Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2021 Dec 10;11:23774. doi: 10.1038/s41598-021-03241-8

A quantum encryption design featuring confusion, diffusion, and mode of operation

Zixuan Hu 1,2, Sabre Kais 1,2,
PMCID: PMC8664820  PMID: 34893658

Abstract

Quantum cryptography—the application of quantum information processing and quantum computing techniques to cryptography has been extensively investigated. Two major directions of quantum cryptography are quantum key distribution (QKD) and quantum encryption, with the former focusing on secure key distribution and the latter focusing on encryption using quantum algorithms. In contrast to the success of the QKD, the development of quantum encryption algorithms is limited to designs of mostly one-time pads (OTP) that are unsuitable for most communication needs. In this work we propose a non-OTP quantum encryption design utilizing a quantum state creation process to encrypt messages. As essentially a non-OTP quantum block cipher the method stands out against existing methods with the following features: 1. complex key-ciphertext relation (i.e. confusion) and complex plaintext-ciphertext relation (i.e. diffusion); 2. mode of operation design for practical encryption on multiple blocks. These features provide key reusability and protection against eavesdropping and standard cryptanalytic attacks.

Subject terms: Quantum physics, Quantum information, Qubits

Introduction

Cryptography—the study of secure communication in the presence of eavesdropping adversaries—is an important application of classical computing and information processing. Inspired by the rapid progress in both theory and experiment, the application of quantum computing and information processing techniques to cryptography has been extensively investigated14. A prominent example is the potential of Shor’s factorization algorithm5 to break the most widely used public-key encryption system. Facing this challenge, classical cryptography is considering post-quantum cryptographic systems6,7 that are secure against current and future quantum algorithms. On the other hand, the emergence of cryptographic systems based on quantum technologies has led to the burgeoning field of quantum cryptography. Currently there are two major directions of quantum cryptography: quantum key distribution (QKD) and quantum encryption algorithm. The QKD2,3,811 focuses on secure key generation and distribution by exploiting quantum phenomena such as the probabilistic nature of quantum measurement and the non-locality of entanglement. The development of the QKD has successfully produced widely accepted key-distribution protocols such as the BB843. Note that the QKD only processes the keys while the encryption process, decryption process, and the communication process have to use established classical algorithms and channels. A notable derivation of the QKD, the quantum secure direct communication (the QSDC)1216 also exploits quantum measurement and entanglement to establish a secure quantum channel, which is then used to send direct messages without involving any encryption process. Here we see that neither the QKD nor the QSDC attempts to encrypt messages with quantum techniques, and that is the area covered by quantum encryption. Quantum encryption algorithms use quantum computing techniques to encrypt messages (classical or quantum) into quantum states that are communicated to and decrypted by the recipient. In contrast to the well accepted success of the QKD, the development of quantum encryption algorithms is rather limited to designs1719 that are mostly quantum versions of the one-time pad (OTP). The OTP is an encryption scheme that ensures perfect secrecy20 in the sense that the ciphertext (i.e. the encrypted message) provides no information at all on the plaintext (i.e. the original message) to any cryptanalytic attempt—which means the OTP is unbreakable even with infinite computational resources. However, a critical problem with using the OTP is that each original message requires a unique key of the same length as the message itself. As the key must be random and can never be re-used20, the generation, transfer, and storage of indefinite amount of keys for an OTP are difficult in practice, making the OTP not suitable for the majority of the communication needs of the present day. Consequently most widely used encryption methods such as the symmetric encryption Advanced Encryption Standard (AES)21 and the asymmetric encryption Rivest-Shamir-Adleman (RSA)22 offer not perfect secrecy but practical secrecy20—i.e. breaking the encryption requires currently unrealistic computational resources. In this work we propose a new non-OTP quantum encryption design that utilizes a quantum state creation process to encrypt messages. Using a quantum state as the ciphertext, the quantum encryption offers an inherent level of protection against eavesdropping, because without the key any brute force measurement of the ciphertext state will collapse it into a random basis state. The non-readability of the ciphertext is a unique advantage of quantum encryption over classical methods where the ciphertext is just a bit string. Next we introduce the concepts of confusion (complex key-ciphertext relation) and diffusion (complex plaintext-ciphertext relation) from classical cryptography into quantum encryption and propose a novel encryption process that creates both confusion and diffusion. This ensures that small differences in the plaintext lead to substantial changes in the ciphertext or vice versa, such that the inability of a potential adversary to analyze the ciphertext state is amplified. Finally, we introduce the concept of mode of operation from classical cryptography into quantum encryption to enable practical encryption on arbitrary number of blocks of plaintexts. The mode of operation procedures developed for the quantum encryption design generalize the classical cipher block chaining (CBC)23 to work with a quantum ciphertext by exploiting unique properties of quantum measurement and quantum superposition. The quantum mode of operation therefore has truly random or unreadable plaintext-altering materials that are impossible for the classical CBC mode. The adaptation of confusion, diffusion and mode of operation from classical cryptography into quantum cryptography not only provides key reusability and stronger security against standard cryptanalytic attacks but also establishes new design principles for the systematic development of quantum encryption methods which may lead to improved quantum cryptographic systems beyond the particular design of the current study.

