SlideShare una empresa de Scribd logo
1 de 16
Shyam Mohan
S4 – MCA
NO: 43
College of Engineering,
Trivandrum
OUTLINE
• Basics of Cryptography
• Basics of Quantum Computing
• Need for Quantum Cryptography
• Implementation of Quantum Cryptography
• Quantum Key Distribution protocol BB84
• BB84 with Eavesdropping
• Research and Innovation
• Conclusion
• Interaction
1/10
Basics of Cryptography
• Cryptography is the coding and decoding of secret messages
• Cryptanalysis is the art of interpreting cipher text
• Key is only known to the sender and receiver
2/10
Plain text like
“Hello”
Cipher Text
-.h7ib.v84%t9n
“Hello”
ENCRYPTION
KEY KEY
DECRYPTION
Basics of Quantum Computing
• Quantum computers use quantum bits (QUBITS)
• n bits can represent only one state from 2n possible states
• n qubits can represent 2n quantum states simultaneously
• A single qubit can represent 1 or 0 like a bit
3/10
Need of Quantum Cryptography
• Bits in classical cryptography can be copied anonymously
• Quantum computer can use Shor’s algorithm to break RSA encryptions
• Commercial Quantum Computers by D-Wave
• QuAIL (Quantum Artificial Intelligence Lab ) set up by NASA, Google, and
the Universities Space Research Association (USRA)
• Unknown qubits cannot be accessed and copied like bits without changing
its values (Non-cloning quantum theorem)
4/10
Implementation of Quantum Cryptography
• Implemented by using optical fiber cables which act as a quantum
channel
• Or can be implemented aerially using laser and satellites
5/10
Quantum Key Distribution protocol BB84
• BB84 - the security protocol for implementing Quantum Key Distribution(QKD)
• It uses the idea of Photon polarization
• Photons are used to represent single qubits (1,0)
6/10
Steps in BB84 Protocol
7/10
• Step 1 : Sender transmits a random sequence of 1’s and 0’s ( bits),which is converted into photon states
by randomly using rectilinear and diagonal polarisation schemes .
• Step 2 : Receiver randomly interprets the photon states by randomly using his rectilinear and diagonal
detectors
• Step 3 : Receiver sends information about sequence of detectors used randomly over a classical
channel.
Steps in BB84 Protocol (contd..)
7/10
• Step 4 : Sender in return tells the matching polarisation scheme
guessed by receiver.
• Step 5 : Sender and receiver eliminates the unmatched
interpretations and use the remaining binary equivalent as the key.
BB84 with Eavesdropping
8/10
BB84 with Eavesdropping
8/10
• Retained bit sequence (KEY) : 001110010100110
• Confirms some randomly chosen bit values over classical channel like
Internet or telephone : 001110010100110
If no eavesdropping happened, the values will be same for both Alice and
Bob. Then they drop the confirmed bits and uses the rest as
FINAL KEY: 01100101010
Else if any mismatch occurs, eavesdropping is confirmed and current key
generation is cancelled.
9/10
Research and Developments
• Tokyo Quantum Key Distribution Network deployed in October
2010
• Toshiba Quantum Key Distribution Network deployed exceeding
100 km in length
• Swiss Quantum Key Distribution Network in Geneva
metropolitan area
• QC based voting machine developed by Id Quantique, is used in
the Swiss canton of Geneva during the October 2007
parliamentary elections.
In a Nutshell
• Quantum cryptography (or quantum key distribution) is a state-of-the-art
technique that exploits the properties of quantum mechanics to guarantee
the secure exchange of secret keys.
10/10
Interaction , Discussion , Analysis
What… ?
Why? How ?
Who ?
Can We…?
why can't ?
Why not ?
ALL

Más contenido relacionado

La actualidad más candente

Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
deepu427
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
wtyru1989
 
陳君翰 BB84 0718
陳君翰 BB84 0718陳君翰 BB84 0718
陳君翰 BB84 0718
NTU PAS Lab
 

La actualidad más candente (20)

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
陳君翰 BB84 0718
陳君翰 BB84 0718陳君翰 BB84 0718
陳君翰 BB84 0718
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptography
 

Destacado

The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]
guestea12c43
 
The uncertainty principle
The uncertainty principleThe uncertainty principle
The uncertainty principle
farman53
 
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Manmohan Dash
 

Destacado (13)

Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet Services
 
Computer Science Final Project
Computer Science Final ProjectComputer Science Final Project
Computer Science Final Project
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]The Heisenberg Uncertainty Principle[1]
The Heisenberg Uncertainty Principle[1]
 
The uncertainty principle
The uncertainty principleThe uncertainty principle
The uncertainty principle
 
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
Uncertainty Principle and Photography. see mdashf.org/2015/06/08/
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible Attacks
 
