SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Charushila Kadu, Dipti Sonwane, Dheera Jadhwani / International Journal of Engineering
            Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 2, Issue 6, November- December 2012, pp.188-191
   How to Avoid Passive Attacks on Data Using BB84 Protocol in
               Quantum Cryptography: A Review
                 Charushila Kadu, Dipti Sonwane, Dheera Jadhwani
                                       Computer Science Department,
                        G.H.Raisoni Institute of Engineering and Management, Jalgaon


Abstract
         This paper discuss about new type of            key exchange and use of quantum computers are the
cryptography known as quantum cryptography.              best example of use quantum cryptography.
We know that, cryptography is an art of                  Quantum cryptography gives guarantee to detect
converting data from one form to another one so          attacks like eavesdropping in key distribution as try
that it would not be easily known by outside             of listening keys disturb complete quantum data.
world. Many algorithms have been introduced              What is the need of quantum cryptography?
for converting from plain text to cipher text.                     Quantum cryptography can transmit a
Though there are various secured algorithms are          secret key over a long distance which is secure in
available for encryption, it is very difficult to        principle and based on laws of physics. Several
avoid passive attacks on data. Passive attacks are       methods of key distribution are available but they all
very dangerous as both parties included in               are based on unproven mathematical assumption.
communication       never   know     that    their       These all methods are always on risk of being
communication is getting attacked and hence this         attacked by the attacker. If you want long-term
attack becomes dangerous. Popular example for            security, then its really a matter of fact. Quantum
passive attack is eavesdropping which is also now        key distribution is known as a subset of quantum
as dangerous because if anyone is eavesdropping          cryptography which is developed for transferring
your communication, how you will come to know            and distributing keys during symmetric encryption.
about that? This paper discusses the concept of
quantum cryptography as a solution to this               II. TYPES OF QUANTUM CRYPTOGRAPHY
attack.                                                  A. Post-quantum cryptography
                                                                  Post quantum cryptography refers public –
Keywords— quantum cryptography, passive                  key cryptosystems which cannot be brake by
attacks,   encryption       key,     eavesdropping,      quantum computers. Basic need behind the evolution
encryption algorithm                                     post quantum cryptography is that most of the
                                                         popular public cryptographic systems are based on
I. WHAT IS QUANTUM CRYPTOGRAPHY?                         integer factorization problem and discrete
          We all know that cryptography is a             logarithmic algorithm which are easily breakable by
technique of converting data from one form into          large    quantum        computers      using    Shor's
another for its safety. Several different algorithms     algorithm.[1][2].Though,       current       available
are implemented for maintains safety of data in          experimental quantum cryptography is very secure,
cryptography. Use of algorithm get differs from the      most of the cryptographers are searching new
type of cryptography we are using for the encryption.    algorithms for if quantum cryptography also have
Mostly, there are two types of attacks on data in        danger form attackers in future. In contrast to this,
network. These are active and passive attacks. We        symmetric cryptography which is performed by
know that comparative to active attacks; passive         symmetric ciphers and hash functions are still
attacks are most dangerous one as parties taking part    secured from quantum computers.[2][5] . Though
in communication don’t aware about something             Grover’s algorithm can increase the attacks on
happening wrong with their data. If we know about        symmetric cipher text, the danger can be avoided by
the attack (active attack) which is taking place on      increasing the size of key used for encryption.
our data, we can take some actions against it, but if
we don’t know that data is being attacked then its       B. Position based-quantum cryptography
security is naturally under high risk. Then, how to               Position based quantum cryptography is
avoid passive attacks like release of message content,   based on fixed geographical location. Suppose there
traffic analysis? Quantum cryptography is the best       are two parties are interested in communication and
solution to overcome this problem. Quantum               if they are using position-based quantum
cryptography uses quantum mechanical effect to           cryptography then one party can send message to
encryption or decryption. Quantum mechanical             another party only if the other one is at particular
effect includes quantum communication and                expected location otherwise data will not be
quantum computation. Quantum communication for           delivered. How the verification task is performed