Results

Encrypting classical data with quantum states

The essence of any encryption method with practical secrecy is a reversible process whose computational cost strongly depends on a secret piece of information called the key. In this work we focus on the symmetric-key scenario where decryption uses the same key as encryption. Consider an n-bit classical plaintext, practical secrecy is defined such that for the legitimate parties of the communication Alice and Bob knowing the key, both encryption and decryption are computationally simple in the sense that the number of computational steps required is polynomial: i.e. Ocnk for some constant c and k such that cnk is overwhelmingly smaller than 2n. In the meanwhile, for the adversary Eve not knowing the key, both encryption and decryption are computationally hard in the sense that the number of computational steps required is exponential: i.e. much greater than O2n. To achieve this with quantum encryption Alice starts with an n-qubit quantum state in the initial state 0n. The first step Alice applies at most n Pauli-X gates to encode an n-bit classical plaintext into a quantum state plaintext: e.g. 00101 is coded into 00101. The second step she applies a polynomial sequence of 1-qubit and 2-qubit elementary gates to transform the quantum plaintext into a quantum state that serves as the quantum ciphertext, and then sends it to Bob. The account of the polynomial sequence of elementary gates used by Alice is the key pre-shared with Bob such that upon receiving the quantum ciphertext Bob can apply the inverse operations to recover the quantum plaintext. The classical plaintext can then be revealed by projection measurement on the quantum plaintext in the computational basis. So far without going into any detail of the encryption procedure, the just described process is not so different from a generalization of existing studies of quantum encryption1719,24, and we will later in “The quantum encryption with confusion and diffusion” and “Mode of operation” present the new quantum encryption design with confusion, diffusion, and mode of operation that provide key reusability and stronger security. However, here we first discuss certain security already provided by just considering the quantum nature of the ciphertext.

Firstly, note the fact that a quantum state ciphertext naturally contains more uncertainty than a classical ciphertext. For example a classical bit 0 (1) can be mapped to a qubit state 0 (1), which after a unitary operation becomes a10+a21 (a20-a11), where a12+a22=1. For encryption purpose a ciphertext in the form of a10+a21 presents more difficulty to the eavesdropper Eve, because even if she has successfully intercepted the state a10+a21, without the key (i.e. the value of a1) she cannot reliably read the content of the ciphertext. In practice if we assume a1 can take N discrete values between 0 and 1, the uncertainty associated with it is typically far greater than 1 bit as N2. This difficulty for Eve is much more significant for a multi-qubit ciphertext state in which qubits are entangled with each other. This is because a brute-force measurement on the ciphertext state destroys the intricate dependencies among qubits and collapses the ciphertext into a simple state with all qubits in either 0 or 1: such a state has little resemblance to either the ciphertext state or the plaintext. Consequently quantum encryption exploits the quantum phenomena of superposition and entanglement to produce a ciphertext that cannot even be read without the key. In comparison, a classical ciphertext is typically a bit-string with the same length as the plaintext, and it can be read and analyzed by Eve to gain information on the key and the plaintext.

Secondly, even if Eve is able to read the ciphertext—assuming the rare and can-be-avoided scenario that Alice sends the same ciphertext state many times and Eve is able to gain statistical knowledge of it—it is still highly difficult for her to deduce the key or the plaintext from the ciphertext. The detail of this reasoning is presented in the Supplementary Information S1 where the quantum state complexity theory in our previous study has been used25. Furthermore, this compromising scenario of Alice sending the same copy of the ciphertext many times can be totally avoided by the confusion, diffusion, and mode of operation to be introduced in the following sections.

