compromised, the quantum information that is being sent between them will not be exposed. The security of quantum information being sent is said to be device independent.
Teleportation is illustrated in the graphic above. Entanglement has been distributed across a network, and Alice and Bob share an entangled pair. Alice has a qubit that she wants to send to Bob. By consuming the entanglement with a teleportation protocol, Alice can send the qubit to Bob. The entangled pair is measured during this process, essentially collapsing the qubits into classical bits and consuming the entanglement. For more detail on how quantum teleportation works, see the on-demand webinar “The Role of Quantum Teleportation in Entanglement-based Secure Networks.”
The entanglement-based advanced secure network in the examples used throughout this whitepaper has a linear topology (i.e., there is only one path between the two end users) and it is 200 kilometers long. It employs hardware, software, and protocols to carry out a specific task: Advance Secure Communications, specifically using BBM92 for quantum key generation. This example does not encompass all entanglement-based networks. Entanglement-based Advanced Secure Networks can vary in many important ways, such as:
Part of the reason entanglement-based networks vary so much is that they can be used for widely varying scenarios. These same entanglement-based networks are multipurpose networks that can be utilized for different use cases simultaneously, such as distributed quantum computing and Advanced Secure Communications. However, an entanglement-based network that connects together quantum computers in a warehouse versus an entanglement-based network that connects quantum devices together across the globe for communications will have distinct differences.
Three use cases for entanglement-based networks are Advanced Secure Communications, distributed quantum computing and distributed quantum sensing. Many valuable applications of these use cases have been identified, and many more will be developed as entanglement-based networks evolve into a global-scale quantum internet.
Advanced Secure Communications
Advanced Secure Communications is a family of security solutions that are enabled by advanced secure networks. Entanglement-based key generation and quantum teleportation enable additional security of communicating information. Shared entanglement between users can also be used to directly communicate classical and or quantum information in a provably secure manner, and to detect eavesdroppers of classical and or quantum information.
Distributed quantum computing
Distributed quantum computing is the connection of multiple quantum processing units or multiple quantum computers using entanglement-based networks to connect them via distributed entanglement. The quantum computers can be located in close proximity or far distances apart. By connecting quantum computers together, it’s possible to achieve much greater computing power and additional security. Details about this use of entanglement-based networks to network QPUs for increased computational power can be found in the on-demand webinar “Entanglement-based Networks for Increasing Quantum Computing Performance.”
Distributed quantum sensing
Distributed quantum sensing is the connection of multiple quantum sensors via entanglement-based networks. These sensors are connected by distributed entanglement. The sensors can be close together or at distant locations. By connecting the sensors together, it’s possible to achieve much greater accuracy, sensitivity, and precision than individual quantum sensors or networked classical sensors can achieve.
Trusted relay networks have been around for decades to implement QKD protocols. The more recently available and deployed entanglement-based networks differ from these trusted relay networks in several important ways:
A question that frequently comes up in discussing entanglement-based advanced secure networks is why classical repeaters and routers can’t be used for entanglement-based communication. All of these networks use photons over optical fiber to facilitate communication. There are a few reasons why classical repeaters can’t be used for entanglement-based advanced secure networks.
The way classical repeaters typically work is by copying and amplifying classical signals. This is simply impossible to do with quantum information, due to the no-cloning theorem. The no-cloning theorem shows that it's not possible to create an identical copy of an arbitrary quantum state. The process classical repeaters use for copying and amplifying classical signals cannot create identical copies of arbitrary quantum states.
Classical repeaters are designed for classical information processing. They're not designed for quantum information processing. For example, they can't store quantum-encoded photons or carry out quantum protocols. Quantum information experiences decoherence, the degradation of quantum information from noise and other factors. Classical repeaters can't maintain the fragile quantum information intended for transmission.
There are several common misconceptions that organizations often have about deploying entanglement-based advanced secure networks.
Entanglement-based advanced secure networks are being built today by a variety of organizations for a variety of use cases – benefiting organizations internally, as well as providing great value to an organization’s customers. Telecommunications companies, national research labs, intelligence organizations, and systems integrators are just a few examples of the organizations Aliro is helping to leverage the capabilities of advanced secure networking.
Building advanced secure networks that use entanglement is no easy task. It requires:
This may seem overwhelming, but Aliro is uniquely positioned to help you build your advanced secure network. The steps you can take to ensure your organization is meeting the challenges and leveraging the benefits of the quantum revolution are part of a clear, unified solution already at work in networks like the EPB Quantum Network℠ powered by Qubitekk in Chattanooga, Tennessee.
AliroNet™, the world’s first full-stack entanglement-based network solution, consists of the software and services necessary to ensure customers will fully meet their advanced secure networking goals. Each component within AliroNet™ is built from the ground up to be compatible and optimal with entanglement-based networks of any scale and architecture. AliroNet™ is used to simulate, design, run, and manage advanced secure networks as well as test, verify, and optimize quantum hardware for network performance. AliroNet™ leverages the expertise of Aliro personnel in order to ensure that customers get the most value out of the software and their investment.
Depending on where customers are in their advanced secure networking journeys, AliroNet™ is available in three modes that create a clear path toward building full-scale entanglement-based secure networks: (1) Emulation Mode, for emulating, designing, and validating entanglement-based networks, (2) Pilot Mode for implementing a small-scale entanglement-based network testbed, and (3) Deployment Mode for scaling entanglement-based networks and integrating end-to-end applications. AliroNet™ has been developed by a team of world-class experts.
To get started on your Advanced Secure Networking journey, reach out to the Aliro team for additional information on how AliroNet™ can enable secure communications.
info@alirosecurity.com
References
[NIST] Fortier, Tara. “Demystifying Quantum: It's Here, There and Everywhere.” National Institute of Standards and Technology https://www.nist.gov/blogs/taking-measure/demystifying-quantum-its-here-there-and-everywhere.
[NETWORK-STACK] Pompili, M. & Donne, C. & Raa, I. & Vecht, B. & Skrzypczyk, M. & Ferreira, G. & Kluijver, L. & Stolk, A. & Hermans, S. & Pawełczak, P. & Kozlowski, W. & Hanson, R. & Wehner, S.. (2022). Experimental demonstration of entanglement delivery using a quantum network stack. npj Quantum Information. 8. 10.1038/s41534-022-00631-2. https://www.researchgate.net/publication/364542247_Experimental_demonstration_of_entanglement_delivery_using_a_quantum_network_stack)