                                                                                               188 | P a g e
Charushila Kadu, Dipti Sonwane, Dheera Jadhwani / International Journal of Engineering
            Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 2, Issue 6, November- December 2012, pp.188-191
then? Basic task of position-verification is that,          b) When this horizontally-polarized qubit is passed
receiver has to convince verifier that he is located at   through vertically polarizing beam splitter, it always
particular location. This technique is successful         gains its horizontal polarization.
when there are many restrictions on adversaries.
First position-based quantum techniques were               c) What happen if the horizonatally-polarized
investigated by Kent in 2002 which is known as            photon passes through diagonally-oriented beam
quantum tagging. A patent for position based-             splitter:
quantum cryptography known as US-patent [13] was
granted in 2006, and scientific literature published               There are 50% chances of finding the
results in 2010.[14] Several position-based quantum       photon at one of the exit.
cryptography protocols have been suggested mostly                  Photon will detect at one of the exit.
using quantum entanglement.                                        The polarization of photon will changed
                                                          into the corresponding diagonal polarization.
III. QKD AND QUBITS                                       Expected output for the step c is photon will be
          Quantum key distribution is most well           blocked and not passed through and it will change
known and developed application of quantum                polarization. Polarized photon will convey digital
cryptography which is also known as QKD. QKD              information, details of which are shown in Fig.2.
explain the process of using quantum cryptography
for distributing key between two parties taking part
in communication without disturbing third party. If
these parties are communicating with each other and
if third party try to eavesdrop the content, then
complete bit pattern may get disturbs.

          Security of quantum key distribution can be
easily proved without imposing any type of
restriction on eavesdropper which is not possible by
using classical cryptography, which is known as
“unconditional security”. But there may be chances
of man-in-middle-attacks if eve becomes able to
impersonate Alice or Bob. Quantum cryptography is
commercially available in the form of QKD only.
Basic unit of quantum information is quantum bit
known as qubit. Value of the quantum bit is taken as
its polarization as value of classical bit can be taken
as 0 or 1 only.
                                                          Fig. 2 polarized       photons    conveying    digital
A. Quantum properties                                     information
          As we know that digital systems use binary
states like one/zero, on/Off or Yes/No, what is the       B. BB84 Protocol
state of quantum bit? Qubit is considered as single                BB84 protocol is the first quantum
photon and its manipulation is shown in Fig 1.            cryptographic protocol discovered by Charles H.
                                                          Bennet of IBM New York and Gilles Brassard of the
                                                          University of Montreal in 1984.This protocol is
                                                          based upon the technique of generation of secretes
                                                          keys for encryption and decryption. This is
                                                          implemented in different technologies which are as
                                                          follows.
                                                                  Single Photon polarization
                                                                  Two Photon entanglements
                                                                  Single photon Self interference phase
                                                          modulation

Fig. 1 qubit and single Photon                            Here we will how BB84 protocol works for single
                                                          photon polarization is discussed.
a): A photon is emitted from light source and passes      .
through linear polarizer, here we consider horizontal             Alice will create photon by single photon
polarizer. This process will create qubit with            from light source.
horizontal polarization.