The quantum encryption with confusion and diffusion

So far we have seen two security features by using a quantum state as the ciphertext: the difficulty in reading the quantum ciphertext and the impossibility to deduce the key even if the quantum ciphertext is somehow known. These features however are not sufficient for a good encryption method: to provide reusability of keys and protection against standard cryptanalytic attacks we need to design an encryption with good confusion and diffusion20. Confusion means complex relation between the ciphertext and the key such that it is difficult to deduce key properties by analyzing the patterns in ciphertexts. Classically if one bit in the ciphertext depends on multiple parts of the key, confusion is provided. For our quantum encryption design, as the ciphertext cannot be measured deterministically, confusion can be accordingly defined that the statistics of measuring one qubit in the ciphertext state depends on multiple parts of the key. Diffusion means complex relation between the plaintext and the ciphertext such that it is difficult to deduce plaintext properties by analyzing the patterns in ciphertexts or vice versa. Classically if changing one bit in the plaintext (ciphertext) changes more than half of the bits in the ciphertext (plaintext), diffusion is provided. Again since in our quantum encryption the ciphertext cannot be measured deterministically, diffusion can be defined that changing the value of one qubit in the plaintext leads to changes of statistics of measuring more than half of the qubits in the ciphertext. Note the vice versa ciphertext-to-plaintext relation is not defined for the quantum case because it is impossible to create a proper ciphertext without knowing the plaintext and the key first.

We start with a basic encryption design where one unitary Ui with real parameters (for simplicity we assume all parameters in the following discussions are real, however the method can be generalized to have complex parameters) is applied to each qubit qi of the plaintext, and no CNOT is applied. The key is then the collection Ui where the order of Ui’s is unimportant. Clearly this encryption does not provide either confusion or diffusion because the statistical pattern of measuring each qubit qi of the ciphertext depends on only one part of the key Ui and only one qubit (the same qi) of the plaintext. For example suppose after this step in the ciphertext q1=a101+a211 and q2=b102+b212, then the probability of measuring 0 for q1 is p01=a12 and the probability of measuring 0 for q2 is p02=b12. If this key is reused many times, Eve would be able to deduce U1 and U2 by measuring the probability of outcomes for q1 and q2 of the ciphertext (the same for all other qubits). Now after this step if we apply CNOT12 (where 12 means q1 is the control and q2 is the target), the 2-qubit state is:

ϕ2=a101b102+b212+a211b112+b202 1

then by simple calculation p01=a12 still but p02=a12b12+a22b22—we see that q2 gains a dependence on U1 in the sense that the probabilities of outcomes when measuring q2 depend on U1 after CNOT12 is applied. If we further apply CNOT23 to q3=c103+c213, the 3-qubit state is:

ϕ3=a1b101+a2b21102c103+c213+a1b201+a2b11112c113+c203 2

then p01=a12, p02=a12b12+a22b22, p03=a12b12+a22b22c12+a12b22+a22b12c22—i.e. q3 gains dependences on both U1 and U2. The results in Eqs. (1) and (2) reveal the effects of 1-qubit unitaries and CNOT’s from a cryptographic perspective:

Theorem 1

If the probabilities of outcomes when measuring a qubit depend on some 1-qubit unitaries applied to this or any other qubit, we say this qubit has dependences on these 1-qubit unitaries. Then a 1-qubit unitary creates dependences on its target qubit and a CNOT causes the target qubit to gain all the dependences from the control qubit, while the control qubit retaining all its dependences.

Proof of Theorem 1

Suppose q1 is one qubit in a general n-qubit state ϕn, the Schmidt decomposition of ϕn with respect to q1 is:

ϕn=C1ϕ1n-1a101+a211+C2ϕ2n-1a201-a111 3

where ϕ1n-1 and ϕ2n-1 are orthogonal, and therefore p01=C12a12+C22a22: this means q1 depends on the pairs C1,C2 and a1,a2 that are created by previous quantum operations used to generate ϕn. Now applying another unitary gate U=u1u2u2-u1 to q1 we get:

Uϕn=C1ϕ1n-1a1u1+a2u201+a1u2-a2u111+C2ϕ2n-1a2u1-a1u201+a2u2+a1u111 4

where p01=C12a1u1+a2u22+C22a2u1-a1u22, so indeed q1 has gained dependence on U. Note that for any U, a1u1+a2u201+a1u2-a2u111 is always orthogonal to a2u1-a1u201+a2u2+a1u111, and thus the probabilities of no qubit other than q1 are affected by U. Now suppose we further Schmidt-decompose ϕ1n-1 and ϕ2n-1 in Eq. (3) with respect to another qubit q2:

ϕn=C1D11ϕ11n-2b1102+b1212+D12ϕ12n-2b1202-b1112a101+a211+C2D21ϕ21n-2b2102+b2212+D22ϕ22n-2b2202-b2112a201-a111 5

where ϕ11n-2ϕ12n-2=ϕ21n-2ϕ22n-2=0, and then we can calculate the probability:p02=C12D112b112+D122b122+C22D212b212+D222b222. We see that q1 and q2 share a dependence on the pair C1,C2 but the dependence on a1,a2 is unique to q1. Now apply CNOT12 to ϕn:

