SlideShare una empresa de Scribd logo
1 de 39
Quantum Cryptography
Harsh Dawar
Sumit Kadyan
•Introduction
• Quantum cryptography is the one of the
most successful application of Quantum
Computing/InformationTheory.
• For the first time in history, we can use
the forces of nature to implement
perfectly secure cryptosystems.
• Quantum cryptography has been proved
to work practically.
•State of the art
• ClassicalCryptography(RSA) relies heavily on
the complexity of factoring integers.
• Future Quantum Computers can use Shor’s
Algorithm to efficiently break today’s
cryptosystems.
• Quantum computers can solve factoring
problems in polynomial time.
What happens when that day arrives?
•Today’s Talk
• Basic Ideas in
Cryptography
• Ideas from the
QuantumWorld
• Quantum Key
Distribution (QKD)
• BB84 without
eavesdropping
• BB84 with
eavesdropping
• Working Prototypes
• Practical
Implementation of
QC
• Conclusion
•Basic Ideas of Cryptography
• Cryptography: “the coding and decoding of secret
messages.”
• The basic idea is to modify a message so as to make
it unintelligible to anyone but the intended
recipient.
• For message (plaintext) M,
e(M, K) encryption - ciphertext
d[e(M, K), K] = M decryption
•Keys and key distribution
 K is called the key.
 The key is known only to
sender and receiver: it is
secret.
 Anyone who knows the key
can decrypt the message.
 Key distribution is the
problem of exchanging the
key between sender and
receiver.
•Perfect Secrecy and OTP
 There exist perfect
cryptosystems.
 Example: One-Time
Pad (OTP)
 The problem of
distributing the keys in
the first place remains.
 Key length has to be
same as message
length!!
•Quantum Key Distribution
 Using the laws of quantum mechanics, we can
distribute keys in perfect secrecy!!
 The Result:The Perfect Cryptosystem,
QC = QKD + OTP
•Quantum Physics Basics
 Physical Qubits
 Any subatomic
particle can be used to
represent a qubit, e.g.
an electron.
 A photon is a
convenient choice.
 A photon is an
electromagnetic
wave.
•Polarization
• A photon has a property called
polarization, which is the plane in which the
electric field oscillates.
• We can use photons of different polarizations
to represent quantum states:


