Quantum Secure Communication via Steganography

Advisors: Prof. Keerti Kulkarni

Contents

Abstract

The idea is to encode the sender’s text(secret message) using the concept of interference. The secret message is encoded based on the cover file(a text sentence in this case). The evaluation was done using three different communication protocols, namely BB84, BBM92, and Ekert91, to evaluate the performance of the system. I compared the relative results obtained using each protocol to obtain more precise and accurate results. Additionally, I utilized a real quantum simulator named FakeWashingtonV2() to simulate the behavior of a real quantum computer. This simulator was chosen because it is a widely used open-source quantum simulator that can accurately simulate the behavior of a real quantum computer. By using this simulator, I was able to test the system’s performance under realistic conditions and compare it with the theoretical predictions obtained through simulations.

General Implementation

I have implemented Quantum Steganography using qiskit in this project. And, I have chosen the cover file and the secret message to be in text formats to make it easier for new learners to understand the concept of quantum steganography while also trying it out interactively in a console.

no of Qubits
I have chosen our cover file and the secret message to be in text formats to make it easier for new learners to understand the concept of quantum steganography while also trying it out interactively in a console.

Implementation Details

The encoder circuit is based on 7 qubits but our interactive application has an option to create circuits based on the number of qubits selected and view them instantaneously.

Here are some steps to interactively play with our application:

  1. Choose the number of qubits using the slider. I would suggest that you choose 7 for the encoding and decoding scheme to work flawlessly. You can also test out other number of qubits to view the generated circuit.
no of Qubits
  1. Enter the Secret message and press enter. For instance, let us try a letter, NOTE: Enter only small letters [i.e f,h,l, etc ]
no of Qubits

Here, you can also view the generated circuit below.

no of Qubits

Above is the transpilated circuit generated with respect to the secret key entered, using the special gates during Quantum Simulation

  1. The below fig. shows the randomly generated key by Alice and Bob.
no of Qubits
  1. Upload a sentence where you wish to hide your message and press enter. NOTE: Enter only small words [i.e family,hindrance,lanquage, etc ]
no of Qubits
  1. Click on encode to view the encoded message
no of Qubits
  1. Then click on decode to finally view your original secret message
no of Qubits

All the simulation was done qiskit sdk: [Secret key used: bnmit]

  1. The Simulator result obtained after decoded.
no of Qubits

The above graph selected is the output generated from the Quantum Simulator qasm_simulator.

Future Scopes and Improvements

As it is seen in the graphs, the simulation done on FakeWashingtonV2() quantum computer is comparatively different from the one done on simulation. It’s because Quantum computers are exceedingly difficult to engineer, build and program. As a result, they are crippled by errors in the form of noise, faults and loss of quantum coherence, which is crucial to their operation and yet falls apart before any nontrivial program has a chance to run to completion.

Comparison results of `qasm_simulation` and `FakeWashingtonV2()` for BB84 prtotcol
On Simulator [qasm]On real Quantum Computer [ibmq-bogota]
Comparison results of `qasm_simulation` and `FakeWashingtonV2()` for BBM92 protocol
On Simulator [qasm]On real Quantum Computer [ibmq-bogota]
Comparison results of `qasm_simulation` and `FakeWashingtonV2()` for Ekert91 protocol
On Simulator [qasm]On real Quantum Computer [ibmq-bogota]

Contributor:

Shisheer S Kaushik
Shisheer S Kaushik

Quantum Technology enthusiast

Next
Previous