CNOT12ϕn=a1C1D11ϕ11n-2b1102+b1212+D12ϕ12n-2b1202-b1112+a2C2D21ϕ21n-2b2102+b2212+D22ϕ22n-2b2202-b211201+a2C1D11ϕ11n-2b1112+b1202+D12ϕ12n-2b1212-b1102-a1C2D21ϕ21n-2b2112+b2202+D22ϕ22n-2b2212-b210211 6

After some algebra we obtain:

p02=a12C12D112b112+D122b122+C22D212b222+D222b212+a22C22D212b212+D222b222+C12D112b122+D122b112+2a1a2C1C2D11D21ϕ11n-2ϕ21n-2b11b21-b12b22+D11D22ϕ11n-2ϕ22n-2b11b22+b12b21+D12D21ϕ12n-2ϕ21n-2b12b21+b11b22+D12D22ϕ12n-2ϕ22n-2b12b22-b11b21 7

where we see that q2 has gained dependence on the pair a1,a2, which was originally unique to q1. Because the form of ϕn in Eq. (3) is entirely general, q1’s dependence on a1,a2 can be understood as a package including all its dependences gained in the process of creating ϕn—through either 1-qubit unitaries applied to q1 or CNOT’s applied to q1 as the target. Equation (7) shows that by a single CNOT12 all q1’s dependences packaged in a1,a2 are created on q2. It is trivial to see that q1 still retains its dependences. This concludes the proof for Theorem 1. Note that the dependences created on q2 are not the same as those on q1—the probabilities indeed depend on the same unitaries, but the exact forms are different. Theorem 1 is significant that it allows us to create new probability dependences with 1-qubit unitaries on selective qubits and then efficiently pass them onto other qubits by CNOT gates. In the following we show how to use this result to design an encrypting process with good confusion and diffusion properties.

The encrypting process with good confusion and diffusion:

Start with an n-qubit plaintext where each qubit qi is either 0 or 1.

Step 1: Apply a 1-qubit unitary Ui to each qubit qi and create the initial dependence of each qi to its corresponding Ui. This is the basic key design mentioned earlier. If each Ui is defined by a real parameter that can take N discrete values, there are totally Nn possibilities that contribute to key size. This step costs n Ui gates.

Step 2: Apply CNOTii+1 sequentially for i=1ton-1: i.e. CNOT12 first, then CNOT23, then CNOT34,…, finally CNOTn-1n. By Theorem 1, the CNOT12 causes q2 to gain the dependence on U1 from q1, and then CNOT23 causes q3 to gain all the dependences from q2 that include both U2 from q2 itself and U1 that q2 has just gained from q1. In such a snowball process, each further CNOTkk+1 causes qk+1 to gain dependences on all the Ui’s for ik. After this step each qi with i>n2 (n even) or i>n+12 (n odd) has gained dependences on more than half of the Ui’s. We remark that the order of the application of the CNOTii+1 gates is important: if we apply CNOT23 before CNOT12, q2 has not gained the dependence on U1 from q1 yet and thus q3 will not gain that dependence either. Applying CNOT23 before CNOT12 is therefore less efficient than applying CNOT23 after CNOT12 as the latter can pass more dependences from q2 to q3. This step costs n-1 CNOT gates.

Step 3: When n is even, for each qi with i>n2 (the downstream qubits), randomly assign a different qk with kn2 (the upstream qubits), such that all the qubits are paired. When n is odd, disregard the n+12th qubit and pair the remaining even number of n-1 qubits as just described. Apply CNOTik for each pair such that the upstream qk gains all the dependences from the downstream qi. After Step 2 each downstream qi with i>n2 (n even) or i>n+12 (n odd) depends on more than half of the Ui’s, and in Step 3 by the CNOTik gates these downstream qubits pass all their dependences to the corresponding upstream qubits. Consequently after Step 3 each one of the upstream qubits will have gained dependences on more than half of the Ui’, and this complex relation between the ciphertext and the key provides confusion as defined earlier. The process that gets all qubits into pairs has n2! (n even) or n-12! (n odd) possibilities that contribute to key size. This step costs n2 CNOT gates.