                                                                                                189 | P a g e
Charushila Kadu, Dipti Sonwane, Dheera Jadhwani / International Journal of Engineering
            Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 2, Issue 6, November- December 2012, pp.188-191
          Then, photon will send through polarizer        Different cryptographic tasks such as encryption,
and naturally it gives one of the possible polarization   transmission and decryption of data is performed by
out of four one. They are as Horizontal (Zero bit),       various    conventional    tools    over    standard
Vertical (One bit), 45 degree left (Zero bit), 45         communication network so far secrete key protocols
degree right (One bit).                                   are implemented. By keeping encryption key secrete
          Then, photon starts travelling towards         or documental secured, optimal data security is
Bob’s location.                                           achieved. This is the way how data is encrypted with
          At receiver end, bob will be having two        randomly generated key. This type of data
beam splitters a vertical/horizontal and diagonal and     encryption never containing unique patterns of itself
two photon detectors.                                     which can be used for code breaking.
          Bob will randomly choose one of the two
splitter and check photon detectors.                      E. Eavesdropping Detection
          Same process is repeated until the complete             When third party try to listen your data on
key will be transmitted to the Bob.                       quantum channel, all the sequences of qubit get
          Then, Bob will inform Alice about the          disturbed. Suppose, Eve listens the qubits, then he
beam splitter he have been used.                          will send bits to Bob with his listening. If all the
                                                          bases used by the Eve are different then
          Then Alice will compare the information
with the different sequence of polarizes that are used    measurements will go wrong. Hence, eavesdropping
by her to send the key.                                   can be easily detected in quantum cryptography. As
                                                          we know that, avoiding passive attacks are very
          Alice will inform Bob where there is use
                                                          important to maintain the security of your data.
the right beam splitter in the sequence of bit.
                                                          Quantum cryptography definitely provides you a
          Finally both Alice and Bob know key used
                                                          very proper way of keeping your data safe from
in communication between them.                            eavesdropper.
It is quite best method of exchanging key.
                                                          REFERENCES
C. Working Principle of BB84 Protocol
                                                            [1]   "Cerberis Encryption Solution - Layer 2
         First Alice will transmit a random sequence
                                                                  Encryption        with     Quantum      Key
of qubits to Bob over a quantum channel. this
                                                                  Distribution".          id        Quantique.
sequence is generated by her by repeatedly encoding
                                                                  http://www.idquantique.com/network-
a randomly selected bit with two selected base from
                                                                  encryption/cerberis-layer2-encryption-and-
two different bases. It also results in random
                                                                  qkd.html. Retrieved 1 march 2012
sequence of four selected quantum states. Base-
                                                            [2]   "Products".                         MagiQ.
value –combinations was recorded by Alice which is
                                                                  http://www.magiqtech.com/MagiQ/Product
used during generation in future. The two bases are
                                                                  s.html. Retrieved 1 march 2012.
applied for encoding and decoding. But they should
                                                            [3]   Crépeau, Claude; Joe, Kilian (1988).
yield correct result when aligned and produced.
                                                                  "Achieving Oblivious Transfer Using
                                                                  Weakened Security Assumptions (Extended
D. Key generation
                                                                  Abstract)". FOCS 1988. IEEE. pp. 42–52
          Bob receives the qubits directly from Alice
                                                            [4]   Joe, Kilian (1988). "Founding cryptography
when not intercepted. As Alice only transmits qubit
                                                                  on oblivious transfer". STOC 1988. ACM.
without any information, Bob has to derive the
                                                                  pp. 20–31.
information from the qubits through randomly
                                                                  http://external.nj.nec.com/homepages/joe/c
selecting sequence through its own base. If the bases
                                                                  ollected-papers/Kil88b.ps.
selected by Bob match with the sequence at the time
                                                            [5]   Gilles, Brassard; Crépeau, Claude; Richard,
of encoding, then the result is considered as correct.
                                                                  Jozsa; Langlois, Denis (1993). "A Quantum
Bob will record the sequence of his own bases and
                                                                  Bit Commitment Scheme Provably
the different measurement of result made by him.
                                                                  Unbreakable by both Parties". FOCS 1993.
                                                                  IEEE. pp. 362–371.
         Then Bob and Alice will communicate with
                                                            [6]   Mayers, Dominic (1997). "Unconditionally
each other to compare their bases sequences. Only
                                                                  Secure Quantum Bit Commitment is
the value which is used for encoding and decoding
                                                                  Impossible". Physical Review Letters (APS)
key by them, while other bits are removed from the
                                                                  78      (17):    3414–3417.     arXiv:quant-
sequences. The remaining sequence is nothing but
                                                                  ph/9605044.                         Bibcode
random private key which is also known as sifted
                                                                  1997PhRvL..78.3414M.
key. As this raw key is not enough suitable for using
                                                                  doi:10.1103/PhysRevLett.78.3414. Preprint
encryption and decryption, it is used for generating
                                                                  at arXiv:quant-ph/9605044v2
another key which will be used to perform different
                                                            [7]   Mayers, Dominic (1997). "Unconditionally
quantum cryptographic task on data.
                                                                  Secure Quantum Bit Commitment is
                                                                  Impossible". Physical Review Letters (APS)



