SlideShare una empresa de Scribd logo
1 de 23
Quantum
cryptography
:Public key distribution and coin tossing
Research :
Charles H. Bennett & Gilles Brassard
Present by : Ruwan Ranganath Senarathne
Outline Quantum Cryptography
Essential properties of polarized photons
Quantum public key distribution
Quantum coin tossing
BB84 Protocol
Q & A
Ultimate Goal
Cryptography
• The Art of Writing or Solving Codes.
• Classical Cryptography > Modern Cryptography > Number Theory based Public Key
Cryptography
• One Time Pad
• Key Generation and Key Distribution
Background
● Conventional cryptosystems such as ENIGMA, DES, RSA
● Digital communications in principle can always be passively monitored or copied
● Unless the key,used once only and long as clear text
● Computational complexity is not well enough understood
● Quantum Computers can use Shor’ Algorithm to break
Quantum cryptography uses photons to transmit a key.
Quantum cryptology depends on physics, not mathematics.
Heisenberg's Uncertainty Principle & Photon Polarization
Quantum key distribution protocols
Quantum Cryptography
QC = QKD + OTP
Background
● Conventional Computing - Bits
● Quantum Computing – Quantum Bits or Qubits (/ kju b t/)ˈ ː ɪ
● Qubit could be a Photon, Electron, Nucleus..
● In a Quantum State particle can achieve a “Superposition”
● Quantum Computers can overcome todays computational limitations
Essential properties of polarized photons
• Photons - Photons are the fundamental particle of light.
– wave function : An individual photon can be described as having right or left circular
polarization, or a superposition of the two.
• The foundation of quantum physics is the unpredictability factor.
– Heisenberg's Uncertainty Principle :
• Photon polarization
– polarization filters, photon to take one state or another -- or polarize it.
• Rectilinear basis (0 and 90 degrees)
• Diagonal basis (45 and 135 degrees)
• Heisenberg uncertainty principle :
- states that certain pairs of physical properties are related in such a way that measuring one
property prevents the observer from simultaneously knowing the value for other.
• Principle of photon polarization:
- tells that an eavesdropper cannot copy unknown Qubits
Explanation
Source :: http://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/#hup
QKD Protocols
• A protocol is a set of rules governing the exchange of messages over a channel.
• A security protocol is a special protocol designed to ensure security properties are met during
communications.
• There are three main security protocols for QKD:BB84, B92, and Entanglement-Based QKD.
Eve
• Unique property gain knowledge about eve trying get the key
• By using quantum superposition/entanglement and transmitting information in quantum states , a
communication system can be implemented which can detect eavesdropping.
• If the level of eavesdropping is below threshold , a key is produced guarantying the secure
communication otherwise no secure key is possible and communication is aborted
BB84 Communication Protocol
● BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard
in 1984.
● It is the first quantum cryptography protocol
● Use Photon polarization
● four different non-orthogonal quantum states via a quantum channel to transmit the qubits
● A device called a polarizer allows us to place a photon in a particular polarization. A Pockels Cell
can be used too.
● The polarization basis is the mapping we decide to use for a particular state
● Let us suppose she uses the vertical and the +45 o polarisations for encoding the 0" and the
horizontal and -45 o polarisations to encode the 1"
● Bob then randomly uses either a polarizer for diagonal polarisations or one in the
horizontal/vertical basis and records his choice and the polarization he measures
● Bob tells Alice on the public channel the sequence of analyzers he used during the
transmission, but not his results
● Alice compares Bob's sequence with hers and tells him which bits correspond to the photons
she sent
● these compatible bits are used for the shared key
BB84 with eavesdropping
• If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bob’s
measurements.
• In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect
measurement: Eve’s measurements are bound to affect the states of the photons.
• As Eve intercepts Alice’s photons, she has to measure them with a random basis and send new
photons to Bob.`
• The photon states cannot be cloned (non-clone ability).
• Eve’s presence is always detected: measuring a quantum system irreparably alters its state.
Quantum coin tossing
➔ First discussed ‘Coin Flipping by Telephone’ by Manuel Blum, 1983
➔ Two unknown party communicate without third party
Quantum coin tossing ( cont>._)
Coin Tossing (Cont>._)
● Alice choose random basis ( Rectilinear ) and sequece of random bits ( 1000 should be enough ) .
● Use the polarization and send to Bob
● Bob use polarizer for each bit
● Two tables Rectilinear and diagonal photon table
● Polarizer can loss some photons
● Bob Make his guess
● Alice says if bob wins and tell her basis and
● Send entire bit sequece over classical channel
● Bob verify no cheating by providing his tables
Current Arguments
QKD is not Public key Cryptography
Eve can sabotage quantum channel to force Alice and Bob use classical channel
Expensive for longer keys
Thank you.
Quantum Cryptography - Quantum Coin Tossing

