SlideShare una empresa de Scribd logo
1 de 14
Advances In
Cryptography
Basic Ideas in Cryptography

• Cryptography is the study of sending and receiving secret messages through the help of
cryptosystem.
• The basic idea is to modify a message so as to make it unintelligible to anyone but the intended
recipient

Brought To You By www.rareinput.com
• It’s the transmitting information with access restricted to the intended recipient even if the message is
intercepted by others.
• A typical application of cryptography in network security is to enable two parties to communicate
confidentially over a non-physically secured communication platform such as radio waves, the internet, etc.
• “A little knowledge is a dangerous thing” Very true in cryptography

• Cryptography is of increasing importance in our technological age
Broadcast
Network communications
Internet
E-mail
Cell phones

Brought To You By www.rareinput.com
Advancements in cryptography
[Today’s Talk]
 Quantum Cryptography
 Elliptic Curve Cryptography

Brought To You By www.rareinput.com
I.

Quantum Cryptography

• Quantum cryptography is the single most successful application of Quantum
Computing/Information Theory.
• For the first time in history, we can use the forces of nature to implement perfectly secure
cryptosystems.
• Quantum cryptography describes the use of quantum mechanical effects to perform
cryptographic tasks or to break cryptographic systems.
• The use of classical (i.e., non-quantum) cryptography to protect against quantum attackers is also
often considered as quantum cryptography.
• Classical Cryptography relies heavily on the complexity of factoring integers.

Brought To You By www.rareinput.com
 Ideas from the Quantum World
• Light waves are propagated as discrete quanta called photons.
• They are massless and have energy momentum and angular momentum called spin.
• Spin carries the polarization.
• If on its way we put a polarization filter a photon may pass through it or may not.
• We can use a detector to check of a photon has passed through a filter.

Brought To You By www.rareinput.com
 Quantum key distribution
• The main key distribution of quantum cryptography is to solve the key distribution system
problem.
• Alice communicates with Bob via a quantum channel sending him photons.
• Then they discuss results using a public channel.
• After getting an encryption key Bob can encrypt his messages and send them by any public
channel.
• Both Alice and Bob have two polarizers each.
• One with the 0-90 degree basis (+) and one with 45-135 degree basis ( )
• Alice uses his polarizers to send randomly photons to Bob in one of the four possible
polarizations 0,45,90,135 degree.

Brought To You By www.rareinput.com
•

•

Bob uses his polarizers to measure each polarization of photons he receives.
He can use the( + )basis or the ( ) but not both simultaneously

Brought To You By www.rareinput.com
 presence of eavesdropping
• If Eve uses the filter aligned with Alice’s he can recover the original polarization of the photon.
• If he uses the misaligned filter he will receive no information about the photon .
• Also he will influence the original photon and be unable to retransmit it with the original
polarization.
• Bob will be able to deduce Ave’s presence.

Brought To You By www.rareinput.com
II. Elliptic Curve Cryptography
• Elliptic curve cryptography (ECC) is an approach to public-key
cryptography based on the algebraic structure of elliptic curves over finite
fields.
• ECC was proposed independently by cryptographers Victor Miller (IBM)
and Neal Koblitz (University of Washington) in 1985.
• It is based on the difficulty of solving the Elliptic Curve Discrete Logarithm
Problem (ECDLP)
Like the prime factorization problem.
• ECDLP is another "hard" problem that is simple to state: Given two points,
P and Q, on an elliptic curve, find the integer n, if it exists, such that p= nQ.
• Elliptic curves combine number theory and algebraic geometry.

Brought To You By www.rareinput.com
Cont..
• An elliptic curve consists of the set of real numbers (x, y) that satisfies the equation:

•

The set of all of the solutions to the equation forms the elliptic curve.
• Elliptic curves have the interesting property that adding two points on the
elliptic curve yields a third point on the curve.
• The point Q is calculated as a multiple of the starting point P
Q = nP
An attacker might know P and Q but finding the integer, n, is a difficult problem to
solve. Q is the
public key, then, and n is the private key.

Brought To You By www.rareinput.com
Advantages & Disadvantages
• Advantages
• fast and compact implementation in hardware
• Shorter keys than RSA
• Disadvantages
• Complex mathematical description
• Short period of research in cryptanalysis (breaking cipher)

Brought To You By www.rareinput.com
 References
• http://en.wikipedia.org/wiki/Quantum_cryptography
• www.google.com
• http://www.springerreference.com/docs/html/chapterdbid/71039.html

Brought To You By www.rareinput.com
Thank
You
Shailesh Tyagi
Developer
www.rareinput.com

Más contenido relacionado

Destacado

How circuit switches
How circuit switchesHow circuit switches
How circuit switchess1180079
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Matthew McCullough
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101 Andy Fisher
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGAnitin3940
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epulAgate Studio
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingGarima Kulshreshtha
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 

Destacado (20)

Week13
Week13Week13
Week13
 
How circuit switches
How circuit switchesHow circuit switches
How circuit switches
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
 
Cryptography 101
Cryptography 101 Cryptography 101
Cryptography 101
 
Crytography
CrytographyCrytography
Crytography
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
 
Crytography
CrytographyCrytography
Crytography
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Cryptography
CryptographyCryptography
Cryptography
 