                                                                                                190 | P a g e
Charushila Kadu, Dipti Sonwane, Dheera Jadhwani / International Journal of Engineering
         Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                 Vol. 2, Issue 6, November- December 2012, pp.188-191
       78      (17):    3414–3417.     arXiv:quant-          security from noisy quantum storage".A
       ph/9605044.                         Bibcode           full version is available at arXiv: 0906.1030.
       1997PhRvL..78.3414M.                           [11]   Koenig, Robert; Wehner, Stephanie;
       doi:10.1103/PhysRevLett.78.3414. Preprint             Wullschleger,       Juerg.     "Unconditional
       at arXiv:quant-ph/9605044v2                           security from noisy quantum storage".A
[8]    Damgård, Ivan; Fehr, Serge; Salvail, Louis;           full version is available at arXiv:0906.1030
       Schaffner, Christian (2005). "Cryptography     [12]   Cachin, Christian; Crépeau, Claude; Marcil,
       In the Bounded Quantum-Storage Model".                Julien (1998). "Oblivious Transfer with a
       FOCS 2005. IEEE. pp. 449–458. A full                  Memory-Bounded Receiver". FOCS 1998.
       version is available at arXiv:quant-                  IEEE. pp. 493–502.
       ph/0508222.                                    [13]   Dziembowski, Stefan; Ueli, Maurer (2004).
[9]    Wehner, Stephanie; Schaffner, Christian;              "On Generating the Initial Key in the
       Terhal, Barbara M. (2008). "Cryptography              Bounded-Storage Model". LNCS. 3027.
       from Noisy Storage". Physical Review                  Eurocrypt 2004. Springer. pp. 126–137.
       Letters (APS) 100 (22): 220502.                       Preprint available at [1].
       arXiv:0711.2895.                    Bibcode    [14]   Chandran, Nishanth; Moriarty, Ryan; Goyal,
       2008PhRvL.100v0502W.                                  Vipul; Ostrovsky, Rafail (2009). Position-
       doi:10.1103/PhysRevLett.100.220502.                   Based Cryptography. A full version is
       PMID 18643410.                                        available at IACR eprint:2009/364.
       http://link.aps.org/abstract/PRL/v100/e2205    [15]   Kent, Adrian; Munro, Bill; Spiller, Tim
       02. A full version is available at                    (2010).      "Quantum        Tagging     with
       arXiv:0711.2895                                       Cryptographically Secure Tags". A full
[10]   Koenig, Robert; Wehner, Stephanie;                    version is available at arXiv:1008.2147
       Wullschleger,       Juerg.    "Unconditional




                                                                                           191 | P a g e

Mais conteúdo relacionado

Mais procurados

Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeIOSR Journals
 
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...INFOGAIN PUBLICATION
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
 
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Securityijceronline
 
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...IDES Editor
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...ambitlick
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeIJMTST Journal
 

Mais procurados (19)

Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Chaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption SchemeChaos Based Direct Public Verifiable Signcryption Scheme
Chaos Based Direct Public Verifiable Signcryption Scheme
 
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
 
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWIMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEW
 
Quantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber ThreatsQuantum Cryptography Approach for Resolving Cyber Threats
Quantum Cryptography Approach for Resolving Cyber Threats
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
D0952126
D0952126D0952126
D0952126
 
Fv3111451146
Fv3111451146Fv3111451146
Fv3111451146
 
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
 
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
Different Attacks on Selective Encryption in RSA based Singular Cubic Curve w...
 
Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...Label based dv-hop localization against wormhole attacks in wireless sensor n...
Label based dv-hop localization against wormhole attacks in wireless sensor n...
 
661 665
661 665661 665
661 665
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
 
Dt32742746
Dt32742746Dt32742746
Dt32742746
 

Destaque

50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)Heinz Marketing Inc
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitudeWith Company
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Destaque (8)

50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Semelhante a Ad26188191

Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfssuser6602e0
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
 
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: The Future of Unbreakable EncryptionExploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: The Future of Unbreakable EncryptionPC Doctors NET
 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolIRJET Journal
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...MyNOG
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technologydrboon
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key DistributionIRJET Journal
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingAhmed Banafa
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewAIRCC Publishing Corporation
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewAIRCC Publishing Corporation
 

Semelhante a Ad26188191 (20)

1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
 
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: The Future of Unbreakable EncryptionExploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technology
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
 
Image Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A ReviewImage Encryption Techniques Using Fractal Function : A Review
Image Encryption Techniques Using Fractal Function : A Review
 

