SlideShare una empresa de Scribd logo
1 de 40
A PRESENTATION ON QUANTUM CRYPTOGRAPHY
SOUGATO GHOSH ECE 22
What is cryptography? Cryptography (derived from the Greek words kryptos and grapheinmeaning hidden writing) is the science of codes and ciphers.  .
A cipher is essentially a cryptographic     algorithm which is used to convert a message, known as the plaintext, into unreadable     text. ,[object Object],What is cipher?
The process Plaintext Key Sender  Encryption Cryptotext Secure transmission Decryption Recipient Plaintext Key ready for use Message encryption Secure key distribution Hard Problem for conventional encryption
The classic cryptography Encryption algorithm and related key are kept secret. Breaking the system is hard due to large numbers of possible keys. For example: for a key 128 bits long there are keys to check    using brute force. The fundamental difficulty is key distribution to parties  who want to exchange messages.
PKC :the modern cryptography In 1970s the Public Key Cryptography emerged. Each user has two mutually inverse keys, The encryption key is published; The decryption key is kept secret. Anybody can send a message to x     but only xcan read it.
RSA The most widely used PKC is the RSA algorithm based on the difficulty of  factoring a product ot two large primes. Easy ProblemHard Problem Given n  compute p and q. Given two large  primes p and q  compute
Light waves are propagated as discrete quanta called photons. They are massless and have energy,  momentum and angular momentum called spin. Spin carries the polarization. If on its way we put a polarization filter     a photon may pass through it or may not. We can use a detector to check of a photon has passed through  a filter. Elements of the Quantum Theory
Introduction Spawned during the last century Describes properties and interaction between matter at small distance scales Quantum state determined by(among others) Positions Velocities Polarizations Spins qubits
Binary information Each photon carries one qubitof information Polarization can be used to represent a 0 or 1. In quantum computation this is called  qubit.
Notation Bra/Ket notation  (pronounced “bracket”) From Dirac 1958 Each state represented by a vector denoted by a arrow pointing in the direction of the polarization
Notation Simplified Bra/Ket-notation in this presentation Representation of polarized photons: horizontally:  vertically:  diagonally:  and 
Polarized photons Measurement of a state not only measures but actually transforms that state to one of the basis vectors  and  If we chose the basis vectors  and  when measuring the state of the photon, the result will tell us that the photon's polarization is either  or , nothing in between. ψ b  a 
Experiment Classical experiment Equipment: laser pointer  three polarization filters The beam of light i pointed toward a screen. The three filters are polarized at ,  and  respectively
Experiment The  filter is put in front of the screen Light on outgoing side of filter is now 50% of original intensity   
Experiment Next we insert a  filter whereas no light continue on the output side     
Experiment Here is the puzzling part… We insert a  filter in between This increases the number of photons passing through       
Experiment explained Filter  is hit by photons in random states. It will measure half of the photons polarized as        
Experiment explained Filter  is perpendicular to that and will measure the photons with respect to   , which none of the incoming photons match       
Experiment explained Filter  measures the state with respect to the basis {, }       
Experiment explained Photons reaching filter  will be measured as   with 50% chance. These photons will be measured by filter  as  with 50% probability and thereby 12,5% of the original light pass through all three filters.       
Key distribution Alice and Bob first agree on two representations for ones and zeroes  One for each basis used, {,}and {, }.  This agreement can be done in public Define1 = 	0 = 1 =  	0 = 
Key distribution - BB84 Alice sends a sequence of photons to Bob.Each photon in a state with polarization corresponding to 1 or 0, but with randomly chosen basis.  Bob measures the state of the photons he receives, with each state measured with respect to randomly chosen basis.  Alice and Bob communicates via an open channel. For each photon, they reveal which basis was used for encoding and decoding respectively. All photons which has been encoded and decoded with the same basis are kept, while all those where the basis don't agree are discarded.
