SlideShare uma empresa Scribd logo
1 de 21
Name: K. Vidya Madhuri
Roll no: 14311A1201
3-2, IT-A
 Introduction
 Traditional vs Quantum Cryptography
 How Quantum Cryptography works
 Applications of Quantum Cryptography
 Limitations
What is Cryptography?
 Cryptography is the art of devising codes and
ciphers.
 Crypto analysis is the art of breaking them.
 Cryptology is the combination of the two i.e
Cryptography and Crypto analysis
What is Quantum Cryptography?
 Quantum Cryptography is an effort to allow two
users of a common communication channel to create
a body of shared and secret information.This
information, which generally takes the form of a
random string of bits, can then be used as a
conventional secret key for secure communication.
 The Heisenberg Uncertainty principle and quantum
entanglement can be exploited in as system of secure
communication often referred to as “quantum
Cryptography”.
StephenWiesner wrote “Conjugate Coding”
in the late sixties
Charles H. Bennett and Gilles Brassard
revived the field in 1982 by combining
quantum process with public key
cryptography
 Traditional cryptography is heavily based on mathematical
theory and computer science practice; cryptographic
algorithms are designed around computational hardness
assumptions, making such algorithms hard to break in
practice by any adversary.
 Quantum cryptography is the science of
exploiting quantum mechanical properties to
perform cryptographic tasks.
 The main practical problem with secret key encryption
(traditional cryptographic technique) is exchanging a secret
key. In principle any two users who wished to communicate
could first meet to agree on a key in advance, but in practice
this could be inconvenient.
 Public key cryptography (PKC) systems exploit the fact that
certain mathematical operations are easier to do in one
direction than the other.The systems avoid the key
distribution problem, but unfortunately their security
depends on unproven mathematical assumptions about the
intrinsic difficulty of certain operations.
 The most popular public key cryptosystem, RSA (Rivest-
shamir-Adleman), gets its security from the difficulty of
factoring large numbers.This means that if ever
mathematicians or computer scientists come up with fast
and clever procedures for factoring large numbers, then the
whole privacy and discretion of widespread cryptosystems
could vanish overnight.
 Quantum cryptography takes advantage of the unique and
unusual behavior of microscopic objects to enable users to
securely develop secret keys as well as to detect
eavesdropping.
 Quantum cryptography solves the problems of secret-key
cryptography by providing a way for two users who are in
different locations to securely establish a secret key and to
detect if eavesdropping has occurred.
 The most important unit of information in computer
science is the bit.There are two possible values that can
be stored by a bit: the bit is either equal to “0” or equal
to “1.”
 Quantum system with at least two states can serve as a
qubit. For example, the spin of an Atom or the
polarization of a light particle can represent the state of
a qubit.
Heisenberg’s Uncertainty Principle:
 It is possible to encode information into quantum properties
of a photon in such a way that any effort to monitor them
disturbs them in some detectable way.This statement is
known as the Heisenberg uncertainty principle.
Quantum Entanglement:
 The entangled particles cannot be described by specifying
the states of individual particles and they may together
share information in a form which cannot be accessed in any
experiment performed on either of the particles alone.
 The foundation of quantum cryptography lies in the
Heisenberg uncertainty principle, which states that certain
pairs of physical properties are related in such a way that
measuring one property prevents the observer from
simultaneously knowing the value of the other.
 In particular, when measuring the polarization of a photon,
the choice of what direction to measure affects all
subsequent measurements.
Polarization of
Photons
 A pair of orthogonal (perpendicular) polarization states used
to describe the polarization of photons, such as
horizontal/vertical, is referred to as a basis.
 A pair of bases are said to be conjugate bases if the
measurement of the polarization in the first basis completely
randomizes the measurement in the second basis. It is a
fundamental consequence of the Heisenberg uncertainty
principle that such conjugate pairs of states must exist for a
quantum system.
 Alice sends a sequence of photons to Bob.
Each photon in a state with polarization corresponding
to 1 or 0, but with randomly chosen basis.
 Bob measures the state of the photons he receives, with
each state measured with respect to randomly chosen
basis.
 Alice and Bob communicates via an open channel. For
each photon, they reveal which basis was used for
encoding and decoding respectively.All photons which
has been encoded and decoded with the same basis are
kept, while all those where the basis don't agree are
discarded.
 If the sender Alice, uses a filter in the 0-deg/90-deg basis to
give the photon an initial polarization (either horizontal or
vertical, but she doesn't reveal which), the receiver Bob can
determine this by using a filter aligned to the same basis.
 However if Bob uses a filter in the 45-deg/135-deg basis to
measure the photon, he cannot determine any information
about the initial polarization of the photon .
 If an eavesdropper Eve uses a filter aligned with Alice's filter,
she can recover the original polarization of the photon. But if
she uses a misaligned filter she will not only receive no
information, but will have influenced the original photon so
that she is unable to reliably retransmit one with the original
polarization. Bob will either receive no message or a garbled
one, and in either case will be able to deduce Eve's presence.
 Switzerland has been using quantum cryptography to
conduct secure online voting in federal and regional
elections.
 Secure communications with satellites and astronauts is an
increasing concern, and a company calledQuintessenceLabs
is working on a project for NASA that will ensure secure
communications from Earth with satellites and astronauts,
using quantum cryptography.
 With “Quantum encrypted” internet, our most sensitive
transmissions would be passed along in an ultra-secure
manner.This would achieve the ideal of a simultaneously fast
and secure internet.
 The maximum distance covered by a message using
quantum cryptography is 150km, which is very short.
 When one photon was measured in one polarization, its
entangled counterpart took the opposite polarization,
meaning the polarization the other photon would take could
be predicted.
 Exchanging information using single photon needs a
dedicated channel of high quality in order to achieve high
speed communication. It is impossible to send keys to two or
more different locations using a quantum channel as
multiplexing is against quantum principles.
Quantum Cryptography presentation

