SlideShare una empresa de Scribd logo
1 de 8
QUANTUM CRYPTOGRAPHY
BY
KAMAL DIWAKAR R(10131A1265)
Department of INFORMATION TECHNOLOGY
GAYATRI VIDYA PARSHID COLLEGE OF ENGINEERING(A)
MADHURUWADA,VISAKHAPATNAM
Table of Contents
.

1 Introduction
a) What is Cryptography?
b)What is Quantum Cryptography?

.

2 Why is the need for Quantum Cryptography?
Quantum Key Distribution
3.What problem does QKD Solve?
4.Is it complex to deploy QKD?
5.Types of Quantum cryptography
a)POSITION-based Quantum Cryptography
b)POST-Quantum Cryptography
6.Implementing Quantum Cryptography
7.Conclusion
1.INTODUCTION
Quantum Cryptography was intoduced by two scientists "Charles Bennett" and "Gills Brassard" in 1991 based on
"conjugate coding" concepts.

What is Cryptography?



The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text.
Only those who possess a secret key can decipher (or decrypt) the message into plain text.



Cryptography systems can be broadly classified into symmetric-key systems that use a single key that both the sender and
recipient have, and public-key systems that use two keys, a public key known to everyone and a private key that only the
recipient of messages uses.

What is Quantum Cryptography?




Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the
phenomena of quantum physics.
The security of the transmissions is based on the inviolability of the laws of quantum mechanics.
Quantum cryptography relies on two important elements of quantum mechanics:
1) Based on "Heisenberg Uncertainty Principle" which states that it is not possible to measure the quantum state of any
system without distributing the system.
2)Based on "Photon Polarization" which states that eavesdrop cannot copy the quantum states.
2.Why is the need for Quantum Cryptography?
•
•
•

Establishing a secret key with conventional communications is not possible.
Secure key distribution is possible with "Quantum Communications".
These Quantum Communications for secure key is done through "Quantum Key Distribution(QKD)" mechanism.

Quantum Key Distribution(QKD)
In this procedure the key is distributed over the quantum channel and not the encrypted message.
We need two channels between the sender A and the receiver B.
One channel for transmitting of encrypted message and another channel for key distribution called "quantum channel". Hence
the name, QUANTUM KEY DISTRIBUTION.

A

E
(eavesdrop)

Public Channel(telephone)

KEY

Quantum State Generator

t xet n al p
i

plain text

Encryption Algorithm

B

Decryption Algorithm

YE K





Quantum Channel(OFC)

Quantum State Detector
3.What Problem does QKD solve?
•
•
•

Quantum Key Distribution is a technology that allows transmission of a sequence of random bits across an optical network
and also verifies if this sequence was intercepted or not. This verification is based on the laws of quantum physics.
QKD is combined with conventional key distribution techniques (dual key agreement) to produce a key that is as secure as the
strongest of the two original keys.
QKD provides long-term data transmission secrecy, which is not vulnerable to technological progress. On the contrary,
classical cryptography provides secrecy only for a limited period of time.

4.Is it complex to deploy QKD?
•
•

QKD is not complex to deploy. It has reached a level of maturity such that it only takes a typical network engineer a few
minutes to install a QKD system.
It can be managed using standard network administration tools.

5.Types Of Quantum Cryptography
•

POSITION-based Quantum Cryptography: The goal of position-based quantum cryptography is to use the
geographical location of a receiver as its (only) credential.
For example, one wants to send a message to a receiver at a specified position with the guarantee that it can only be read if the
receiving party is located at that particular position.

•

POST-Quantum Cryptography: it is important to study cryptographic schemes that are allegedly secure even against
adversaries with access to a quantum computer.The study of such schemes is often referred to as post-quantum cryptography.
6.Implementing Quantum Cryptography



DARPA is the quantum network developed by Boston and Harvard for America Airforce.It is the world's first end-to-end
network security via high -speed quantum distribution key.
The DARPA security model is the cryptographic virtual private network.
7. Conclusion






Quantum Cryptography is alternative solution for secure computer network communication.Instead of using general
encryption and decryption technique, quantum cryptography can verify that key is transmitted without interception from
eavesdrop
Quantum Cryptography could be the first application of quantum mechanics at the single quanta level.
Experiments have demonstrated that keys can be exchanged over distances of a few tens of kilometers at rates at least of the
order of a thousand bits per second.
Present quantum cryptography is still very limited in distance.
THANK YOU

Más contenido relacionado

La actualidad más candente

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyShyam Mohan
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographySamy Shehata
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesisSamy Shehata
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 

La actualidad más candente (20)

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 

Destacado

Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesMaria Stylianou
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum AbbasiIEEEP Karachi
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101Omar Shehab
 
The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]guestea12c43
 
The uncertainty principle
The uncertainty principleThe uncertainty principle
The uncertainty principlefarman53
 
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/Manmohan Dash
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksMaria Stylianou
 

Destacado (11)

Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet Services
 
Computer Science Final Project
Computer Science Final ProjectComputer Science Final Project
Computer Science Final Project
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
 
The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]
 
The uncertainty principle
The uncertainty principleThe uncertainty principle
The uncertainty principle
 
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible Attacks
 

Similar a Quantum cryptography a modern cryptographic security

Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...MyNOG
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...IJNSA Journal
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
 