Eavesdropping Eve has to randomly select basis for her measurement Her basis will be wrong in 50% of the time. Whatever basis Eve chose she will measure 1 or 0 When Eve picks the wrong basis, there is 50% chance that she'll measure the right value of the bit E.g. Alice sends a photon with state corresponding to 1 in the {,} basis. Eve picks the {, } basis for her measurement which this time happens to give a 1 as result, which is correct.
Eavesdropping
Eves problem Eve has to re-send all the photons to Bob  Will introduce an error, since Eve don't know the correct basis used by Alice  Bob will detect an increased error rate Still possible for Eve to eavesdrop just a few photons, and hope that this will not increase the error to an alarming rate. If so, Eve would have at least partial knowledge of the key.
Detecting eavesdropping When Alice and Bob need to test for eavesdropping By randomly selecting a number of bits from the key and compute its error rate Error rate < Emax  assume no eavesdropping Error rate > Emax  assume eavesdropping(or the channel is unexpectedly noisy)Alice and Bob should then discard the whole key and start over
Noise Noise might introduce errors A detector might detect a photon even though there are no photons Solution: send the photons according to a time schedule. then Bob knows when to expect a photon, and can discard those that doesn't fit into the scheme's time window. There also has to be some kind of error correction in the over all process.
Error correction Suggested by Hoi-Kwong Lo. (Shortened version) Alice and Bob agree on a random permutation of the bits in the key They split the key into blocks of length k Compare the parity of each block. If they compute the same parity, the block is considered correct. If their parity is different, they look for the erroneous bit, using a binary search in the block. Alice and Bob discard the last bit of each block whose parity has been announced This is repeated with different permutations and block size, until Alice and Bob fail to find any disagreement in many subsequent comparisons
Privacy amplification Eve might have partial knowledge of the key.  Transform the key into a shorter but secure key Suppose there are n bits in the key and Eve has knowledge of m bits.  Randomly chose a hash function whereh(x): {0,1n  {0,1 n-m-s Reduces Eve's knowledge of the key to 2 –s / ln2 bits
Binary information A user can suggest a key by sending a stream of randomly polarized photons. This sequence can be converted to a binary key. If the key was intercepted it could be discarded and a new stream of randomly polarized photons sent.
It solved thekey distribution problem. Unconditionally secure key distribution method proposed  by: Charles Bennett and Gilles Brassard in 1984. . The method is called BB84. Once  key is securely received it can be used to encrypt messages transmitted    by conventional channels.  The Main contribution of Quantum Cryptography.
Quantum  cryptography obtains its fundamental security from the fact that each qubit is carried by a single photon, and each photon will be altered  as soon as  it is read. This makes impossible to intercept message without being detected. Security of quantum key distribution
Experimental implementations have existed since 1990. Current (2004) QC is performed over distances of 30-40 kilometers  using     optical fiber.    In general we need two capabilities. Single photon gun. (2) Being able to measure single photons. State of the Quantum Cryptography technology.
id Quantique, Geneva Switzerland Optical fiber based system Tens of kilometers distances MagiQ Technologies, NY City Optical fiber-glass Up to 100 kilometers distances NEC Tokyo 150 kilometers QinetiQ Farnborough, England Through the air 10 kilometers. Supplied system to BBN in Cambridge Mass. Commercial  QC providers
References [WIK2] Wikipedia -The free encyclopediahttp://www.wikipedia.org/wiki/Interpretation_of_quantum_mechanics [WIK3] Wikipedia -The free encyclopediahttp://www.wikipedia.org/wiki/Copenhagen_interpretation [GIT] Georgia Institute of Technology,The fundamental postulates of quantum mechanicshttp://www.physics.gatech.edu/academics/Classes/spring2002/6107/Resources/The fundamental postulates of quantum mechanics.pdf [HP] Hoi-Kwong Lo, Networked Systems Department,Hewlett Packard, Bristol, December 1997, Quantum Cryptology [SS99] Simon Singh, Code Book, p349-382,Anchor Books, 1999 [FoF] Forskning och Framsteg,No. 3, April 2003
THANKS…………………..