Ad26188191

  • 1. Charushila Kadu, Dipti Sonwane, Dheera Jadhwani / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.188-191 How to Avoid Passive Attacks on Data Using BB84 Protocol in Quantum Cryptography: A Review Charushila Kadu, Dipti Sonwane, Dheera Jadhwani Computer Science Department, G.H.Raisoni Institute of Engineering and Management, Jalgaon Abstract This paper discuss about new type of key exchange and use of quantum computers are the cryptography known as quantum cryptography. best example of use quantum cryptography. We know that, cryptography is an art of Quantum cryptography gives guarantee to detect converting data from one form to another one so attacks like eavesdropping in key distribution as try that it would not be easily known by outside of listening keys disturb complete quantum data. world. Many algorithms have been introduced What is the need of quantum cryptography? for converting from plain text to cipher text. Quantum cryptography can transmit a Though there are various secured algorithms are secret key over a long distance which is secure in available for encryption, it is very difficult to principle and based on laws of physics. Several avoid passive attacks on data. Passive attacks are methods of key distribution are available but they all very dangerous as both parties included in are based on unproven mathematical assumption. communication never know that their These all methods are always on risk of being communication is getting attacked and hence this attacked by the attacker. If you want long-term attack becomes dangerous. Popular example for security, then its really a matter of fact. Quantum passive attack is eavesdropping which is also now key distribution is known as a subset of quantum as dangerous because if anyone is eavesdropping cryptography which is developed for transferring your communication, how you will come to know and distributing keys during symmetric encryption. about that? This paper discusses the concept of quantum cryptography as a solution to this II. TYPES OF QUANTUM CRYPTOGRAPHY attack. A. Post-quantum cryptography Post quantum cryptography refers public – Keywords— quantum cryptography, passive key cryptosystems which cannot be brake by attacks, encryption key, eavesdropping, quantum computers. Basic need behind the evolution encryption algorithm post quantum cryptography is that most of the popular public cryptographic systems are based on I. WHAT IS QUANTUM CRYPTOGRAPHY? integer factorization problem and discrete We all know that cryptography is a logarithmic algorithm which are easily breakable by technique of converting data from one form into large quantum computers using Shor's another for its safety. Several different algorithms algorithm.[1][2].Though, current available are implemented for maintains safety of data in experimental quantum cryptography is very secure, cryptography. Use of algorithm get differs from the most of the cryptographers are searching new type of cryptography we are using for the encryption. algorithms for if quantum cryptography also have Mostly, there are two types of attacks on data in danger form attackers in future. In contrast to this, network. These are active and passive attacks. We symmetric cryptography which is performed by know that comparative to active attacks; passive symmetric ciphers and hash functions are still attacks are most dangerous one as parties taking part secured from quantum computers.[2][5] . Though in communication don’t aware about something Grover’s algorithm can increase the attacks on happening wrong with their data. If we know about symmetric cipher text, the danger can be avoided by the attack (active attack) which is taking place on increasing the size of key used for encryption. our data, we can take some actions against it, but if we don’t know that data is being attacked then its B. Position based-quantum cryptography security is naturally under high risk. Then, how to Position based quantum cryptography is avoid passive attacks like release of message content, based on fixed geographical location. Suppose there traffic analysis? Quantum cryptography is the best are two parties are interested in communication and solution to overcome this problem. Quantum if they are using position-based quantum cryptography uses quantum mechanical effect to cryptography then one party can send message to encryption or decryption. Quantum mechanical another party only if the other one is at particular effect includes quantum communication and expected location otherwise data will not be quantum computation. Quantum communication for delivered. How the verification task is performed 188 | P a g e