Babbitt material ppt
Babbitt material pptBabbitt material ppt
Babbitt material ppt
 
Part III - Quantum Mechanics
Part III - Quantum MechanicsPart III - Quantum Mechanics
Part III - Quantum Mechanics
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 

Similar a Quantum Cryptography

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 

Similar a Quantum Cryptography (20)

quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum crypto system
Quantum crypto systemQuantum crypto system
Quantum crypto system
 
B03250609
B03250609B03250609
B03250609
 
Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
Crypto currency1
Crypto currency1Crypto currency1
Crypto currency1
 
1 DES.pdf
1 DES.pdf1 DES.pdf
1 DES.pdf
 
Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...
Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...
Week 2 - Blockchain and Cryptocurrencies: Key Technical (and Historical) Conc...
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptx
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
 
lecture04.ppt
lecture04.pptlecture04.ppt
lecture04.ppt
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For AuthenticationBlock Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
 
A Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval CaprazA Quick Start To Blockchain by Seval Capraz
A Quick Start To Blockchain by Seval Capraz
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Quantum Cryptography

  • 1. Shyam Mohan S4 – MCA NO: 43 College of Engineering, Trivandrum
  • 2. OUTLINE • Basics of Cryptography • Basics of Quantum Computing • Need for Quantum Cryptography • Implementation of Quantum Cryptography • Quantum Key Distribution protocol BB84 • BB84 with Eavesdropping • Research and Innovation • Conclusion • Interaction 1/10
  • 3. Basics of Cryptography • Cryptography is the coding and decoding of secret messages • Cryptanalysis is the art of interpreting cipher text • Key is only known to the sender and receiver 2/10 Plain text like “Hello” Cipher Text -.h7ib.v84%t9n “Hello” ENCRYPTION KEY KEY DECRYPTION
  • 4. Basics of Quantum Computing • Quantum computers use quantum bits (QUBITS) • n bits can represent only one state from 2n possible states • n qubits can represent 2n quantum states simultaneously • A single qubit can represent 1 or 0 like a bit 3/10
  • 5. Need of Quantum Cryptography • Bits in classical cryptography can be copied anonymously • Quantum computer can use Shor’s algorithm to break RSA encryptions • Commercial Quantum Computers by D-Wave • QuAIL (Quantum Artificial Intelligence Lab ) set up by NASA, Google, and the Universities Space Research Association (USRA) • Unknown qubits cannot be accessed and copied like bits without changing its values (Non-cloning quantum theorem) 4/10
  • 6. Implementation of Quantum Cryptography • Implemented by using optical fiber cables which act as a quantum channel • Or can be implemented aerially using laser and satellites 5/10
  • 7. Quantum Key Distribution protocol BB84 • BB84 - the security protocol for implementing Quantum Key Distribution(QKD) • It uses the idea of Photon polarization • Photons are used to represent single qubits (1,0) 6/10
  • 8. Steps in BB84 Protocol 7/10 • Step 1 : Sender transmits a random sequence of 1’s and 0’s ( bits),which is converted into photon states by randomly using rectilinear and diagonal polarisation schemes . • Step 2 : Receiver randomly interprets the photon states by randomly using his rectilinear and diagonal detectors • Step 3 : Receiver sends information about sequence of detectors used randomly over a classical channel.
  • 9. Steps in BB84 Protocol (contd..) 7/10 • Step 4 : Sender in return tells the matching polarisation scheme guessed by receiver. • Step 5 : Sender and receiver eliminates the unmatched interpretations and use the remaining binary equivalent as the key.
  • 11. BB84 with Eavesdropping 8/10 • Retained bit sequence (KEY) : 001110010100110 • Confirms some randomly chosen bit values over classical channel like Internet or telephone : 001110010100110 If no eavesdropping happened, the values will be same for both Alice and Bob. Then they drop the confirmed bits and uses the rest as FINAL KEY: 01100101010 Else if any mismatch occurs, eavesdropping is confirmed and current key generation is cancelled.
  • 12. 9/10 Research and Developments • Tokyo Quantum Key Distribution Network deployed in October 2010 • Toshiba Quantum Key Distribution Network deployed exceeding 100 km in length • Swiss Quantum Key Distribution Network in Geneva metropolitan area • QC based voting machine developed by Id Quantique, is used in the Swiss canton of Geneva during the October 2007 parliamentary elections.
  • 13. In a Nutshell • Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits the properties of quantum mechanics to guarantee the secure exchange of secret keys. 10/10
  • 14. Interaction , Discussion , Analysis What… ? Why? How ? Who ? Can We…? why can't ? Why not ?
  • 15.
  • 16. ALL

Notas del editor

  1. Cryptographic HF are mathematical operations run on digital data, by comparing the computed hash (created by SHA 256 ). Original data cannot be processed from hash.Just Validation is possible.
  2. ASICS- Application Specific Integrated Circuits