Más contenido relacionado

La actualidad más candente

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographySwasat Dutta
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptographyShahzad Ahmad
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographysahilnarvekar
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Quantum entanglement (1).pptx
Quantum entanglement (1).pptxQuantum entanglement (1).pptx
Quantum entanglement (1).pptxSandraJoseph49
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationYi-Hsueh Tsai
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computingachakracu
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum Entanglementpixiejen
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 

La actualidad más candente (20)

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptography
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Quantum entanglement (1).pptx
Quantum entanglement (1).pptxQuantum entanglement (1).pptx
Quantum entanglement (1).pptx
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and Communication
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum Entanglement
Quantum EntanglementQuantum Entanglement
Quantum Entanglement
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 

Similar a Quantum Cryptography - Quantum Coin Tossing

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfsasasas14
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
B03250609
B03250609B03250609
B03250609theijes
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoVishnu Pendyala
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksMaria Stylianou
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technologydrboon
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key DistributionIRJET Journal
 

Similar a Quantum Cryptography - Quantum Coin Tossing (20)

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum crypto system
Quantum crypto systemQuantum crypto system
Quantum crypto system
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
B03250609
B03250609B03250609
B03250609
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, CiscoQuantum cryptography by Girisha Shankar, Sr. Manager, Cisco
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible Attacks
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technology
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
 
Computer Science Final Project
Computer Science Final ProjectComputer Science Final Project
Computer Science Final Project
 

Más de Ruwan Ranganath

Make an impact make a brand
Make an impact   make a brandMake an impact   make a brand
Make an impact make a brandRuwan Ranganath
 
Why software freedom matters
Why software freedom mattersWhy software freedom matters
Why software freedom mattersRuwan Ranganath
 
Ucsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa introUcsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa introRuwan Ranganath
 
Hybrid Mobile Applications
Hybrid Mobile ApplicationsHybrid Mobile Applications
Hybrid Mobile ApplicationsRuwan Ranganath
 
SL2College Web Team - 2016
SL2College Web Team - 2016SL2College Web Team - 2016
SL2College Web Team - 2016Ruwan Ranganath
 
Working with open source communities
Working with open source communitiesWorking with open source communities
Working with open source communitiesRuwan Ranganath
 
Interlista disaster management system
Interlista disaster management system Interlista disaster management system
Interlista disaster management system Ruwan Ranganath
 

Más de Ruwan Ranganath (10)

Make an impact make a brand
Make an impact   make a brandMake an impact   make a brand
Make an impact make a brand
 
Why software freedom matters
Why software freedom mattersWhy software freedom matters
Why software freedom matters
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
Ucsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa introUcsc foxeprenuer fsa intro
Ucsc foxeprenuer fsa intro
 
Hybrid Mobile Applications
Hybrid Mobile ApplicationsHybrid Mobile Applications
Hybrid Mobile Applications
 
SL2College Web Team - 2016
SL2College Web Team - 2016SL2College Web Team - 2016
SL2College Web Team - 2016
 
Working with open source communities
Working with open source communitiesWorking with open source communities
Working with open source communities
 