  • 2. Charushila Kadu, Dipti Sonwane, Dheera Jadhwani / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.188-191 then? Basic task of position-verification is that, b) When this horizontally-polarized qubit is passed receiver has to convince verifier that he is located at through vertically polarizing beam splitter, it always particular location. This technique is successful gains its horizontal polarization. when there are many restrictions on adversaries. First position-based quantum techniques were c) What happen if the horizonatally-polarized investigated by Kent in 2002 which is known as photon passes through diagonally-oriented beam quantum tagging. A patent for position based- splitter: quantum cryptography known as US-patent [13] was granted in 2006, and scientific literature published  There are 50% chances of finding the results in 2010.[14] Several position-based quantum photon at one of the exit. cryptography protocols have been suggested mostly  Photon will detect at one of the exit. using quantum entanglement.  The polarization of photon will changed into the corresponding diagonal polarization. III. QKD AND QUBITS Expected output for the step c is photon will be Quantum key distribution is most well blocked and not passed through and it will change known and developed application of quantum polarization. Polarized photon will convey digital cryptography which is also known as QKD. QKD information, details of which are shown in Fig.2. explain the process of using quantum cryptography for distributing key between two parties taking part in communication without disturbing third party. If these parties are communicating with each other and if third party try to eavesdrop the content, then complete bit pattern may get disturbs. Security of quantum key distribution can be easily proved without imposing any type of restriction on eavesdropper which is not possible by using classical cryptography, which is known as “unconditional security”. But there may be chances of man-in-middle-attacks if eve becomes able to impersonate Alice or Bob. Quantum cryptography is commercially available in the form of QKD only. Basic unit of quantum information is quantum bit known as qubit. Value of the quantum bit is taken as its polarization as value of classical bit can be taken as 0 or 1 only. Fig. 2 polarized photons conveying digital A. Quantum properties information As we know that digital systems use binary states like one/zero, on/Off or Yes/No, what is the B. BB84 Protocol state of quantum bit? Qubit is considered as single BB84 protocol is the first quantum photon and its manipulation is shown in Fig 1. cryptographic protocol discovered by Charles H. Bennet of IBM New York and Gilles Brassard of the University of Montreal in 1984.This protocol is based upon the technique of generation of secretes keys for encryption and decryption. This is implemented in different technologies which are as follows.  Single Photon polarization  Two Photon entanglements  Single photon Self interference phase modulation Fig. 1 qubit and single Photon Here we will how BB84 protocol works for single photon polarization is discussed. a): A photon is emitted from light source and passes . through linear polarizer, here we consider horizontal  Alice will create photon by single photon polarizer. This process will create qubit with from light source. horizontal polarization. 189 | P a g e
  • 3. Charushila Kadu, Dipti Sonwane, Dheera Jadhwani / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.188-191  Then, photon will send through polarizer Different cryptographic tasks such as encryption, and naturally it gives one of the possible polarization transmission and decryption of data is performed by out of four one. They are as Horizontal (Zero bit), various conventional tools over standard Vertical (One bit), 45 degree left (Zero bit), 45 communication network so far secrete key protocols degree right (One bit). are implemented. By keeping encryption key secrete  Then, photon starts travelling towards or documental secured, optimal data security is Bob’s location. achieved. This is the way how data is encrypted with  At receiver end, bob will be having two randomly generated key. This type of data beam splitters a vertical/horizontal and diagonal and encryption never containing unique patterns of itself two photon detectors. which can be used for code breaking.  