Más contenido relacionado

La actualidad más candente

Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographysahilnarvekar
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographySwasat Dutta
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Kirby Linvill
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
陳君翰 BB84 0718
陳君翰 BB84 0718陳君翰 BB84 0718
陳君翰 BB84 0718NTU PAS Lab
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 

La actualidad más candente (20)

Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
陳君翰 BB84 0718
陳君翰 BB84 0718陳君翰 BB84 0718
陳君翰 BB84 0718
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 

Destacado

The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101Omar Shehab
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum ComputersDeepti.B
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technologydrboon
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...CSCJournals
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum CryptographyDarwin Gosal
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesMaria Stylianou
 

Destacado (11)

The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technology
 
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
Using Brain Waves as New Biometric Feature for Authenticating a Computer User...
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet Services
 

Similar a Quantum Cryptography

Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYijcisjournal
 
Quantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementIOSR Journals
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYHimanshu Shekhar
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpointijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanicalijcisjournal
 
B03250609
B03250609B03250609
B03250609theijes
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppthienlmgm
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptMTufail10
 
EPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFEPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFarankaila
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONijcisjournal
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 

Similar a Quantum Cryptography (20)

Quantum
QuantumQuantum
Quantum
 
Report_amit
Report_amitReport_amit
Report_amit
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
H0324143
H0324143H0324143
H0324143
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHYA NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
A NEW ERA OF CRYPTOGRAPHY: QUANTUM CRYPTOGRAPHY
 
Quantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future EntanglementQuantum Cryptography Using Past-Future Entanglement
Quantum Cryptography Using Past-Future Entanglement
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHYSWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
SWITCH FROM TRADITIONAL TO MODERN CRYPTOGRAPHY
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
B03250609
B03250609B03250609
B03250609
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
 
QSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.pptQSIT-QuantumCryptography.ppt
QSIT-QuantumCryptography.ppt
 
EPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDFEPR pairs and applications into QIS Poster PDF
EPR pairs and applications into QIS Poster PDF
 
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTIONSECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
SECURITY ANALYSIS OF THE MULTI-PHOTON THREE-STAGE QUANTUM KEY DISTRIBUTION
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 

Más de Bise Mond

Quantum dot lasers
Quantum dot lasersQuantum dot lasers
Quantum dot lasersBise Mond
 
Software defined radio....
Software defined radio....Software defined radio....
Software defined radio....Bise Mond
 
Satellite Application
Satellite ApplicationSatellite Application
Satellite ApplicationBise Mond
 
Optical Amplifier Paul
Optical Amplifier   PaulOptical Amplifier   Paul
Optical Amplifier PaulBise Mond
 
Dense wavelength division multiplexing
Dense wavelength division multiplexingDense wavelength division multiplexing
Dense wavelength division multiplexingBise Mond
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceBise Mond
 
Free Space Optics
Free  Space  OpticsFree  Space  Optics
Free Space OpticsBise Mond
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceBise Mond
 
Optical Computing
Optical ComputingOptical Computing
Optical ComputingBise Mond
 
Infrared Technology
Infrared TechnologyInfrared Technology
Infrared TechnologyBise Mond
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionBise Mond
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionBise Mond
 

Más de Bise Mond (13)

Quantum dot lasers
Quantum dot lasersQuantum dot lasers
Quantum dot lasers
 
Software defined radio....
Software defined radio....Software defined radio....
Software defined radio....
 
Satellite Application
Satellite ApplicationSatellite Application
Satellite Application
 
Optical Amplifier Paul
Optical Amplifier   PaulOptical Amplifier   Paul
Optical Amplifier Paul
 
Dense wavelength division multiplexing
Dense wavelength division multiplexingDense wavelength division multiplexing
Dense wavelength division multiplexing
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Free Space Optics
Free  Space  OpticsFree  Space  Optics
Free Space Optics
 
Stereo FM
Stereo FMStereo FM
Stereo FM
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Optical Computing
Optical ComputingOptical Computing
Optical Computing
 
Infrared Technology
Infrared TechnologyInfrared Technology
Infrared Technology
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data Transmission
 
Frequency Modulation In Data Transmission
Frequency Modulation In Data TransmissionFrequency Modulation In Data Transmission
Frequency Modulation In Data Transmission
 

