SlideShare a Scribd company logo
Quantum Cryptography:
Quantum cryptography: foundations,
products and companies
Salvador E. Venegas-Andraca
Tecnol´ogico de Monterrey, Escuela de Ingenier´ıa y Ciencias
Qualtop, SA de CV
Software Gur´u Virtual Conference 2017
24 May 2017
Quantum Cryptography:
Thanks
Table of Contents
1 Thanks
2 Quantum Computation and Quantum Information
3 Mathematics for quantum cryptography
4 Cryptography
5 Business
Quantum Cryptography:
Thanks
My warmest thanks to
Software Gur´u
CONACyT - Fronteras de la Ciencia and SNI
Tecnol´ogico de Monterrey
Qualtop
Quantum Cryptography:
Quantum Computation and Quantum Information
Table of Contents
1 Thanks
2 Quantum Computation and Quantum Information
3 Mathematics for quantum cryptography
4 Cryptography
5 Business
Quantum Cryptography:
Quantum Computation and Quantum Information
Quantum computation and quantum information
Quantum computation and quantum information are scientific
and engineering disciplines devoted to the development of
i) Quantum algorithms.
ii) Quantum information processing protocols and devices.
Quantum Cryptography:
Quantum Computation and Quantum Information
Quantum computation and quantum information
Some key results in quantum computation and quantum infor-
mation include the discovery of
Quantum teleportation, which consists of transmitting
quantum information (originally contained in a qubit) via a
quantum channel.
Quantum dense coding, which allows sending two
classical bits using only one qubit.
quantum cryptography, which allows coding using
quantum systems.
Quantum Cryptography:
Quantum Computation and Quantum Information
Quantum Cryptography
Quantum cryptography is a robust field of science and engineer-
ing that has evolved in an emergent high-tech market with com-
panies capable of delivering off-the-shelf products. Quantum
cryptography protocols can be categorized into
Quantum key distribution protocols (QKD).
Quantum secret sharing protocols (QSS).
Quantum secure direct communication protocols
(QSDC).
Deterministic secure quantum communication
protocols (DSQC).
Quantum Cryptography:
Quantum Computation and Quantum Information
Quantum Cryptography
Let us now provide a succinct introduction to some fundamental
concepts of quantum computation needed to formally describe
quantum cryptography protocols.
Quantum Cryptography:
Mathematics for quantum cryptography
Table of Contents
1 Thanks
2 Quantum Computation and Quantum Information
3 Mathematics for quantum cryptography
4 Cryptography
5 Business
Quantum Cryptography:
Mathematics for quantum cryptography
A question: what is quantum computation?
Quantum Computation
=
Quantum Mechanics + Computer Science
Quantum Mechanics: a set of physical laws that describe the
behaviour of atomic and subatomic phenomena.
Computer science: branch of mathematics divided into
automata theory, computability theory and complexity theory.
Quantum Cryptography:
Mathematics for quantum cryptography
A question: what is quantum computation?
Quantum computation, one of the most recent joint ventures be-
tween physics and computer science, may be defined as follows:
Quantum Computation is a multidisciplinary field focused on
the development of computers and algorithms, i.e. hardware
and software, based on the quantum mechanical properties of
Nature.
Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
In classical computation, information is stored and manipulated
in the form of bits.
The mathematical structure of a classical bit is rather simple:
it suffices to define two logical values, traditionally labelled as
{0, 1} (i.e. a classical bit lives in a scalar space) and to relate
those values to two different and mutually exclusive outcomes
of a classical measurement.
Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
In quantum computation, information is stored, manipulated and
measured in the form of qubits (= quantum bit). A qubit is a
physical entity described by the laws of quantum mechanics.
Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
Remember:
– R2, the two-dimensional space studied in elementary
school. Elements of R2, denoted by ˛x, are vectors.
– Any vector ˛x = (a, b) can be written as a linear combination
of a basis, e.g.