Step 4: Now to achieve diffusion defined earlier we want the property that changing the value of one qubit in the plaintext changes the statistics of measuring more than half of the qubits in the ciphertext. Suppose a qubit qj is 0 in the plaintext, after Uj in Step 1 it becomes a10j+a21j and p01=a12. If the plaintext qj is changed to 1 then after Uj it becomes a20j-a11j and p01=a22, so the dependence of qj on Uj has changed. In addition, although the minus sign in a20j-a11j does not immediately have an effect on probabilities, it can change how the subsequent qubits depend on Uj after Steps 2 and 3. Hence we see that a value change in one qubit qj in the plaintext will affect all the ciphertext qubits that have gained dependences from qj. This means that any upstream qubit qk with kn2 already has diffusion after Steps 2, because all the downstream qubits in the ciphertext (more than half of all qubits) have gained dependences from qk. On the other hand the downstream qubits do not yet have diffusion after Step 2: e.g. no other qubit is dependent on qn because it is at the end of the chain of control in Step 2. Now to create diffusion in the downstream qubits, we just need to use these qubits as control and apply CNOT gates to random qubits as targets (can be either upstream or downstream) until on average more than half of all qubits have gained dependences from any qubit. For example, two qubits have gained dependences from the last qubit qn after Step 3: qn itself and the qubit assigned to pair with qn, thus we need to apply at most n2-2 CNOT gates using qn as the control to pass qn’s dependences to half of all qubits. The actual CNOT gates required may be fewer than n2-2 because we can first pass qn’s dependences to another downstream qubit such as qn-2, and then any CNOT gate using qn-2 as the control will also pass qn’s dependences to the target. In fact, an example of a very efficient implementation is as shown in Step 4 of Fig. 1 to apply a series of CNOT gates running alternately through the downstream and upstream qubits, where the target qubit of the previous CNOT serves as the control qubit of the next CNOT: e.g. CNOTn1 first, then CNOT1n-1, then CNOTn-12, then CNOT2n-2, … , finally CNOTn/2n/2+1. By Theorem 1 it is easy to verify that this implementation guarantees more than half of all qubits have gained dependences from any downstream qubit. Unlike the previous steps, Step 4 allows greater freedom in the key design and the exact evaluation of the contribution to key size and gate cost is impossible. However, for the particular implementation just described, the order of the upstream qubits can be any permutation and thus there are n2! possibilities that contribute to key size. This implementation costs n CNOT gates.

Figure 1.

Figure 1

Graphical illustration of the encrypting process with an 8-qubit example. The circles with numbers inside represent the qubits. The arrows represent CNOT gates for which each arrow begins at the control qubit and points to the target qubit. The numbers on the arrows indicate the order in which the CNOT gates are applied within the current step. Step 1: apply a 1-qubit Ui to each qubit qi. Step 2: apply CNOTii+1 sequentially for i=1ton-1, this step causes the downstream qubits 5–8 to gain dependences on more than half of the Ui’s. Step 3: use the downstream qubits 5–8 as controls and the upstream qubits 1–4 as targets to apply CNOT gates. Showing one example out of the n2! possible ways the qubits are paired. The CNOT gates in this step all commute so the order is unimportant. After this step confusion is achieved. Step 4: with the general goal of achieving diffusion, this step has great freedom. In the particular example shown here, a series of CNOT gates run alternately between the downstream and upstream qubits. After this step diffusion is achieved.

Step 4 concludes the ciphertext creation process. A graphical illustration of the four steps of encryption is drawn in Fig. 1. The account of all the unitaries and CNOT gates used is the key shared with the recipient, who can then recover the plaintext by reversing all the gates.

Through the description and analysis of the encrypting process, we can see that our quantum encryption design supports efficient implementation with On gates and large key size with at least ONnn2! possible variations. More importantly the design has provable confusion and diffusion that makes the key reusable while protecting against common cryptanalytic attacks. A worked-out 4-qubit example of the encryption process can be found in the Supplementary Information (S2).

Mode of operation

The quantum encryption described so far is a block cipher where each block of message containing n bits of classical information is encrypted into a quantum state of n qubits. Similar to the classical counterpart, the quantum block cipher also requires a mode of operation to ensure that different ciphertexts (blocks) are generated even with the same plaintext and key used. This feature together with diffusion allows the key to be reused many times to securely transmit large amount of information. Our mode of operation is inspired by the classical cipher block chaining (CBC)23. In the CBC mode a randomly chosen n-bit initialization vector (IV) is XORed () with the plaintext P1 of the first block, the encrypting algorithm then works on IVP1 to produce the first ciphertext C1. Next C1 is XORed with the plaintext P2 of the second block before it is encrypted into C2. Repeat this process many times where each time the plaintext Pi of the current block is XORed with the ciphertext Ci-1 of the previous block before getting encrypted into the ciphertext Ci of the current block:

Ci=EKPiCi-1,C0=IV 8

where EK is the encrypting function with the key K. To generalize the CBC to our quantum encryption, the ciphertext here is a quantum state that cannot be directly XORed with the plaintext of the following block, and in the following we propose two different modes to solve this problem.