Último

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Último (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Quantum Cryptography

  • 1. A PRESENTATION ON QUANTUM CRYPTOGRAPHY
  • 3. What is cryptography? Cryptography (derived from the Greek words kryptos and grapheinmeaning hidden writing) is the science of codes and ciphers. .
  • 4.
  • 5. The process Plaintext Key Sender Encryption Cryptotext Secure transmission Decryption Recipient Plaintext Key ready for use Message encryption Secure key distribution Hard Problem for conventional encryption
  • 6. The classic cryptography Encryption algorithm and related key are kept secret. Breaking the system is hard due to large numbers of possible keys. For example: for a key 128 bits long there are keys to check using brute force. The fundamental difficulty is key distribution to parties who want to exchange messages.
  • 7. PKC :the modern cryptography In 1970s the Public Key Cryptography emerged. Each user has two mutually inverse keys, The encryption key is published; The decryption key is kept secret. Anybody can send a message to x but only xcan read it.
  • 8. RSA The most widely used PKC is the RSA algorithm based on the difficulty of factoring a product ot two large primes. Easy ProblemHard Problem Given n compute p and q. Given two large primes p and q compute
  • 9. Light waves are propagated as discrete quanta called photons. They are massless and have energy, momentum and angular momentum called spin. Spin carries the polarization. If on its way we put a polarization filter a photon may pass through it or may not. We can use a detector to check of a photon has passed through a filter. Elements of the Quantum Theory
  • 10. Introduction Spawned during the last century Describes properties and interaction between matter at small distance scales Quantum state determined by(among others) Positions Velocities Polarizations Spins qubits
  • 11. Binary information Each photon carries one qubitof information Polarization can be used to represent a 0 or 1. In quantum computation this is called qubit.
  • 12. Notation Bra/Ket notation (pronounced “bracket”) From Dirac 1958 Each state represented by a vector denoted by a arrow pointing in the direction of the polarization
  • 13. Notation Simplified Bra/Ket-notation in this presentation Representation of polarized photons: horizontally:  vertically:  diagonally:  and 
  • 14. Polarized photons Measurement of a state not only measures but actually transforms that state to one of the basis vectors  and  If we chose the basis vectors  and  when measuring the state of the photon, the result will tell us that the photon's polarization is either  or , nothing in between. ψ b  a 
  • 15. Experiment Classical experiment Equipment: laser pointer three polarization filters The beam of light i pointed toward a screen. The three filters are polarized at ,  and  respectively
  • 16. Experiment The  filter is put in front of the screen Light on outgoing side of filter is now 50% of original intensity   
  • 17. Experiment Next we insert a  filter whereas no light continue on the output side     
  • 18. Experiment Here is the puzzling part… We insert a  filter in between This increases the number of photons passing through       
  • 19. Experiment explained Filter  is hit by photons in random states. It will measure half of the photons polarized as        
  • 20. Experiment explained Filter  is perpendicular to that and will measure the photons with respect to  , which none of the incoming photons match       
  • 21. Experiment explained Filter  measures the state with respect to the basis {, }       
  • 22. Experiment explained Photons reaching filter  will be measured as  with 50% chance. These photons will be measured by filter  as  with 50% probability and thereby 12,5% of the original light pass through all three filters.       
  • 23. Key distribution Alice and Bob first agree on two representations for ones and zeroes One for each basis used, {,}and {, }. This agreement can be done in public Define1 =  0 = 1 =  0 = 
  • 24. Key distribution - BB84 Alice sends a sequence of photons to Bob.Each photon in a state with polarization corresponding to 1 or 0, but with randomly chosen basis. Bob measures the state of the photons he receives, with each state measured with respect to randomly chosen basis. Alice and Bob communicates via an open channel. For each photon, they reveal which basis was used for encoding and decoding respectively. All photons which has been encoded and decoded with the same basis are kept, while all those where the basis don't agree are discarded.