Interlista disaster management system
Interlista disaster management system Interlista disaster management system
Interlista disaster management system
 
Benefits of using foss
Benefits of using fossBenefits of using foss
Benefits of using foss
 
Sl2 college web team
Sl2 college web teamSl2 college web team
Sl2 college web team
 

Último

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Quantum Cryptography - Quantum Coin Tossing

  • 1. Quantum cryptography :Public key distribution and coin tossing Research : Charles H. Bennett & Gilles Brassard Present by : Ruwan Ranganath Senarathne
  • 2. Outline Quantum Cryptography Essential properties of polarized photons Quantum public key distribution Quantum coin tossing BB84 Protocol Q & A
  • 4. Cryptography • The Art of Writing or Solving Codes. • Classical Cryptography > Modern Cryptography > Number Theory based Public Key Cryptography • One Time Pad • Key Generation and Key Distribution
  • 5. Background ● Conventional cryptosystems such as ENIGMA, DES, RSA ● Digital communications in principle can always be passively monitored or copied ● Unless the key,used once only and long as clear text ● Computational complexity is not well enough understood ● Quantum Computers can use Shor’ Algorithm to break
  • 6. Quantum cryptography uses photons to transmit a key. Quantum cryptology depends on physics, not mathematics. Heisenberg's Uncertainty Principle & Photon Polarization Quantum key distribution protocols Quantum Cryptography QC = QKD + OTP
  • 7. Background ● Conventional Computing - Bits ● Quantum Computing – Quantum Bits or Qubits (/ kju b t/)ˈ ː ɪ ● Qubit could be a Photon, Electron, Nucleus.. ● In a Quantum State particle can achieve a “Superposition” ● Quantum Computers can overcome todays computational limitations
  • 8. Essential properties of polarized photons • Photons - Photons are the fundamental particle of light. – wave function : An individual photon can be described as having right or left circular polarization, or a superposition of the two. • The foundation of quantum physics is the unpredictability factor. – Heisenberg's Uncertainty Principle : • Photon polarization – polarization filters, photon to take one state or another -- or polarize it. • Rectilinear basis (0 and 90 degrees) • Diagonal basis (45 and 135 degrees)
  • 9. • Heisenberg uncertainty principle : - states that certain pairs of physical properties are related in such a way that measuring one property prevents the observer from simultaneously knowing the value for other. • Principle of photon polarization: - tells that an eavesdropper cannot copy unknown Qubits Explanation
  • 11. QKD Protocols • A protocol is a set of rules governing the exchange of messages over a channel. • A security protocol is a special protocol designed to ensure security properties are met during communications. • There are three main security protocols for QKD:BB84, B92, and Entanglement-Based QKD.
  • 12. Eve • Unique property gain knowledge about eve trying get the key • By using quantum superposition/entanglement and transmitting information in quantum states , a communication system can be implemented which can detect eavesdropping. • If the level of eavesdropping is below threshold , a key is produced guarantying the secure communication otherwise no secure key is possible and communication is aborted
  • 13. BB84 Communication Protocol ● BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. ● It is the first quantum cryptography protocol ● Use Photon polarization ● four different non-orthogonal quantum states via a quantum channel to transmit the qubits ● A device called a polarizer allows us to place a photon in a particular polarization. A Pockels Cell can be used too. ● The polarization basis is the mapping we decide to use for a particular state
  • 14.
  • 15.
  • 16. ● Let us suppose she uses the vertical and the +45 o polarisations for encoding the 0" and the horizontal and -45 o polarisations to encode the 1" ● Bob then randomly uses either a polarizer for diagonal polarisations or one in the horizontal/vertical basis and records his choice and the polarization he measures ● Bob tells Alice on the public channel the sequence of analyzers he used during the transmission, but not his results ● Alice compares Bob's sequence with hers and tells him which bits correspond to the photons she sent ● these compatible bits are used for the shared key
  • 17. BB84 with eavesdropping • If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bob’s measurements. • In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect measurement: Eve’s measurements are bound to affect the states of the photons. • As Eve intercepts Alice’s photons, she has to measure them with a random basis and send new photons to Bob.` • The photon states cannot be cloned (non-clone ability). • Eve’s presence is always detected: measuring a quantum system irreparably alters its state.
  • 18. Quantum coin tossing ➔ First discussed ‘Coin Flipping by Telephone’ by Manuel Blum, 1983 ➔ Two unknown party communicate without third party
  • 19. Quantum coin tossing ( cont>._)
  • 20. Coin Tossing (Cont>._) ● Alice choose random basis ( Rectilinear ) and sequece of random bits ( 1000 should be enough ) . ● Use the polarization and send to Bob ● Bob use polarizer for each bit ● Two tables Rectilinear and diagonal photon table ● Polarizer can loss some photons ● Bob Make his guess ● Alice says if bob wins and tell her basis and ● Send entire bit sequece over classical channel ● Bob verify no cheating by providing his tables
  • 21. Current Arguments QKD is not Public key Cryptography Eve can sabotage quantum channel to force Alice and Bob use classical channel Expensive for longer keys