In the first mode shown in Fig. 2, after the first ciphertext state C1 has been created C1=EKP1IV, we create an additional copy of C1 and measure it in the computational basis 0,1. This will collapse the copy of C1 into a classical bit string MC1, which can be then used to XOR with the plaintext of the following block to produce P2MC1. We then encrypt this with EKP2MC1=C2 and send the recipient both MC1 and C2. Repeat this process iteratively we have the general procedure:

Ci=EKPiMCi-1,MC0=IV 9

where MCi-1 is the measurement result on the extra copy of Ci-1. When the recipient has received MCi-1 and Ci for each block after the first one, he decrypts with EK-1Ci=PiMCi-1, and then XOR with MCi-1 such that Pi=PiMCi-1MCi-1 is recovered.

Figure 2.

Figure 2

The first mode of operation mechanism shown with a 3-block example. In each iteration after the first one, the extra copy of the ciphertext state Ci-1 is measured into a classical bit string MCi-1 that is then XORed with the plaintext Pi.

In the second mode shown in Fig. 3, after the first ciphertext state has been created by C1=EKP1IV, we use the qubits of C1 as controls to apply CNOT gates to the qubits of the following plaintext. Each qubit on C1 as the control is paired with a different qubit on the following plaintext as the target. For simplicity, the same pairing plan that specifies which qubit of the current ciphertext state controls which target qubit of the next plaintext can be used for each iteration. Repeat this process iteratively:

C1=EKP1IV,Ci=EKCNOTCi-1Pi,i>1 10

where CNOTCi-1Pi represents the altered plaintext after each qubit on the ciphertext state Ci-1 as the control has applied a CNOT to a different qubit on the plaintext state Pi as the target. When the recipient has received Ci-1 and Ci for each block after the first one, he decrypts with EK-1Ci=CNOTCi-1Pi to get the altered plaintext, and then use the qubits of Ci-1 as controls to apply CNOT gates on the qubits of the altered plaintext to recover Pi.

Figure 3.

Figure 3

The second mode of operation mechanism shown with a 3-block example. In each iteration after the first one, each qubit on the ciphertext state Ci-1 as the control applies a CNOT to a different qubit on the plaintext state Pi as the target.

Compared to the classical CBC, both quantum modes of operation have additional security because the material used to alter the plaintext for each iteration after the first one is not simply the ciphertext of the last block that is revealed to Eve. For the first mode, the bit string MCi-1 for each iteration is generated with the truly random process of quantum measurement (as compared to pseudo-random number generation in classical computing) on the previous ciphertext state. For the second mode, all Ci-1’s are quantum states that cannot be reliably read. Furthermore, in the second mode the pairing plan of which qubit on the Ci-1 controls which qubit on the next plaintext can be pre-shared as additional parts of the key—which has n! complexity. Both quantum modes of operation ensure different ciphertexts are generated even with the same plaintext and key used. Now comparing the two designs, the first mode is much easier to implement because each MCi-1 as in Eq. (9) is a classical object and its XOR operation with the next plaintext is classical. On the other hand the second mode requires the ability to use the ciphertext state to control the next plaintext, which means more sophisticated quantum operations at both the encryption and the decryption ends. As a tradeoff the first design requires an additional classical channel to transmit the bit string MCi-1 for each iteration (note this channel does not need to be secure because the bit string used to alter the plaintext in a mode of operation can be public without compromising security), while the second design only needs to pre-share two pieces of information: the initial IV and the pairing plan, and none other than the ciphertext is shared at the time of communication. Hence, the first design would be used when we prefer minimal quantum operations and have an additional non-secure classical channel available, while the second design would be used when we can afford more complex quantum operations and prefer to send a single ciphertext without additional channels. The increased key complexity through the pairing plan for the second design would also be a consideration.