0 state 0
90 state 1
•Ideas from Quantum World
 Measurement
 Observing, or measuring, a
quantum system will alter its
state.
 Example: the Qubit
 When observed, the state of a
qubit will collapse to
unpredictable random state 1 or
0.
•Polarizers & Basics
• A device called a polarizer allows us to place a
photon in a particular polarization
• The polarization basis is frame of reference for
quantum measurement.
•Measuring Photons
• A calcite crystal can be used to recover the
bits encoded into a stream of photons.
13
CaCO3
Diagonal
axis (X)
1 0 1 0
•Uncertainty Principle
• What if the crystal has the wrong
orientation?
14
CaCO3
RECTILINEAR
axis(+)
???
50% chance
of getting
right answer.
Either | or ---
•No Cloning theorem
• It is impossible to make a device that perfectly copies an unknown
qubit.
• Suppose there is a quantum process that implements: |q,_> ->|q,q>
•Quantum Key Distribution
• Quantum Key Distribution exploits the
effects discussed in order to thwart
eavesdropping.
• If an eavesdropper uses the wrong
polarization basis to measure the channel, the
result of the measurement will be random.
•QKD Protocols
• A protocol is a set of rules governing the
exchange of messages over a channel.
• There are three main security protocols for
QKD: BB84, B92, and Entanglement-Based
QKD.
• Lets discuss the BB84 in detail.
•BB84
• BB84 was the first security protocol
implementingQuantum Key Distribution.
• It uses the idea of photon polarization.
• The key consists of bits that will be
transmitted as photons.
• Each bit is encoded with a random
polarization basis!
•BB84 With no Eavesdropping
• Alice is going to send Bob a key.
• She begins with a random
sequence of bits.
• Bits are encoded with a random
basis, and then sent to Bob:
Bit 0 1 0 1 1
Basis + × × + ×
Photon
•BB84 With no Eavesdropping
• Bob receives the photons and must decode
them using a random basis.
• Some of his measurements are correct.
Photon
Basis? + + × + ×
Bit? 0 0 0 1 1
•BB84 With no eavesdropper
• Alice and Bob talk on the public encrypted
channel:
• Alice chooses a subset of the bits (the test bits)
and reveals which basis she used to encode them
to Bob.
• Bob tells Alice which basis he used to decode the
same bits.
•Comparing measurements
Alice’s Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s Bit 0 0 0 1 1
The test bits allow Alice and Bob
to test whether the channel is
secure.
•The Catch
• As long as no errors and/or eavesdropping
have occurred, the test bits should agree.
• Alice and Bob have now made sure that the
channel is secure.The test bits are removed.
• Alice tells Bob the basis she used for the
other bits, and they both have a common set
of bits: the final key!
•Deriving the final key
Alice’s Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s Bit 0 0 0 1 1
Final Key = 01
Test bits
discarded
•In the presence of eavesdropper
• If an eavesdropper Eve tries to tap the channel, this
will automatically show up in Bob’s measurements.
• In those cases where Alice and Bob have used the
same basis, Bob is likely to obtain an incorrect
measurement: Eve’s measurements are bound to
affect the states of the photons.
Eavesdropper Effect
•In the presence of Eavesdropper
• As Eve intercepts Alice’s photons, she has to
measure them with a random basis and send new
photons to Bob.
• The photon states cannot be cloned (non-
cloneability).
• Eve’s presence is always detected: measuring a
quantum system irreparably alters its state.
•QKD - Review
•BB84 – Key Distillation
 Sifting –Unmatched Bases;
“stray” or “lost” qubits
 Error Correction – Noise &
Eaves-dropping detected –
Uses “cascade” protocol –
Reveals information to Eve so
need to track this.
 Privacy Amplification – reduces
Eve’s knowledge obtained by
previous EC
 Authentication – avoid man-in-
middle attacks .Many protocols
in development!!
Researchers at Nokia and the University of Bristol in
UK have come up with quantum cryptography in
mobile phones.
Goal:
To perform "quantum key distribution" (QKD)
using simple and potentially inexpensive
"client" electronics that could be integrated
within a single chip.
•Making use of twisting and turning
• Makes use of the Reference
independent frame QKD[RfiQKD]
• Polarization or phase is measured in
context with a reference frame
• They select a specific threshold value
and drop below this value signals there
is an eavesdropper .
•Advantages
• It will help protect the password that are
transmitted using mobile phones
• Nokia has patented the technology and
looking forward to engineer into mobile
devices.
•Quantum City Project(Durban)
• 4 Node network connected in a star
configuration.
• Quantum Links as long as 26Kms
• Data Transmitted : data
records, telephones, and internet traffic.
• 99.3% of the time the system functioned
effectively and was stable.
•Limitations of QC
• Expensive :- Quantum Cryptography needs
expensive dedicated equipment to be set up
before keys can be exchanged.
Approx. 25 Millions $ for 2000 Km network!!
Survey of 500 prospective QC users show they
prefer QC for banking/military purpose.
•Limitations
• Range :- The current Range of QC systems
are a maximum of 250 kms. Lot of active
research is being done to increase range!!
• Since one cant use
repeaters or amplifiers
Trusted nodes are
needed to extend the
Range.
•Breaking Quantum Crypto
• Break underlying cryptography??
• Not possible!! Governed by law of physics
• Attack the implementation
• Hardware Attack
What if the laser generates more than
one photon
•Breaking Quantum Crypto
• Measure the color of the spectrum and
not the state of photon!!
•Future of Quantum Cryptography
• QKD with satellites:-
Research groups are actively working to
demonstrate key exchange with satellites.
•Thank you!!

Más contenido relacionado

La actualidad más candente

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyShyam Mohan
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Kirby Linvill
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
Bluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing AttackBluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing AttackRajeev Chauhan
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxRohanTakke
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Kirby Linvill
 

La actualidad más candente (20)

Quantum Cryptography/QKD
Quantum Cryptography/QKDQuantum Cryptography/QKD
Quantum Cryptography/QKD
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides Quantum Key Distribution Meetup Slides
Quantum Key Distribution Meetup Slides
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Bluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing AttackBluetooth Hacking: Cracking the PIN and Repairing Attack
Bluetooth Hacking: Cracking the PIN and Repairing Attack
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)Quantum Key Distribution Meetup Slides (Updated)
Quantum Key Distribution Meetup Slides (Updated)
 

Destacado

Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideArinto Murdopo
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101Omar Shehab
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesMaria Stylianou
 
Dark matter & dark energy
Dark matter & dark energyDark matter & dark energy
Dark matter & dark energysurat murthy
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum AbbasiIEEEP Karachi
 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptographyspreedniels
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015Paul F. Roberts
 
project Report on LAN Security Manager
project Report on LAN Security Managerproject Report on LAN Security Manager
project Report on LAN Security ManagerShahrikh Khan
 
The Many Worlds of Quantum Mechanics
The Many Worlds of Quantum MechanicsThe Many Worlds of Quantum Mechanics
The Many Worlds of Quantum MechanicsSean Carroll
 

Destacado (15)

Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet Services
 
Computer Science Final Project
Computer Science Final ProjectComputer Science Final Project
Computer Science Final Project
 
Dark matter & dark energy
Dark matter & dark energyDark matter & dark energy
Dark matter & dark energy
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
abledit Solutions
abledit Solutionsabledit Solutions
abledit Solutions
 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptography
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 
project Report on LAN Security Manager
project Report on LAN Security Managerproject Report on LAN Security Manager
project Report on LAN Security Manager
 
The Many Worlds of Quantum Mechanics
The Many Worlds of Quantum MechanicsThe Many Worlds of Quantum Mechanics
The Many Worlds of Quantum Mechanics
 

Similar a Cryptopresentationfinal

quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfsasasas14
 
Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfsunnypatil1778
 
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiQuantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiProfessor Lili Saghafi
 
Advances In Cryptography
Advances In CryptographyAdvances In Cryptography
Advances In CryptographyRare Input
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiProfessor Lili Saghafi
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computingachakracu
 
Quantum Computing and Qiskit
Quantum Computing and QiskitQuantum Computing and Qiskit
Quantum Computing and QiskitPooja Mistry
 
Quantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksQuantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksMiranda Ghrist
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths Ahmed Banafa
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum CommunicationsSrinivas Bukkuru
 
Quantum Computing Basics
Quantum Computing BasicsQuantum Computing Basics
Quantum Computing BasicsChristian Waha
 
csonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdfcsonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdfzoobiarana76
 

Similar a Cryptopresentationfinal (20)

quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum crypto system
Quantum crypto systemQuantum crypto system
Quantum crypto system
 
Quantum Computation For AI
Quantum Computation For AIQuantum Computation For AI
Quantum Computation For AI
 
Introduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdfIntroduction_to_Quantum_Computers.pdf
Introduction_to_Quantum_Computers.pdf
 
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili SaghafiQuantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
Quantum Computers PART 4 Quantum Computer’sHardware by Lili Saghafi
 
Advances In Cryptography
Advances In CryptographyAdvances In Cryptography
Advances In Cryptography
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
 
Quantum Computing and Qiskit
Quantum Computing and QiskitQuantum Computing and Qiskit
Quantum Computing and Qiskit
 
Quantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networksQuantum computers, quantum key distribution, quantum networks
Quantum computers, quantum key distribution, quantum networks
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
The future is quantum
The future is quantumThe future is quantum
The future is quantum
 
quantum computing and Quantum Communications
quantum computing and Quantum Communicationsquantum computing and Quantum Communications
quantum computing and Quantum Communications
 
Quantum Computing Basics
Quantum Computing BasicsQuantum Computing Basics
Quantum Computing Basics
 
csonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdfcsonqc-150120184546-conversion-gate01.pdf
csonqc-150120184546-conversion-gate01.pdf
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Último (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Cryptopresentationfinal

  • 2. •Introduction • Quantum cryptography is the one of the most successful application of Quantum Computing/InformationTheory. • For the first time in history, we can use the forces of nature to implement perfectly secure cryptosystems. • Quantum cryptography has been proved to work practically.
  • 3. •State of the art • ClassicalCryptography(RSA) relies heavily on the complexity of factoring integers. • Future Quantum Computers can use Shor’s Algorithm to efficiently break today’s cryptosystems. • Quantum computers can solve factoring problems in polynomial time. What happens when that day arrives?
  • 4. •Today’s Talk • Basic Ideas in Cryptography • Ideas from the QuantumWorld • Quantum Key Distribution (QKD) • BB84 without eavesdropping • BB84 with eavesdropping • Working Prototypes • Practical Implementation of QC • Conclusion
  • 5. •Basic Ideas of Cryptography • Cryptography: “the coding and decoding of secret messages.” • The basic idea is to modify a message so as to make it unintelligible to anyone but the intended recipient. • For message (plaintext) M, e(M, K) encryption - ciphertext d[e(M, K), K] = M decryption
  • 6. •Keys and key distribution  K is called the key.  The key is known only to sender and receiver: it is secret.  Anyone who knows the key can decrypt the message.  Key distribution is the problem of exchanging the key between sender and receiver.
  • 7. •Perfect Secrecy and OTP  There exist perfect cryptosystems.  Example: One-Time Pad (OTP)  The problem of distributing the keys in the first place remains.  Key length has to be same as message length!!
  • 8. •Quantum Key Distribution  Using the laws of quantum mechanics, we can distribute keys in perfect secrecy!!  The Result:The Perfect Cryptosystem, QC = QKD + OTP
  • 9. •Quantum Physics Basics  Physical Qubits  Any subatomic particle can be used to represent a qubit, e.g. an electron.  A photon is a convenient choice.  A photon is an electromagnetic wave.
  • 10. •Polarization • A photon has a property called polarization, which is the plane in which the electric field oscillates. • We can use photons of different polarizations to represent quantum states:   0 state 0 90 state 1
  • 11. •Ideas from Quantum World  Measurement  Observing, or measuring, a quantum system will alter its state.  Example: the Qubit  When observed, the state of a qubit will collapse to unpredictable random state 1 or 0.
  • 12. •Polarizers & Basics • A device called a polarizer allows us to place a photon in a particular polarization • The polarization basis is frame of reference for quantum measurement.
  • 13. •Measuring Photons • A calcite crystal can be used to recover the bits encoded into a stream of photons. 13 CaCO3 Diagonal axis (X) 1 0 1 0
  • 14. •Uncertainty Principle • What if the crystal has the wrong orientation? 14 CaCO3 RECTILINEAR axis(+) ??? 50% chance of getting right answer. Either | or ---
  • 15. •No Cloning theorem • It is impossible to make a device that perfectly copies an unknown qubit. • Suppose there is a quantum process that implements: |q,_> ->|q,q>
  • 16. •Quantum Key Distribution • Quantum Key Distribution exploits the effects discussed in order to thwart eavesdropping. • If an eavesdropper uses the wrong polarization basis to measure the channel, the result of the measurement will be random.
  • 17. •QKD Protocols • A protocol is a set of rules governing the exchange of messages over a channel. • There are three main security protocols for QKD: BB84, B92, and Entanglement-Based QKD. • Lets discuss the BB84 in detail.
  • 18. •BB84 • BB84 was the first security protocol implementingQuantum Key Distribution. • It uses the idea of photon polarization. • The key consists of bits that will be transmitted as photons. • Each bit is encoded with a random polarization basis!
  • 19. •BB84 With no Eavesdropping • Alice is going to send Bob a key. • She begins with a random sequence of bits. • Bits are encoded with a random basis, and then sent to Bob: Bit 0 1 0 1 1 Basis + × × + × Photon
  • 20. •BB84 With no Eavesdropping • Bob receives the photons and must decode them using a random basis. • Some of his measurements are correct. Photon Basis? + + × + × Bit? 0 0 0 1 1
  • 21. •BB84 With no eavesdropper • Alice and Bob talk on the public encrypted channel: • Alice chooses a subset of the bits (the test bits) and reveals which basis she used to encode them to Bob. • Bob tells Alice which basis he used to decode the same bits.
  • 22. •Comparing measurements Alice’s Bit 0 1 0 1 1 Alice’s Basis + × × + × Photon Bob’s Basis + + × + × Bob’s Bit 0 0 0 1 1 The test bits allow Alice and Bob to test whether the channel is secure.
  • 23. •The Catch • As long as no errors and/or eavesdropping have occurred, the test bits should agree. • Alice and Bob have now made sure that the channel is secure.The test bits are removed. • Alice tells Bob the basis she used for the other bits, and they both have a common set of bits: the final key!
  • 24. •Deriving the final key Alice’s Bit 0 1 0 1 1 Alice’s Basis + × × + × Photon Bob’s Basis + + × + × Bob’s Bit 0 0 0 1 1 Final Key = 01 Test bits discarded
  • 25. •In the presence of eavesdropper • If an eavesdropper Eve tries to tap the channel, this will automatically show up in Bob’s measurements. • In those cases where Alice and Bob have used the same basis, Bob is likely to obtain an incorrect measurement: Eve’s measurements are bound to affect the states of the photons.
  • 27. •In the presence of Eavesdropper • As Eve intercepts Alice’s photons, she has to measure them with a random basis and send new photons to Bob. • The photon states cannot be cloned (non- cloneability). • Eve’s presence is always detected: measuring a quantum system irreparably alters its state.
  • 29. •BB84 – Key Distillation  Sifting –Unmatched Bases; “stray” or “lost” qubits  Error Correction – Noise & Eaves-dropping detected – Uses “cascade” protocol – Reveals information to Eve so need to track this.  Privacy Amplification – reduces Eve’s knowledge obtained by previous EC  Authentication – avoid man-in- middle attacks .Many protocols in development!!
  • 30. Researchers at Nokia and the University of Bristol in UK have come up with quantum cryptography in mobile phones. Goal: To perform "quantum key distribution" (QKD) using simple and potentially inexpensive "client" electronics that could be integrated within a single chip.
  • 31. •Making use of twisting and turning • Makes use of the Reference independent frame QKD[RfiQKD] • Polarization or phase is measured in context with a reference frame • They select a specific threshold value and drop below this value signals there is an eavesdropper .
  • 32. •Advantages • It will help protect the password that are transmitted using mobile phones • Nokia has patented the technology and looking forward to engineer into mobile devices.
  • 33. •Quantum City Project(Durban) • 4 Node network connected in a star configuration. • Quantum Links as long as 26Kms • Data Transmitted : data records, telephones, and internet traffic. • 99.3% of the time the system functioned effectively and was stable.
  • 34. •Limitations of QC • Expensive :- Quantum Cryptography needs expensive dedicated equipment to be set up before keys can be exchanged. Approx. 25 Millions $ for 2000 Km network!! Survey of 500 prospective QC users show they prefer QC for banking/military purpose.
  • 35. •Limitations • Range :- The current Range of QC systems are a maximum of 250 kms. Lot of active research is being done to increase range!! • Since one cant use repeaters or amplifiers Trusted nodes are needed to extend the Range.
  • 36. •Breaking Quantum Crypto • Break underlying cryptography?? • Not possible!! Governed by law of physics • Attack the implementation • Hardware Attack What if the laser generates more than one photon
  • 37. •Breaking Quantum Crypto • Measure the color of the spectrum and not the state of photon!!
  • 38. •Future of Quantum Cryptography • QKD with satellites:- Research groups are actively working to demonstrate key exchange with satellites.