Bob will randomly choose one of the two splitter and check photon detectors. E. Eavesdropping Detection  Same process is repeated until the complete When third party try to listen your data on key will be transmitted to the Bob. quantum channel, all the sequences of qubit get  Then, Bob will inform Alice about the disturbed. Suppose, Eve listens the qubits, then he beam splitter he have been used. will send bits to Bob with his listening. If all the bases used by the Eve are different then  Then Alice will compare the information with the different sequence of polarizes that are used measurements will go wrong. Hence, eavesdropping by her to send the key. can be easily detected in quantum cryptography. As we know that, avoiding passive attacks are very  Alice will inform Bob where there is use important to maintain the security of your data. the right beam splitter in the sequence of bit. Quantum cryptography definitely provides you a  Finally both Alice and Bob know key used very proper way of keeping your data safe from in communication between them. eavesdropper. It is quite best method of exchanging key. REFERENCES C. Working Principle of BB84 Protocol [1] "Cerberis Encryption Solution - Layer 2 First Alice will transmit a random sequence Encryption with Quantum Key of qubits to Bob over a quantum channel. this Distribution". id Quantique. sequence is generated by her by repeatedly encoding http://www.idquantique.com/network- a randomly selected bit with two selected base from encryption/cerberis-layer2-encryption-and- two different bases. It also results in random qkd.html. Retrieved 1 march 2012 sequence of four selected quantum states. Base- [2] "Products". MagiQ. value –combinations was recorded by Alice which is http://www.magiqtech.com/MagiQ/Product used during generation in future. The two bases are s.html. Retrieved 1 march 2012. applied for encoding and decoding. But they should [3] Crépeau, Claude; Joe, Kilian (1988). yield correct result when aligned and produced. "Achieving Oblivious Transfer Using Weakened Security Assumptions (Extended D. Key generation Abstract)". FOCS 1988. IEEE. pp. 42–52 Bob receives the qubits directly from Alice [4] Joe, Kilian (1988). "Founding cryptography when not intercepted. As Alice only transmits qubit on oblivious transfer". STOC 1988. ACM. without any information, Bob has to derive the pp. 20–31. information from the qubits through randomly http://external.nj.nec.com/homepages/joe/c selecting sequence through its own base. If the bases ollected-papers/Kil88b.ps. selected by Bob match with the sequence at the time [5] Gilles, Brassard; Crépeau, Claude; Richard, of encoding, then the result is considered as correct. Jozsa; Langlois, Denis (1993). "A Quantum Bob will record the sequence of his own bases and Bit Commitment Scheme Provably the different measurement of result made by him. Unbreakable by both Parties". FOCS 1993. IEEE. pp. 362–371. Then Bob and Alice will communicate with [6] Mayers, Dominic (1997). "Unconditionally each other to compare their bases sequences. Only Secure Quantum Bit Commitment is the value which is used for encoding and decoding Impossible". Physical Review Letters (APS) key by them, while other bits are removed from the 78 (17): 3414–3417. arXiv:quant- sequences. The remaining sequence is nothing but ph/9605044. Bibcode random private key which is also known as sifted 1997PhRvL..78.3414M. key. As this raw key is not enough suitable for using doi:10.1103/PhysRevLett.78.3414. Preprint encryption and decryption, it is used for generating at arXiv:quant-ph/9605044v2 another key which will be used to perform different [7] Mayers, Dominic (1997). "Unconditionally quantum cryptographic task on data. Secure Quantum Bit Commitment is Impossible". Physical Review Letters (APS) 190 | P a g e
  • 4. Charushila Kadu, Dipti Sonwane, Dheera Jadhwani / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 6, November- December 2012, pp.188-191 78 (17): 3414–3417. arXiv:quant- security from noisy quantum storage".A ph/9605044. Bibcode full version is available at arXiv: 0906.1030. 1997PhRvL..78.3414M. [11] Koenig, Robert; Wehner, Stephanie; doi:10.1103/PhysRevLett.78.3414. Preprint Wullschleger, Juerg. "Unconditional at arXiv:quant-ph/9605044v2 security from noisy quantum storage".A [8] Damgård, Ivan; Fehr, Serge; Salvail, Louis; full version is available at arXiv:0906.1030 Schaffner, Christian (2005). "Cryptography [12] Cachin, Christian; Crépeau, Claude; Marcil, In the Bounded Quantum-Storage Model". Julien (1998). "Oblivious Transfer with a FOCS 2005. IEEE. pp. 449–458. A full Memory-Bounded Receiver". FOCS 1998. version is available at arXiv:quant- IEEE. pp. 493–502. ph/0508222. [13] Dziembowski, Stefan; Ueli, Maurer (2004). [9] Wehner, Stephanie; Schaffner, Christian; "On Generating the Initial Key in the Terhal, Barbara M. (2008). "Cryptography Bounded-Storage Model". LNCS. 3027. from Noisy Storage". Physical Review Eurocrypt 2004. Springer. pp. 126–137. Letters (APS) 100 (22): 220502. Preprint available at [1]. arXiv:0711.2895. Bibcode [14] Chandran, Nishanth; Moriarty, Ryan; Goyal, 2008PhRvL.100v0502W. Vipul; Ostrovsky, Rafail (2009). Position- doi:10.1103/PhysRevLett.100.220502. Based Cryptography. A full version is PMID 18643410. available at IACR eprint:2009/364. http://link.aps.org/abstract/PRL/v100/e2205 [15] Kent, Adrian; Munro, Bill; Spiller, Tim 02. A full version is available at (2010). "Quantum Tagging with arXiv:0711.2895 Cryptographically Secure Tags". A full [10] Koenig, Robert; Wehner, Stephanie; version is available at arXiv:1008.2147 Wullschleger, Juerg. "Unconditional 191 | P a g e