Discussion

The mode of operation together with the encryption process completes our description of the new quantum encryption design. In actual application, Alice will first encode the classical bit string into a quantum basis state (e.g. 00101 is coded into 00101), and then apply a sequence of quantum gates following the procedure in “The quantum encryption with confusion and diffusion” to create a quantum ciphertext. Note that the procedure in “The quantum encryption with confusion and diffusion” is only a guideline to ensure confusion and diffusion by the result of Theorem 1. In this sense Theorem 1 can be considered as a foundational result that may inspire many other encryption procedures in addition to the particular one described in this work. Nonetheless the procedure in “The quantum encryption with confusion and diffusion” already provides great freedom with at least ONnn2! variations contributing to the key size if a brute force attack is attempted. On the other hand the implementation cost of the procedure is only On gates, which is very efficient. The ciphertext state can then be sent to Bob through an unsecure channel with possible eavesdropping by Eve. An account of the exact sequence of quantum gates applied by Alice is the key shared with Bob through a secure channel—note this can be done long before the actual communication happens thus it is harder to expect and attack by Eve. Upon receipt of the ciphertext state, Bob can apply the inverse quantum operations to recover the plaintext. After the first block of plaintext, additional blocks of plaintexts can be encrypted with additional mode of operation procedures as described in “Mode of operation” such that the statistics of the ciphertext state is further disguised.

The security of the quantum encryption design is provided by multiple mechanisms. Firstly the use of a quantum state as the ciphertext makes it impossible for Eve to reliably read and analyze the ciphertext. This is a unique quantum advantage over classical methods for which the ciphertext is just a bit string. In principle Eve could gain statistical knowledge of the ciphertext if the same one is sent many times, but this possibility is prevented by implementing one of the two quantum modes of operation. The two quantum modes of operation provide truly random or unreadable plaintext-altering materials depending on the mode of choice, and these are impossible for classical modes of operation. Having provable confusion and diffusion provides our method an additional layer of protection against potential cryptanalysis, because small changes in the plaintext lead to substantial changes in the ciphertext or vice versa. On the contrary, knowing the key, the legitimate recipient Bob can easily reverse the encrypting process to generate the plaintext deterministically from the ciphertext, without the need to actually read the ciphertext. The unique situation that the ciphertext can lead to the plaintext deterministically while not readable itself, together with features like confusion, diffusion, and mode of operation, make our quantum encryption strongly resistant to cryptanalytic attacks. For example, the chosen-plaintext attack (CPA) and the chosen-ciphertext attacks (CCA1 and CCA2) require Eve to analyze a few plaintext-ciphertext pairs to gain knowledge of the key. Now that the ciphertext being unreadable, and the statistics being obscured by confusion, diffusion, and mode of operation, it is very difficult for Eve to extract information from a few plaintext-ciphertext pairs. In addition, eavesdropping by Eve on the ciphertext inevitably disturbs the quantum state such that the recipient Bob can detect such interception. For Bob to determine if his measurement result is the correct message, the message disturbed by Eve, or the message corrupted by inherent system uncertainties (gate error, channel noise, etc.), multiple blocks of the same plaintext should be sent thus to establish a protocol analogous to the repetition code for error correcting purposes. As an interesting idea for future studies, the exact number of repetitions required for reliable communication should depend on the gate quality, channel quality, and key design.

Conclusion

In this work we have developed a quantum encryption design that utilizes a quantum state creation process to encrypt messages. By using a quantum state as the ciphertext and the creation procedure as the key, an inherent level of security is guaranteed by the statistical nature of quantum measurements as well as the complexity of the state creation process. We then introduce the concepts of confusion and diffusion from classical cryptography into quantum encryption and provide both features with a novel quantum encryption process. Finally we introduce the concept of mode of operation from classical cryptography into quantum encryption by proposing two modes of operation inspired by the classical CBC mode. The adaptation of confusion, diffusion and mode of operation from classical cryptography into quantum cryptography not only provides key reusability and stronger security against standard cryptanalytic attacks but also establishes new design principles for the systematic development of quantum encryption methods which may lead to improved quantum cryptographic systems beyond the particular design of the current study.

Supplementary Information

Supplementary Information. (163.5KB, docx)

Acknowledgements

The authors would like to acknowledge funding by the U.S. Department of Energy (Office of Basic Energy Sciences) under Award No. DE-SC0019215.

Author contributions

Z.H. and S.K. conceived the quantum encryption design. Z.H. developed the theory and the encryption procedure. All authors were involved in discussing the results and writing the manuscript.

Funding

This article was funded by US Department of Energy (Grant no. DE-SC0019215).

Data availability

No data is generated in this work.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

The online version contains supplementary material available at 10.1038/s41598-021-03241-8.