Notas del editor

  1. “the coding and decoding of secret messages.” The basic idea is to modify a message so as to make it unintelligible to anyone but the intended recipient. Cryptosystem (Cipher System) – method of disguising messages so that only certain people can read them Cryptography – Art of creating and using Cryptosystems Cryptanalysis – Art of breaking Cryptosystems Cryptology – study of Cryptography and Cryptosystems
  2. based on a mixture of guesswork and mathematics relies heavily on the complexity of factoring integers To prove the computation security of public key cryptosystem
  3. Via quantum channel to transmit the bits of Alice's random key
  4. In a Quantum State particle can achieve a “Superposition” – Its Exist in multiple ways simultaneously
  5. It's impossible to know both an object's position and velocity -- at the same time. Through the use of polarization filters, we can force the photon to take one state or another -- or polarize it.
  6. due to non-cloning algorithm.
  7. • We will only discuss BB84 here.
  8. • Unique property of quantum cryptography is the ability of two communicating users to detect the presence of third party trying to gain knowledge of the key.
  9. Let us suppose she uses the vertical and the +45 o polarisations for encoding the \0" and the horizontal and -45 o polarisations to encode the \1" bob then randomly uses either a polarizer for diagonal polarisations or one in the horizontal/vertical basis and records his choice and the polarization he measures (Fig. 1 and Table I). The probability of using the wrong analyzer and therefore obtaining a random result is 50%
  10. horizontal and -45 o polarisations to encode the \1" Bob then randomly uses either a polarizer for diagonal polarisations or one in the horizontal/vertical basis and records his choice and the polarization he measures Bob tells Alice on the public channel the sequence of analyzers he used during the transmission, but not his results Alice compares Bob's sequence with hers and tells him which bits correspond to the photons she sent these compatible bits are used for the shared key
  11. come to agree on a winner and a loser in such a way that each party has exactly 50 percent chance of winning
  12. Alice choose random basis ( Rectilinear ) and sequence of random bits ( 1000 should be enough ) . Use the polarization and send to Bob Bob use polarizer for each bit Two tables Rectiliear and diagonal photon table Polarizer can loss some photons Bob Make his guess Alice says if bob wins and tell her basis and Send entire bit sequece over classical channel Bob verify no cheating by providing his tables Alice Cheating If cheat on step 3 , she need to say diagonal, bobs table probabilistic behavior of the photons after they left her hands If cheat on step 1 , Sending mixture of diagonal and rectilinear , or polarized neither both basis , she will not be able to agree bobs out put. Bob to cheat - Bob would need to guess Alice’s basis with probability greater than 1 / 2.
  13. Alice Cheating If cheat on step 3 , she need to say diagonal, bobs table probabilistic behavior of the photons after they left her hands If cheat on step 1 , Sending mixture of diagonal and rectilinear , or polarized neither both basis , she will not be able to agree bobs out put.