Mais conteúdo relacionado

Mais procurados

Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstractKalluri Madhuri
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographySwasat Dutta
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminarPankaj Kumar
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 

Mais procurados (20)

Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 

Semelhante a Quantum Cryptography presentation

Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpointijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanicalijcisjournal
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdfRichard Gill
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYijcisjournal
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdfRichard Gill
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONijcisjournal
 
Quantum Teleportation A Brief Overview of How it Functions and its Possible Uses
Quantum Teleportation A Brief Overview of How it Functions and its Possible UsesQuantum Teleportation A Brief Overview of How it Functions and its Possible Uses
Quantum Teleportation A Brief Overview of How it Functions and its Possible UsesSean Boland
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information TechnologyFenny Thakrar
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1Bruno Fedrici, PhD
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppthienlmgm
 

Semelhante a Quantum Cryptography presentation (20)

Quantum
QuantumQuantum
Quantum
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
H0324143
H0324143H0324143
H0324143
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
 
Quantum Teleportation A Brief Overview of How it Functions and its Possible Uses
Quantum Teleportation A Brief Overview of How it Functions and its Possible UsesQuantum Teleportation A Brief Overview of How it Functions and its Possible Uses
Quantum Teleportation A Brief Overview of How it Functions and its Possible Uses
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Quantum Information Technology
Quantum Information TechnologyQuantum Information Technology
Quantum Information Technology
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
 

