Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Introduction to Quantum Cryptography - Quantum Mechanics II | PHY 662, Study notes of Quantum Mechanics

Material Type: Notes; Class: Quantum Mechanics II; Subject: Physics; University: Syracuse University; Term: Spring 2004;

Typology: Study notes

Pre 2010

Uploaded on 08/09/2009

koofers-user-z4l-1
koofers-user-z4l-1 🇺🇸

10 documents

1 / 4

Toggle sidebar

Related documents


Partial preview of the text

Download Introduction to Quantum Cryptography - Quantum Mechanics II | PHY 662 and more Study notes Quantum Mechanics in PDF only on Docsity!

PHY662, Spring 2004

Outline for Thurs. Jan. 22, 2004

More Spin-

2 , Cryptography

22nd January 2004

1 Administration

  • e-mail addresses?
  • Acknowledgements on HWK. If none, please write “I did these problems inde- pendently.”
  • Homework due Jan. 27 but will be handed out: see HWK for reading and prob- lems.
  • Next week is magnetic resonance and possibly two-level systems. We will not use Shankar for those topics next week.

Today

  1. A couple of results for Pauli matrices.
  2. Symmetry and conservation laws.
  3. Quantum cryptography.
  4. Spins and their magnetic moment: magnetic fields.

2 Following Shankar, by using [Si, Sj ] = i¯hijkSk and

assuming 2 states

**** Establish the expression [exercise]

( A~ · ~σ)( B~ · ~σ) = A~ · B~ + i( A~ × B~) · ~σ,

for vector operators A, ~B~ that commute with ~σ.

**** Reproduce effect of S+ and S− on spinors - check with Pauli matrices.

Note “interesting” that one can go back and forth between 〈S~〉and nˆ. [Not true for other spins. Why not?]

3 Introduction to quantum cryptography

3.1 Classical cryptography

  1. Not everyone wants their mail easily readable.
  2. Encryption of a plaintext to cyphertext is the conversion of the message to a form that is presumed to be readable only by the intended recipient.
  3. Historically, there is a sequence of encryption schemes (simple substitution for letters, transpositions, polyalphabetic substitution (Vignere cipher), etc.) that are based on a shared key that is not too long.
  4. Patterns lead to ability to read the message. Interesting consequences of that.
  5. Public-key cryptography has revolutionized classical cryptography, but assumes that some problems, like factoring very large integers, are difficult to solve. They are based on trap door functions: you hand out padlocks, publicly, then someone who wants to write a message “locks” their message. Even the sender can’t “unlock” the message. But with your private key, you can.
  6. One code that is theoretically unbreakable (code “X” if you will): one-time pads. This code is used only for very secure communications that are infrequent, as key distribution can be cumbersome and insecure.

3.2 Quantum cryptography - key distribution

One use for quantum cryptography: securely distributing a one-time key (with no fear of eavesdropping). Relies on non-commutativity of the spin operators and the collapse of the wave function upon observation. Other schemes also depend on quantum “en- tanglement”.

Here is the classic example, Bennett and Brassard, 1984 (adapted to spin-1/2 - usually is described with photons):

  1. “Alice” sends a sequence of states randomly chosen from |+, zˆ〉, |−, zˆ〉, |+, xˆ〉, |−, ˆx〉.
  2. “Bob” randomly chooses to measure in the zˆ or ˆx direction for each electron.
  3. Afterwards, Alice and Bob publicly announce which axes they sent or measured the electron along.
  1. Where they used the same basis , they have a sequence of up and down (translated into a sequence of 1’s and 0’s) that they agree on. This can be used as a one-time pad for a subsequent message sent classically.
  2. No one else can know these states. For if “Claire” measured the electrons en route from Alice to Bob, Claire would have disturbed the wave function.

Example:

Alice chooses the random sequence

|+, ˆz〉, |+, ˆx〉, |+, xˆ〉, |−, ˆz〉, |+, xˆ〉, |−, zˆ〉

The particles are sent to Bob.

Bob makes measurements, randomly chosen, along the axes x, x, z, z, x, x.

At this point Alice publicly announces “z, x, x, z, x, z” and Bob publicly announces “x, x, z, z, x, x”.

They agree on the 2nd, 4th, and 5th spins. So they now jointly know the sequence “+,-,+” which they can use as a bit sequence “101”= key. Alice decides to send the message plaintext= 001 , which gets converted to plaintext ⊕ key = 001 ⊕ 101 = 100. Only Bob, who knows that “101” is the key, can properly convert the ciphertext to plaintext: 100 ⊕ 101 = 001.

Now, Alice and Bob can also check for snoops who might be peeking at their bits. If Claire had been using an apparatus in between that was making measurements, it would change the amplitudes.

[This all gets more complicated with errors in the signal, etc. Errors in alignment of apparatus or patterns in random number generators might provide an attacker with clues. Photons work better than electrons or spin-1/2 atoms; here one sets polarizers in 4 directions left-right, up-down, and 2 π/ 4 rotations to prepare photons polarized in 4 different directions, but the scheme is the same.]

4 Conservation and Symmetry

Symmetries and Conservation Laws - a reminder

NOTE: the rotation operators in Feynman are for a change of the frame (passive trans- formation). So all angles are inverted to get the rotation operators in Shankar!

  1. For spin, what is the conservation law and what is the symmetry?
  2. How are rotations and spin related by logarithms?
  3. How unitary symmetry operators are related to conserved Hermitian operators. [See Ch. 11 in Shankar for translation/momentum.]

5 Spins in a constant magnetic field

This is very simple, really, in quantum mechanics. To explain magnetic moments in a constant magnetic field, one needs all these ideas of torque, etc.

The result is precession, similar to precession in classical mechanics, but easier.

The Hamiltonian for a magnetic moment in a magnetic field is

H = −~μ · B,~

where the magnetic moment operator is related to the spin operator by

~μ = γ S~ =

gq 2 mc

S .~

Where the proportionality constant γ has been redefined in terms of a unitless “g- factor”. For orbital angular momentum, g = 1. For spin, it depends: gelectron ≈ 2 , gproton ≈ 5. 6 , and γneutron = − 3 .8( (^2) M e neutronc^

).

The time evolution operator U (t) is now given by U (t) = exp(−iHt/¯h) = exp[iγt(S~· B^ ~)/¯h]. What other operator is this equal to?

Example: consider a spin-1/2 particle in the state |+, ˆx〉 in a field oriented in the zˆ- direction. What is its state as a function of time? What are 〈Sx(t)〉, 〈Sy (t)〉, and 〈Sz (t)〉?

Note the μ-decay experiment and possible indications of new particles (supersymme- try).