Quantum Crytography Ppt
Transcript of Quantum Crytography Ppt
-
7/30/2019 Quantum Crytography Ppt
1/17
SAVITA RANA
5508426
I.T 6th SEM
-
7/30/2019 Quantum Crytography Ppt
2/17
Cryptographyis the science of keeping privateinformation from unauthorized access, ofensuring data integrity and authentication, andother tasks.
-
7/30/2019 Quantum Crytography Ppt
3/17
The process
Sender Plaintext
Cryptotext
Decryption
PlaintextRecipient
Message encryption
Key
Key ready for use
Secure key distribution
Encryption
Securetransmission
Hard Problem for conventional
encryption
-
7/30/2019 Quantum Crytography Ppt
4/17
Encryption algorithm and related keys are kept secret.
Breaking the system is hard due to large numbers of possible
keys. The fundamental difficulty is key distribution to parties who want
to exchange messages.
-
7/30/2019 Quantum Crytography Ppt
5/17
MODERN CRYPTOGRAPHY Public Key Cryptography(PKC) is the modern
cryptography.
In 1970s PKC emerged. Each user has two mutually inverse keys,
Encryption key is published.
Decryption key is kept secret.Anybody can send message to Bob but Bob can
only read.
-
7/30/2019 Quantum Crytography Ppt
6/17
Better named Quantum key distribution.
Two physically separated parties can create and share
random secret keys.Allows them to verify that key has not been
intercepted
-
7/30/2019 Quantum Crytography Ppt
7/17
Basic Idea
-
7/30/2019 Quantum Crytography Ppt
8/17
History of QKD Stephen Wiesner in early 1970s wrote paper conjugate
coding
Paper by Charles Bennett and Gilles Brassard in 1984 is
the basis for QKD protocol BB84. The prototypedeveloped in 1991.
Another QKD protocol was developed by Artur Ekertin 1991.
-
7/30/2019 Quantum Crytography Ppt
9/17
Heisenberg Uncertainty Principle Certain pairs of physical properties are related to each
other in such a way that measuring one propertyprevents the observer from knowing the value of theother. When measuring the polarization of photon,thechoice of what direction to measure effects allsubsequent measurements.
-
7/30/2019 Quantum Crytography Ppt
10/17
Photon Polarization
Vertical filter
Tilted filter at
the angle
The probability of a photon appearing after the second
filter depends on the angle and becomes 0 at= 90 degrees.
The first filter randomizes the measurements of thesecond filter.
-
7/30/2019 Quantum Crytography Ppt
11/17
Binary information Each photon carries one qubit of information.
Polarization can be used to represent a 0 or 1.
In quantum computation this is called qubit.
-
7/30/2019 Quantum Crytography Ppt
12/17
Contribution of Quantum cryptographyMain contribution are:
It solved the key distribution problem.
Unconditionally secure key distribution methodwas proposed by the Charles Bennett and GillesBrassard in 1984. The method is called BB84.
Once key is securely received it can be used to
encrypt the messages transmitted by conventionalchannels.
-
7/30/2019 Quantum Crytography Ppt
13/17
Quantum Key DistributionAlice communicates with Bob via a communication
channel sending him a photons.
Then they discuss results using public channel.
After getting an encryption key Bob can encrypt hismessages and send them by any public channel.
-
7/30/2019 Quantum Crytography Ppt
14/17
APPLICATION OF QUANTUM
CRYPTOGRAPHYQuantum cryptography systems are used by some
government agencies, large banks,telecommunications companies and othercorporations who handle sensitive or military data.
-
7/30/2019 Quantum Crytography Ppt
15/17
Commercial Quantum Cryptography Provider
Id Quantique, Geneva Switzerland
Optical fiber based systemTens of kilometers distances.
MagiQ Technologies, NY CityOptical fiber glass
Up to 100 kilometer distances
-
7/30/2019 Quantum Crytography Ppt
16/17
NEC Tokyo, 150 kilometers
QinetiQ Famborough, EnglandThrough the air 10 kilometers
Supplied system to BBN in Cambridge Mass.
-
7/30/2019 Quantum Crytography Ppt
17/17
Thank you