Advanced encryption standard (aes) epul
Advanced encryption standard (aes)   epulAdvanced encryption standard (aes)   epul
Advanced encryption standard (aes) epul
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Aes
AesAes
Aes
 
Cryptography and Steganography with watermarking
Cryptography and Steganography with watermarkingCryptography and Steganography with watermarking
Cryptography and Steganography with watermarking
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Aes
AesAes
Aes
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Applied Cryptography
Applied CryptographyApplied Cryptography
Applied Cryptography
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 

Similar a Advances In Cryptography

Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYHimanshu Shekhar
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfsasasas14
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoVishnu Pendyala
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographysahilnarvekar
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyCSNP
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum CommunicationsSrinivas Bukkuru
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxsanta142869
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 

Similar a Advances In Cryptography (20)

Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
Schaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptxSchaffner Quantum Computing and Cryptography.pptx
Schaffner Quantum Computing and Cryptography.pptx
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 

Último

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Advances In Cryptography

  • 2. Basic Ideas in Cryptography • Cryptography is the study of sending and receiving secret messages through the help of cryptosystem. • The basic idea is to modify a message so as to make it unintelligible to anyone but the intended recipient Brought To You By www.rareinput.com
  • 3. • It’s the transmitting information with access restricted to the intended recipient even if the message is intercepted by others. • A typical application of cryptography in network security is to enable two parties to communicate confidentially over a non-physically secured communication platform such as radio waves, the internet, etc. • “A little knowledge is a dangerous thing” Very true in cryptography • Cryptography is of increasing importance in our technological age Broadcast Network communications Internet E-mail Cell phones Brought To You By www.rareinput.com
  • 4. Advancements in cryptography [Today’s Talk]  Quantum Cryptography  Elliptic Curve Cryptography Brought To You By www.rareinput.com
  • 5. I. Quantum Cryptography • Quantum cryptography is the single most successful application of Quantum Computing/Information Theory. • For the first time in history, we can use the forces of nature to implement perfectly secure cryptosystems. • Quantum cryptography describes the use of quantum mechanical effects to perform cryptographic tasks or to break cryptographic systems. • The use of classical (i.e., non-quantum) cryptography to protect against quantum attackers is also often considered as quantum cryptography. • Classical Cryptography relies heavily on the complexity of factoring integers. Brought To You By www.rareinput.com
  • 6.  Ideas from the Quantum World • Light waves are propagated as discrete quanta called photons. • They are massless and have energy momentum and angular momentum called spin. • Spin carries the polarization. • If on its way we put a polarization filter a photon may pass through it or may not. • We can use a detector to check of a photon has passed through a filter. Brought To You By www.rareinput.com
  • 7.  Quantum key distribution • The main key distribution of quantum cryptography is to solve the key distribution system problem. • Alice communicates with Bob via a quantum channel sending him photons. • Then they discuss results using a public channel. • After getting an encryption key Bob can encrypt his messages and send them by any public channel. • Both Alice and Bob have two polarizers each. • One with the 0-90 degree basis (+) and one with 45-135 degree basis ( ) • Alice uses his polarizers to send randomly photons to Bob in one of the four possible polarizations 0,45,90,135 degree. Brought To You By www.rareinput.com
  • 8. • • Bob uses his polarizers to measure each polarization of photons he receives. He can use the( + )basis or the ( ) but not both simultaneously Brought To You By www.rareinput.com
  • 9.  presence of eavesdropping • If Eve uses the filter aligned with Alice’s he can recover the original polarization of the photon. • If he uses the misaligned filter he will receive no information about the photon . • Also he will influence the original photon and be unable to retransmit it with the original polarization. • Bob will be able to deduce Ave’s presence. Brought To You By www.rareinput.com
  • 10. II. Elliptic Curve Cryptography • Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. • ECC was proposed independently by cryptographers Victor Miller (IBM) and Neal Koblitz (University of Washington) in 1985. • It is based on the difficulty of solving the Elliptic Curve Discrete Logarithm Problem (ECDLP) Like the prime factorization problem. • ECDLP is another "hard" problem that is simple to state: Given two points, P and Q, on an elliptic curve, find the integer n, if it exists, such that p= nQ. • Elliptic curves combine number theory and algebraic geometry. Brought To You By www.rareinput.com
  • 11. Cont.. • An elliptic curve consists of the set of real numbers (x, y) that satisfies the equation: • The set of all of the solutions to the equation forms the elliptic curve. • Elliptic curves have the interesting property that adding two points on the elliptic curve yields a third point on the curve. • The point Q is calculated as a multiple of the starting point P Q = nP An attacker might know P and Q but finding the integer, n, is a difficult problem to solve. Q is the public key, then, and n is the private key. Brought To You By www.rareinput.com
  • 12. Advantages & Disadvantages • Advantages • fast and compact implementation in hardware • Shorter keys than RSA • Disadvantages • Complex mathematical description • Short period of research in cryptanalysis (breaking cipher) Brought To You By www.rareinput.com
  • 13.  References • http://en.wikipedia.org/wiki/Quantum_cryptography • www.google.com • http://www.springerreference.com/docs/html/chapterdbid/71039.html Brought To You By www.rareinput.com

Notas del editor

  1. Changing a and b changes the shape of the curve, and small changes in these parameters can result in major changes in the set of (x,y) solutions.