Último

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 

Último (20)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 

Quantum Cryptography presentation

  • 1. Name: K. Vidya Madhuri Roll no: 14311A1201 3-2, IT-A
  • 2.  Introduction  Traditional vs Quantum Cryptography  How Quantum Cryptography works  Applications of Quantum Cryptography  Limitations
  • 3. What is Cryptography?  Cryptography is the art of devising codes and ciphers.  Crypto analysis is the art of breaking them.  Cryptology is the combination of the two i.e Cryptography and Crypto analysis
  • 4. What is Quantum Cryptography?  Quantum Cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information.This information, which generally takes the form of a random string of bits, can then be used as a conventional secret key for secure communication.  The Heisenberg Uncertainty principle and quantum entanglement can be exploited in as system of secure communication often referred to as “quantum Cryptography”.
  • 5.
  • 6. StephenWiesner wrote “Conjugate Coding” in the late sixties Charles H. Bennett and Gilles Brassard revived the field in 1982 by combining quantum process with public key cryptography
  • 7.  Traditional cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary.  Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks.
  • 8.  The main practical problem with secret key encryption (traditional cryptographic technique) is exchanging a secret key. In principle any two users who wished to communicate could first meet to agree on a key in advance, but in practice this could be inconvenient.  Public key cryptography (PKC) systems exploit the fact that certain mathematical operations are easier to do in one direction than the other.The systems avoid the key distribution problem, but unfortunately their security depends on unproven mathematical assumptions about the intrinsic difficulty of certain operations.
  • 9.  The most popular public key cryptosystem, RSA (Rivest- shamir-Adleman), gets its security from the difficulty of factoring large numbers.This means that if ever mathematicians or computer scientists come up with fast and clever procedures for factoring large numbers, then the whole privacy and discretion of widespread cryptosystems could vanish overnight.
  • 10.  Quantum cryptography takes advantage of the unique and unusual behavior of microscopic objects to enable users to securely develop secret keys as well as to detect eavesdropping.  Quantum cryptography solves the problems of secret-key cryptography by providing a way for two users who are in different locations to securely establish a secret key and to detect if eavesdropping has occurred.
  • 11.  The most important unit of information in computer science is the bit.There are two possible values that can be stored by a bit: the bit is either equal to “0” or equal to “1.”  Quantum system with at least two states can serve as a qubit. For example, the spin of an Atom or the polarization of a light particle can represent the state of a qubit.
  • 12. Heisenberg’s Uncertainty Principle:  It is possible to encode information into quantum properties of a photon in such a way that any effort to monitor them disturbs them in some detectable way.This statement is known as the Heisenberg uncertainty principle. Quantum Entanglement:  The entangled particles cannot be described by specifying the states of individual particles and they may together share information in a form which cannot be accessed in any experiment performed on either of the particles alone.
  • 13.  The foundation of quantum cryptography lies in the Heisenberg uncertainty principle, which states that certain pairs of physical properties are related in such a way that measuring one property prevents the observer from simultaneously knowing the value of the other.  In particular, when measuring the polarization of a photon, the choice of what direction to measure affects all subsequent measurements.
  • 15.  A pair of orthogonal (perpendicular) polarization states used to describe the polarization of photons, such as horizontal/vertical, is referred to as a basis.  A pair of bases are said to be conjugate bases if the measurement of the polarization in the first basis completely randomizes the measurement in the second basis. It is a fundamental consequence of the Heisenberg uncertainty principle that such conjugate pairs of states must exist for a quantum system.
  • 16.
  • 17.  Alice sends a sequence of photons to Bob. Each photon in a state with polarization corresponding to 1 or 0, but with randomly chosen basis.  Bob measures the state of the photons he receives, with each state measured with respect to randomly chosen basis.  Alice and Bob communicates via an open channel. For each photon, they reveal which basis was used for encoding and decoding respectively.All photons which has been encoded and decoded with the same basis are kept, while all those where the basis don't agree are discarded.
  • 18.  If the sender Alice, uses a filter in the 0-deg/90-deg basis to give the photon an initial polarization (either horizontal or vertical, but she doesn't reveal which), the receiver Bob can determine this by using a filter aligned to the same basis.  However if Bob uses a filter in the 45-deg/135-deg basis to measure the photon, he cannot determine any information about the initial polarization of the photon .  If an eavesdropper Eve uses a filter aligned with Alice's filter, she can recover the original polarization of the photon. But if she uses a misaligned filter she will not only receive no information, but will have influenced the original photon so that she is unable to reliably retransmit one with the original polarization. Bob will either receive no message or a garbled one, and in either case will be able to deduce Eve's presence.
  • 19.  Switzerland has been using quantum cryptography to conduct secure online voting in federal and regional elections.  Secure communications with satellites and astronauts is an increasing concern, and a company calledQuintessenceLabs is working on a project for NASA that will ensure secure communications from Earth with satellites and astronauts, using quantum cryptography.  With “Quantum encrypted” internet, our most sensitive transmissions would be passed along in an ultra-secure manner.This would achieve the ideal of a simultaneously fast and secure internet.
  • 20.  The maximum distance covered by a message using quantum cryptography is 150km, which is very short.  When one photon was measured in one polarization, its entangled counterpart took the opposite polarization, meaning the polarization the other photon would take could be predicted.  Exchanging information using single photon needs a dedicated channel of high quality in order to achieve high speed communication. It is impossible to send keys to two or more different locations using a quantum channel as multiplexing is against quantum principles.