(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe Networks(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe NetworksPriyanka Aash
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
 
Introduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdfIntroduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdfEIHEducation
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: The Future of Unbreakable EncryptionExploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: The Future of Unbreakable EncryptionPC Doctors NET
 
Introduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdfIntroduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdfEIHEducation
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical NetworksADVA
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfssuser6602e0
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstractKalluri Madhuri
 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsVijay Karan
 

Similar a Quantum cryptography a modern cryptographic security (20)

Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
 
Ad26188191
Ad26188191Ad26188191
Ad26188191
 
(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe Networks(SACON) M T Karunakaran  - Quantum safe Networks
(SACON) M T Karunakaran  - Quantum safe Networks
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 
Introduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdfIntroduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdf
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: The Future of Unbreakable EncryptionExploring Quantum Cryptography: The Future of Unbreakable Encryption
Exploring Quantum Cryptography: The Future of Unbreakable Encryption
 
Introduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdfIntroduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdf
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
Cryptography IEEE 2015 Projects
Cryptography IEEE 2015 ProjectsCryptography IEEE 2015 Projects
Cryptography IEEE 2015 Projects
 

Último

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Quantum cryptography a modern cryptographic security

  • 1. QUANTUM CRYPTOGRAPHY BY KAMAL DIWAKAR R(10131A1265) Department of INFORMATION TECHNOLOGY GAYATRI VIDYA PARSHID COLLEGE OF ENGINEERING(A) MADHURUWADA,VISAKHAPATNAM
  • 2. Table of Contents . 1 Introduction a) What is Cryptography? b)What is Quantum Cryptography? . 2 Why is the need for Quantum Cryptography? Quantum Key Distribution 3.What problem does QKD Solve? 4.Is it complex to deploy QKD? 5.Types of Quantum cryptography a)POSITION-based Quantum Cryptography b)POST-Quantum Cryptography 6.Implementing Quantum Cryptography 7.Conclusion
  • 3. 1.INTODUCTION Quantum Cryptography was intoduced by two scientists "Charles Bennett" and "Gills Brassard" in 1991 based on "conjugate coding" concepts. What is Cryptography?   The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text.  Cryptography systems can be broadly classified into symmetric-key systems that use a single key that both the sender and recipient have, and public-key systems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses. What is Quantum Cryptography?    Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of the transmissions is based on the inviolability of the laws of quantum mechanics. Quantum cryptography relies on two important elements of quantum mechanics: 1) Based on "Heisenberg Uncertainty Principle" which states that it is not possible to measure the quantum state of any system without distributing the system. 2)Based on "Photon Polarization" which states that eavesdrop cannot copy the quantum states.
  • 4. 2.Why is the need for Quantum Cryptography? • • • Establishing a secret key with conventional communications is not possible. Secure key distribution is possible with "Quantum Communications". These Quantum Communications for secure key is done through "Quantum Key Distribution(QKD)" mechanism. Quantum Key Distribution(QKD) In this procedure the key is distributed over the quantum channel and not the encrypted message. We need two channels between the sender A and the receiver B. One channel for transmitting of encrypted message and another channel for key distribution called "quantum channel". Hence the name, QUANTUM KEY DISTRIBUTION. A E (eavesdrop) Public Channel(telephone) KEY Quantum State Generator t xet n al p i plain text Encryption Algorithm B Decryption Algorithm YE K    Quantum Channel(OFC) Quantum State Detector
  • 5. 3.What Problem does QKD solve? • • • Quantum Key Distribution is a technology that allows transmission of a sequence of random bits across an optical network and also verifies if this sequence was intercepted or not. This verification is based on the laws of quantum physics. QKD is combined with conventional key distribution techniques (dual key agreement) to produce a key that is as secure as the strongest of the two original keys. QKD provides long-term data transmission secrecy, which is not vulnerable to technological progress. On the contrary, classical cryptography provides secrecy only for a limited period of time. 4.Is it complex to deploy QKD? • • QKD is not complex to deploy. It has reached a level of maturity such that it only takes a typical network engineer a few minutes to install a QKD system. It can be managed using standard network administration tools. 5.Types Of Quantum Cryptography • POSITION-based Quantum Cryptography: The goal of position-based quantum cryptography is to use the geographical location of a receiver as its (only) credential. For example, one wants to send a message to a receiver at a specified position with the guarantee that it can only be read if the receiving party is located at that particular position. • POST-Quantum Cryptography: it is important to study cryptographic schemes that are allegedly secure even against adversaries with access to a quantum computer.The study of such schemes is often referred to as post-quantum cryptography.
  • 6. 6.Implementing Quantum Cryptography   DARPA is the quantum network developed by Boston and Harvard for America Airforce.It is the world's first end-to-end network security via high -speed quantum distribution key. The DARPA security model is the cryptographic virtual private network.
  • 7. 7. Conclusion     Quantum Cryptography is alternative solution for secure computer network communication.Instead of using general encryption and decryption technique, quantum cryptography can verify that key is transmitted without interception from eavesdrop Quantum Cryptography could be the first application of quantum mechanics at the single quanta level. Experiments have demonstrated that keys can be exchanged over distances of a few tens of kilometers at rates at least of the order of a thousand bits per second. Present quantum cryptography is still very limited in distance.