  • 25. Eavesdropping Eve has to randomly select basis for her measurement Her basis will be wrong in 50% of the time. Whatever basis Eve chose she will measure 1 or 0 When Eve picks the wrong basis, there is 50% chance that she'll measure the right value of the bit E.g. Alice sends a photon with state corresponding to 1 in the {,} basis. Eve picks the {, } basis for her measurement which this time happens to give a 1 as result, which is correct.
  • 27. Eves problem Eve has to re-send all the photons to Bob Will introduce an error, since Eve don't know the correct basis used by Alice Bob will detect an increased error rate Still possible for Eve to eavesdrop just a few photons, and hope that this will not increase the error to an alarming rate. If so, Eve would have at least partial knowledge of the key.
  • 28. Detecting eavesdropping When Alice and Bob need to test for eavesdropping By randomly selecting a number of bits from the key and compute its error rate Error rate < Emax  assume no eavesdropping Error rate > Emax  assume eavesdropping(or the channel is unexpectedly noisy)Alice and Bob should then discard the whole key and start over
  • 29. Noise Noise might introduce errors A detector might detect a photon even though there are no photons Solution: send the photons according to a time schedule. then Bob knows when to expect a photon, and can discard those that doesn't fit into the scheme's time window. There also has to be some kind of error correction in the over all process.
  • 30. Error correction Suggested by Hoi-Kwong Lo. (Shortened version) Alice and Bob agree on a random permutation of the bits in the key They split the key into blocks of length k Compare the parity of each block. If they compute the same parity, the block is considered correct. If their parity is different, they look for the erroneous bit, using a binary search in the block. Alice and Bob discard the last bit of each block whose parity has been announced This is repeated with different permutations and block size, until Alice and Bob fail to find any disagreement in many subsequent comparisons
  • 31. Privacy amplification Eve might have partial knowledge of the key. Transform the key into a shorter but secure key Suppose there are n bits in the key and Eve has knowledge of m bits. Randomly chose a hash function whereh(x): {0,1n  {0,1 n-m-s Reduces Eve's knowledge of the key to 2 –s / ln2 bits
  • 32.
  • 33.
  • 34. Binary information A user can suggest a key by sending a stream of randomly polarized photons. This sequence can be converted to a binary key. If the key was intercepted it could be discarded and a new stream of randomly polarized photons sent.
  • 35. It solved thekey distribution problem. Unconditionally secure key distribution method proposed by: Charles Bennett and Gilles Brassard in 1984. . The method is called BB84. Once key is securely received it can be used to encrypt messages transmitted by conventional channels. The Main contribution of Quantum Cryptography.
  • 36. Quantum cryptography obtains its fundamental security from the fact that each qubit is carried by a single photon, and each photon will be altered as soon as it is read. This makes impossible to intercept message without being detected. Security of quantum key distribution
  • 37. Experimental implementations have existed since 1990. Current (2004) QC is performed over distances of 30-40 kilometers using optical fiber. In general we need two capabilities. Single photon gun. (2) Being able to measure single photons. State of the Quantum Cryptography technology.
  • 38. id Quantique, Geneva Switzerland Optical fiber based system Tens of kilometers distances MagiQ Technologies, NY City Optical fiber-glass Up to 100 kilometers distances NEC Tokyo 150 kilometers QinetiQ Farnborough, England Through the air 10 kilometers. Supplied system to BBN in Cambridge Mass. Commercial QC providers
  • 39. References [WIK2] Wikipedia -The free encyclopediahttp://www.wikipedia.org/wiki/Interpretation_of_quantum_mechanics [WIK3] Wikipedia -The free encyclopediahttp://www.wikipedia.org/wiki/Copenhagen_interpretation [GIT] Georgia Institute of Technology,The fundamental postulates of quantum mechanicshttp://www.physics.gatech.edu/academics/Classes/spring2002/6107/Resources/The fundamental postulates of quantum mechanics.pdf [HP] Hoi-Kwong Lo, Networked Systems Department,Hewlett Packard, Bristol, December 1997, Quantum Cryptology [SS99] Simon Singh, Code Book, p349-382,Anchor Books, 1999 [FoF] Forskning och Framsteg,No. 3, April 2003