SlideShare una empresa de Scribd logo
1 de 29
Applications of Quantum Cryptography – QKD CS551/851 CR yptography A pplications B istro Mike McNett  6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory Troxel.  “ Quantum Cryptography in Practice ”
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Quantum Cryptography ,[object Object],[object Object],[object Object]
Basic Idea
History of QKD ,[object Object],[object Object],[object Object]
Two Protocols for QKD ,[object Object],[object Object]
BB84 ,[object Object]
BB84 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BB84 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Reference:  http://monet.mercersburg.edu/henle/bb84/demo.php
BB84 – No Eavesdropping ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BB84 – With Eavesdropping ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DARPA Project
DARPA Project Overview ,[object Object],[object Object],[object Object],[object Object]
DARPA Project Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QKD Attributes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DARPA Quantum Network
Randomly selects Phase and Value Randomly chooses Phase Basis Measures Phase & Value Timing and Framing
1’s and 0’s ,[object Object],[object Object],[object Object]
1’s and 0’s ,[object Object],[object Object],[object Object],[object Object],[object Object]
1’s and 0’s ,[object Object],[object Object]
1’s and 0’s ,[object Object]
1’s and 0’s ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
QKD Protocols ,[object Object],[object Object],[object Object],[object Object]
IPSEC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Lifetime and Key Size QKD Extensions ,[object Object],[object Object],[object Object]
Issues ,[object Object],[object Object]
Other Implementations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pros & Cons ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions? ,[object Object]

Más contenido relacionado

La actualidad más candente

La actualidad más candente (14)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Hacking Quantum Cryptography
Hacking Quantum CryptographyHacking Quantum Cryptography
Hacking Quantum Cryptography
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Report_amit
Report_amitReport_amit
Report_amit
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Advances In Cryptography
Advances In CryptographyAdvances In Cryptography
Advances In Cryptography
 

Destacado

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdwtyru1989
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Dark matter & dark energy
Dark matter & dark energyDark matter & dark energy
Dark matter & dark energysurat murthy
 
Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...wtyru1989
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101Omar Shehab
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
The Many Worlds of Quantum Mechanics
The Many Worlds of Quantum MechanicsThe Many Worlds of Quantum Mechanics
The Many Worlds of Quantum MechanicsSean Carroll
 
SSD - Solid State Drive PPT by Shyam jos
SSD - Solid State Drive PPT by Shyam jos SSD - Solid State Drive PPT by Shyam jos
SSD - Solid State Drive PPT by Shyam jos Shyam Jos
 

Destacado (9)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Dark matter & dark energy
Dark matter & dark energyDark matter & dark energy
Dark matter & dark energy
 
Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...Experimental demonstration of continuous variable quantum key distribution ov...
Experimental demonstration of continuous variable quantum key distribution ov...
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
The Many Worlds of Quantum Mechanics
The Many Worlds of Quantum MechanicsThe Many Worlds of Quantum Mechanics
The Many Worlds of Quantum Mechanics
 
SSD - Solid State Drive PPT by Shyam jos
SSD - Solid State Drive PPT by Shyam jos SSD - Solid State Drive PPT by Shyam jos
SSD - Solid State Drive PPT by Shyam jos
 

Similar a Quantum crypto

quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Kirby Linvill
 
Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolPerformance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolIJAEMSJORNAL
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpointijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanicalijcisjournal
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Kirby Linvill
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksMaria Stylianou
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppthienlmgm
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptMTufail10
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key DistributionIRJET Journal
 
B03250609
B03250609B03250609
B03250609theijes
 

Similar a Quantum crypto (20)

quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
crypto.ppt
crypto.pptcrypto.ppt
crypto.ppt
 
crypto.ppt
crypto.pptcrypto.ppt
crypto.ppt
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)
 
Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolPerformance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible Attacks
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
 
Computer Science Final Project
Computer Science Final ProjectComputer Science Final Project
Computer Science Final Project
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
 
B03250609
B03250609B03250609
B03250609
 

Quantum crypto

  • 1. Applications of Quantum Cryptography – QKD CS551/851 CR yptography A pplications B istro Mike McNett 6 April 2004 Paper: Chip Elliott, David Pearson, and Gregory Troxel. “ Quantum Cryptography in Practice ”
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13.
  • 14.
  • 15.
  • 17. Randomly selects Phase and Value Randomly chooses Phase Basis Measures Phase & Value Timing and Framing
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.