References

  • 1.Gisin N, et al. Quantum cryptography. Rev. Mod. Phys. 2002;74(1):145–195. doi: 10.1103/RevModPhys.74.145. [DOI] [Google Scholar]
  • 2.Ekert AK. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 1991;67(6):661–663. doi: 10.1103/PhysRevLett.67.661. [DOI] [PubMed] [Google Scholar]
  • 3.Bennett CH, Brassard G. Quantum cryptography: Public key distribution and coin tossing. Theoret. Comput. Sci. 2014;560:7–11. doi: 10.1016/j.tcs.2014.05.025. [DOI] [Google Scholar]
  • 4.Pirandola S, et al. Advances in quantum cryptography. Adv. Opt. Photon. 2020;12(4):1012–1236. doi: 10.1364/AOP.361502. [DOI] [Google Scholar]
  • 5.Shor PW. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 1997;26(5):1484–1509. doi: 10.1137/S0097539795293172. [DOI] [Google Scholar]
  • 6.Bernstein DJ. Introduction to post-quantum cryptography. In: Bernstein DJ, Buchmann J, Dahmen E, editors. Post-quantum cryptography. Berlin: Springer; 2009. pp. 1–14. [Google Scholar]
  • 7.Bernstein DJ, Lange T. Post-quantum cryptography. Nature. 2017;549(7671):188–194. doi: 10.1038/nature23461. [DOI] [PubMed] [Google Scholar]
  • 8.Bennett CH, Brassard G, Mermin ND. Quantum cryptography without Bell's theorem. Phys. Rev. Lett. 1992;68(5):557–559. doi: 10.1103/PhysRevLett.68.557. [DOI] [PubMed] [Google Scholar]
  • 9.Jennewein T, et al. Quantum cryptography with entangled photons. Phys. Rev. Lett. 2000;84(20):4729–4732. doi: 10.1103/PhysRevLett.84.4729. [DOI] [PubMed] [Google Scholar]
  • 10.Xu F, et al. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020;92(2):5002. doi: 10.1103/RevModPhys.92.025002. [DOI] [Google Scholar]
  • 11.Yin J, et al. Entanglement-based secure quantum cryptography over 1120 kilometres. Nature. 2020;582(7813):501–505. doi: 10.1038/s41586-020-2401-y. [DOI] [PubMed] [Google Scholar]
  • 12.Long GL, Liu XS. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A. 2002;65(3):032302. doi: 10.1103/PhysRevA.65.032302. [DOI] [Google Scholar]
  • 13.Deng F-G, Long GL, Liu X-S. Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A. 2003;68(4):2317. [Google Scholar]
  • 14.Zhang W, et al. Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 2017;118(22):220501. doi: 10.1103/PhysRevLett.118.220501. [DOI] [PubMed] [Google Scholar]
  • 15.Zhou L, Sheng Y-B, Long G-L. Device-independent quantum secure direct communication against collective attacks. Sci. Bull. 2020;65(1):12–20. doi: 10.1016/j.scib.2019.10.025. [DOI] [PubMed] [Google Scholar]
  • 16.Zhou Z, et al. Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron. 2019;63(3):230362. doi: 10.1007/s11433-019-1450-8. [DOI] [Google Scholar]
  • 17.Boykin PO, Roychowdhury V. Optimal encryption of quantum bits. Phys. Rev. A. 2003;67(4):042317. doi: 10.1103/PhysRevA.67.042317. [DOI] [Google Scholar]
  • 18.Ambainis, A., et al. Private quantum channels. in Proceedings 41st Annual Symposium on Foundations of Computer Science (2000).
  • 19.Hayden P, et al. Randomizing quantum states: Constructions and applications. Commun. Math. Phys. 2004;250(2):371–391. doi: 10.1007/s00220-004-1087-6. [DOI] [Google Scholar]
  • 20.Shannon CE. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949;28(4):656–715. doi: 10.1002/j.1538-7305.1949.tb00928.x. [DOI] [Google Scholar]
  • 21.Nechvatal J, et al. Report on the development of the advanced encryption standard (AES) J. Res. Nat. Inst. Stand. Technol. 2001;106(3):511–577. doi: 10.6028/jres.106.023. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 22.Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM. 1978;21(2):120–126. doi: 10.1145/359340.359342. [DOI] [Google Scholar]
  • 23.Bellare, M., Kilian, J., & Rogaway, P. The security of cipher block chaining. in Advances in Cryptology—CRYPTO ’94. 1994. Berlin, Heidelberg: Springer Berlin Heidelberg.
  • 24.Zhou N, et al. Novel qubit block encryption algorithm with hybrid keys. Phys. A. 2007;375(2):693–698. doi: 10.1016/j.physa.2006.09.022. [DOI] [Google Scholar]
  • 25.Hu Z, Kais S. Characterization of quantum states based on creation complexity. Adv. Quant. Technol. 2020;1:43. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

Supplementary Information. (163.5KB, docx)

Data Availability Statement

No data is generated in this work.


Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES