SlideShare una empresa de Scribd logo
1 de 25
Quantum Cryptography 
Presented By 
Tabrej A.Khan 
13223006
• Classical Cryptography 
• Introduction to Quantum cryptography- 
• Classical Cryptography and Key Distribution Problem. 
• Quantum Communication . 
• Elements of Quantum Theory 
• Heisenberg Uncertainty Principle 
• Quantum Key Distribution . 
• Detecting Eavesdropper 
• Technical Challenges of QKD
. 
Classical Cryptography
Symmetric Algorithm 
 Usually use same key for encryption and decryption. 
 Require sender and receiver to agree on a key before 
they communicate securely. 
 Encryption key can be calculated from decryption 
key and vice versa 
 Security lies with the key. 
 Also called secret key algorithms, singlekey 
algorithms, or one-key algorithms 
 Example: DES (1977), Triple DES (1998),AES
Asymmetric Algorithm 
 Use different keys for encryption and decryption. 
 Decryption key cannot be calculated from the 
encryption key 
 Anyone can use the key to encrypt data and send it to 
the host; only the host can decrypt the data 
 Also known as public key algorithms 
 Example: Diffie-Hellman (1976) RSA (1977)
Vulnerabilities/Weakness to the 
modern/classical cryptography 
 There are three main problems with encryption 
schemes 
-first is key distribution 
-the second is key management 
-Thirdly as computing power increases, and new 
classical computational techniques are developed, 
the length of time that a message can be considered 
secure will decrease, and numerical keys will no 
longer be able to provide acceptable levels of secure 
communications
Key Distribution Problem 
 How to communicate the key securely between two 
pair of users. 
 it is not possible to check whether this medium was 
intercepted – and its content copied – or not. 
 Public key cryptography came as a solution to this, 
but these too are slow and cannot be used to encrypt 
large amount of data
Elements of Quantum Theory 
 Light waves are made up of millions of discrete 
quanta called Photons 
 They are massless and have energy, momentum 
and angular momentum called spin. 
 Spin carries the polarization.
Quantum Communication 
The Classical World 
- Bits either 0 or 1. 
- Bits can be copied. 
- Bits can be observed without changing them. (So, eavesdropping cannot 
be detected in classical cryptosystems.) 
Quantum Bits 
- A quantum bit (qubit) can be 0 or 1 at the same time. 
- It can not be copied (no cloning theorem). 
- Its state will collapse if it is observed (measured). 
 If a qubit can be 0 or 1 at the same time, how many values can n qubits 
have at the same time ?
Quantum Communication 
 Quantum cryptography solves the key distribution problem by 
allowing the exchange of a cryptographic key between two 
remote parties with absolute security, guaranteed by the laws 
of physics. 
 Quantum Communication is based on two features of 
Quantum mechanisms and photons. 
-State indeterminancy based on Heisenberg principle . 
-Entangled based protocols that means two entities can be 
defined such that their properties are entangled altering one 
effects the value of other.
Heisenberg Uncertainty Principle 
 For any two observable properties linked together 
like mass and momentum 
• According to the principle two interrelated properties 
cannot be measured individually without affecting the 
other. 
• Measuring the state of photon will affect it value
Quantum Key Distribution – BB84 
Protocol
Quantum Mechanics for Cryptography – 
Measurement Basis 
 Basis – frame of reference for quantum 
measurement 
 Example – polarization 
vertical/horizontal vs. diagonal 
 Horizontal filter, light gets through = 0 
 Vertical filter, light gets through = 1 
 45 deg. filter, light = 0 
 135 deg. filter, light = 1
Quantum Key Distribution – BB84 
Protocol
Example
Detecting Eavesdroppers 
 To check for the presence of eavesdropping Alice and 
Bob now compare a certain subset of their remaining 
bit strings. 
 If any interceptor has gained any information about 
the photons polarization, this will have introduced 
errors in Bobs' measurements 
 If more than p bits differ they abort the key and try 
again, possibly with a different quantum channel, as 
the security of the key cannot be guaranteed.
19 
Alice's Bit Sequence 
0 1 0 - 0 1 1 1 1 - 1 0 
- 1 - - 0 1 - - 1 - 1 0 
Bob's Bases 
Bob's Results 
Key 
Alice 
Bob 
Polarizers 
Horizontal - Vertical 
Diagonal (-45, +45) 
H/V Basis 
45 Basis 
BB84 protocol: Eve  25% errors
Intercept and Resend Attack
Implementing Quantum 
Cryptography(Real Case) 
 BBN, Harvard, and Boston University built the DARPA quantum network, 
the world’s first network that delivers end-to-end network security via 
high-speed quantum key distribution, and tested that network against 
sophisticated eavesdropping attacks. 
 For the Bank of Austria, the novel technology was demonstrated by the 
group of Professor Anton Zeilinger, Vienna University in collaboration with 
the group Quantum Technologies of Seibersdorf research. 
 The bank transfer was initiated by Vienna’s Mayor Dr. Michael Haupl, and 
executed by the director of the Bank Austria Creditanstalt, Dr. Erich. 
 The information was sent via a glass fiber cable from the Vienna City 
 Hall to the Bank Austria Creditanstalt branch office “Schottengasse”.
TECHNICAL CHALLENGES OF QKD AND 
FUTURE DIRECTION 
 One of the challenges for the researchers, is distance 
limitation.Currently, quantum key distribution 
distances are limited to tens of kilometers because of 
optical amplification destroys the qubit state. 
 Also to develop optical device capable of generating, 
detecting and guiding single photons; devices that 
are affordable within a commercial environment . 
 Also users need reassurance not only that QKD is 
theoretically sound, but also that it has been securely 
implemented by the vendors.
Summary 
 Realization of practical quantum information 
technologies can not be accomplished without 
involvement of the network research community. 
 The advances in computer processing power and the 
threat of limitation for today’s cryptography systems 
will remain a driving force in the continued research 
and development of quantum cryptography. 
 The technology has the potential to make a valuable 
contribution to the network security among 
government, businesses, and academic environment.
Future Prospects 
 Ground-to-satellite, satellite-to-satellite links 
 General improvement with evolving qubit-handling 
techniques, new detector technologies
Thanks

Más contenido relacionado

La actualidad más candente

Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyAnisur Rahman
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographysahilnarvekar
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyNARESHGOTMAL
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptographypixiejen
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionShahrikh Khan
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinalskadyan1
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographyShyam Mohan
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstractKalluri Madhuri
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportShyam Mohan
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptographynamanthakur
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentationKalluri Madhuri
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesisSamy Shehata
 

La actualidad más candente (20)

Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Naman quantum cryptography
Naman quantum cryptographyNaman quantum cryptography
Naman quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
 

Similar a quantumcrypto

Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfssuser6602e0
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasSoftware Guru
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfsasasas14
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptographyAnand Kairamkonda
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understandingSuriaRao2
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to PracticeXequeMateShannon
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdfRichard Gill
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdfRichard Gill
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths Ahmed Banafa
 
B03250609
B03250609B03250609
B03250609theijes
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
 
Advances In Cryptography
Advances In CryptographyAdvances In Cryptography
Advances In CryptographyRare Input
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 

Similar a quantumcrypto (20)

Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
namanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdfnamanquantumcryptography-150820161809-lva1-app6892.pdf
namanquantumcryptography-150820161809-lva1-app6892.pdf
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Criptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresasCriptografía cuántica - fundamentos, productos y empresas
Criptografía cuántica - fundamentos, productos y empresas
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Introduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz KowalikIntroduction to quantum cryptography Dr. Janusz Kowalik
Introduction to quantum cryptography Dr. Janusz Kowalik
 
Gull talk London.pdf
Gull talk London.pdfGull talk London.pdf
Gull talk London.pdf
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
B03250609
B03250609B03250609
B03250609
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Advances In Cryptography
Advances In CryptographyAdvances In Cryptography
Advances In Cryptography
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 

quantumcrypto

  • 1. Quantum Cryptography Presented By Tabrej A.Khan 13223006
  • 2. • Classical Cryptography • Introduction to Quantum cryptography- • Classical Cryptography and Key Distribution Problem. • Quantum Communication . • Elements of Quantum Theory • Heisenberg Uncertainty Principle • Quantum Key Distribution . • Detecting Eavesdropper • Technical Challenges of QKD
  • 4. Symmetric Algorithm  Usually use same key for encryption and decryption.  Require sender and receiver to agree on a key before they communicate securely.  Encryption key can be calculated from decryption key and vice versa  Security lies with the key.  Also called secret key algorithms, singlekey algorithms, or one-key algorithms  Example: DES (1977), Triple DES (1998),AES
  • 5.
  • 6. Asymmetric Algorithm  Use different keys for encryption and decryption.  Decryption key cannot be calculated from the encryption key  Anyone can use the key to encrypt data and send it to the host; only the host can decrypt the data  Also known as public key algorithms  Example: Diffie-Hellman (1976) RSA (1977)
  • 7.
  • 8. Vulnerabilities/Weakness to the modern/classical cryptography  There are three main problems with encryption schemes -first is key distribution -the second is key management -Thirdly as computing power increases, and new classical computational techniques are developed, the length of time that a message can be considered secure will decrease, and numerical keys will no longer be able to provide acceptable levels of secure communications
  • 9. Key Distribution Problem  How to communicate the key securely between two pair of users.  it is not possible to check whether this medium was intercepted – and its content copied – or not.  Public key cryptography came as a solution to this, but these too are slow and cannot be used to encrypt large amount of data
  • 10. Elements of Quantum Theory  Light waves are made up of millions of discrete quanta called Photons  They are massless and have energy, momentum and angular momentum called spin.  Spin carries the polarization.
  • 11. Quantum Communication The Classical World - Bits either 0 or 1. - Bits can be copied. - Bits can be observed without changing them. (So, eavesdropping cannot be detected in classical cryptosystems.) Quantum Bits - A quantum bit (qubit) can be 0 or 1 at the same time. - It can not be copied (no cloning theorem). - Its state will collapse if it is observed (measured).  If a qubit can be 0 or 1 at the same time, how many values can n qubits have at the same time ?
  • 12. Quantum Communication  Quantum cryptography solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of physics.  Quantum Communication is based on two features of Quantum mechanisms and photons. -State indeterminancy based on Heisenberg principle . -Entangled based protocols that means two entities can be defined such that their properties are entangled altering one effects the value of other.
  • 13. Heisenberg Uncertainty Principle  For any two observable properties linked together like mass and momentum • According to the principle two interrelated properties cannot be measured individually without affecting the other. • Measuring the state of photon will affect it value
  • 14. Quantum Key Distribution – BB84 Protocol
  • 15. Quantum Mechanics for Cryptography – Measurement Basis  Basis – frame of reference for quantum measurement  Example – polarization vertical/horizontal vs. diagonal  Horizontal filter, light gets through = 0  Vertical filter, light gets through = 1  45 deg. filter, light = 0  135 deg. filter, light = 1
  • 16. Quantum Key Distribution – BB84 Protocol
  • 18. Detecting Eavesdroppers  To check for the presence of eavesdropping Alice and Bob now compare a certain subset of their remaining bit strings.  If any interceptor has gained any information about the photons polarization, this will have introduced errors in Bobs' measurements  If more than p bits differ they abort the key and try again, possibly with a different quantum channel, as the security of the key cannot be guaranteed.
  • 19. 19 Alice's Bit Sequence 0 1 0 - 0 1 1 1 1 - 1 0 - 1 - - 0 1 - - 1 - 1 0 Bob's Bases Bob's Results Key Alice Bob Polarizers Horizontal - Vertical Diagonal (-45, +45) H/V Basis 45 Basis BB84 protocol: Eve  25% errors
  • 21. Implementing Quantum Cryptography(Real Case)  BBN, Harvard, and Boston University built the DARPA quantum network, the world’s first network that delivers end-to-end network security via high-speed quantum key distribution, and tested that network against sophisticated eavesdropping attacks.  For the Bank of Austria, the novel technology was demonstrated by the group of Professor Anton Zeilinger, Vienna University in collaboration with the group Quantum Technologies of Seibersdorf research.  The bank transfer was initiated by Vienna’s Mayor Dr. Michael Haupl, and executed by the director of the Bank Austria Creditanstalt, Dr. Erich.  The information was sent via a glass fiber cable from the Vienna City  Hall to the Bank Austria Creditanstalt branch office “Schottengasse”.
  • 22. TECHNICAL CHALLENGES OF QKD AND FUTURE DIRECTION  One of the challenges for the researchers, is distance limitation.Currently, quantum key distribution distances are limited to tens of kilometers because of optical amplification destroys the qubit state.  Also to develop optical device capable of generating, detecting and guiding single photons; devices that are affordable within a commercial environment .  Also users need reassurance not only that QKD is theoretically sound, but also that it has been securely implemented by the vendors.
  • 23. Summary  Realization of practical quantum information technologies can not be accomplished without involvement of the network research community.  The advances in computer processing power and the threat of limitation for today’s cryptography systems will remain a driving force in the continued research and development of quantum cryptography.  The technology has the potential to make a valuable contribution to the network security among government, businesses, and academic environment.
  • 24. Future Prospects  Ground-to-satellite, satellite-to-satellite links  General improvement with evolving qubit-handling techniques, new detector technologies