Skip to content

egrace479/asymmetric-cloning-BB84

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Asymmetric Phase-Covariant Cloning to Eavesdrop on BB84

This repository contains the continuation of the QuForce Innovation Fellows Project: Asymmetric Cloning to Eavesdrop on BB84 Protocol, which was completed by Elizabeth Campolongo, Brian Pigott, and Hardik Routray with advice from Alex Khan. The original project was selected for 1st Place on Demo Day in August 2022, slides available on the original project repo, recording of Demo Day and more information on QuForce is available in this Quantum Insider Article. Our paper on these results, Eavesdropping on the BB84 Protocol using Phase-Covariant Cloning: Experimental Results, is available on arXiv.

The BB84 protocol is known to be a secure method of quantum key distribution, even in the case when an eavesdropper has unlimited resources at their disposal. However, the security of the protocol is only obtained below the level of noise that occurs in the quantum channel. The purpose of this project is twofold:

  1. Develop an optimal strategy for an eavesdropper who is using asymmetric cloning; that is, develop and implement a strategy that gives the eavesdropper maximum information about the channel while minimizing the disturbance to the signal.

  2. Consider the Quantum Bit Error Rate (QBER) in a lossy quantum channel with the presence of the eavesdropping strategy developed in (1) and implement error-correcting algorithms to derive a secure key.

Here we develop a reproducible test to determine the security--or lack thereof--of the BB84 protocol in practice. With this test, we measure how much information an eavesdropper can obtain about a raw key when transmitted under the BB84 protocol using the optimal eavesdropping approach (asymmetric phase-covariant cloning). Here we provide the code used in running experiments simulating BB84, which we implemented on the IonQ Harmony quantum computer, to uncover these quantities Thus we obtain an experimental estimate of the information that can be gained by an adversary using asymmetric phase-covariant cloning to eavesdrop on the BB84 protocol.