˛x = (a, b) = ˛x = (a, b) = aˆı + bˆä
Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
In quantum computation, we use the following notation for
denoting vectors:
˛x = |xÍ
So,
˛x = aˆı + bˆä … |xÍ = a|iÍ + b|jÍ
Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
A qubit is a unit vector in a two-dimensional complex space
|ÂÍ œ C2
Quantum Cryptography:
Mathematics for quantum cryptography
Bits and Qubits
A qubit |ÂÍ may be written in general form as
|ÂÍ = –|pÍ + —|qÍ
where –, — œ C, |–|2 +|—|2 = 1 and {|pÍ, |qÍ} is an arbitrary basis
spanning C2.
Note that a most important consequence of the vectorial nature
of a qubit is the possibility of writing it as a linear combination of
elements of any basis.
Quantum Cryptography:
Mathematics for quantum cryptography
The choice of {|pÍ, |qÍ} is often the orthonormal basis
{|0Í, |1Í}
known as the computational basis.
Quantum Cryptography:
Mathematics for quantum cryptography
In addition to the computational basis {|0Í, |1Í}, it is customary
in quantum cryptography protocols to use the diagonal basis
{|+Í, |≠Í}
Quantum Cryptography:
Cryptography
Table of Contents
1 Thanks
2 Quantum Computation and Quantum Information
3 Mathematics for quantum cryptography
4 Cryptography
5 Business
Quantum Cryptography:
Cryptography
Intro to cryptography
Cryptography is the branch of science and engineering devoted
to the design and implementation of techniques for secure com-
munication, under the assumption that a third party is interested
in reading our messages.
Quantum Cryptography:
Cryptography
Symmetric/Asymmetric key cryptosystems
Modern cryptography has two types of encryption: symmetric
key and asymmetric key cryptosystems. Let us briefly describe
each type.
Quantum Cryptography:
Cryptography
Symmetric key cryptosystems
Symmetric key cryptosystems, also known as private key
cryptosystems, are encryption algorithms that use a single
key for both encryption and decryption of the ciphertext. In
this field, algorithms for encryption and decryption are
known while the key must remain private, i.e. secret.
Quantum Cryptography:
Cryptography
Asymmetric key cryptosystems
Asymmetric key cryptosystems use two keys: a public key
and a private key, the public key is used for encryption and
the private key for decryption. These cryptosystems work
under the rationale of a safe with two keys: the key to lock
the safe is known by everybody but the key for opening is
available to only one person.
Quantum Cryptography:
Cryptography
Private key cryptosystems
Private key cryptosystems can be very powerful. For example,
The cryptosystem known as the one-time pad can be proved
to be perfectly secured as long as the key is truly random,
the length of the key is equal to the size of the message and
the key is only used once.
Other private key cryptosystems include the Data Encryp-
tion Standard (DES) and the Advanced Encryption Stan-
dard.
Quantum Cryptography:
Cryptography
Key distribution
One of the most sensible issues with private key cryptosystems
is safe key distribution, i.e., the process of establishing a private
key between two users who cannot use a perfectly secure
communication channel.
The issue is the fact that, if the channel used to distribute a
private key is governed by the laws of classical physics, then
in principle any (classical) key can be passively eavesdropped,
i.e. without users becoming aware of this vulnerability.
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
In 1984, Charles Bennett and Gilles Brassard proposed a quan-
tum key distribution protocol known as BB84. The key idea of
BB84 is to produce a key by encoding bits in qubits that are
taken from a set composed by the union of the computational
and diagonal bases, i.e., a set of four non-orthogonal quantum
states.
Quantum Cryptography:
Cryptography
BB84 Quantum Key distribution
Let us suppose the following setting:
- Alice and Bob want to create a key for encoding a message.
- The key, to be shared by Alice and Bob, must be random and
secret.
- There is a third character: Eve, an eavesdropper.
- The conflict in this story is: Alice and Bob’s key need their key
to be secret and Eve will do anything in her power to reveal at
least some portions of the key.
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
- The purpose of BB84 is to produce a key, i.e. actual encoded
data transmission is not part of the BB84.
- Hereinafter, we assume that:
a) Alice has access to a source of individual photons, the exper-
imental equipment and expertise to manipulate the polarization
of her photons, and a source of random bits.
b) There is a channel available to Alice and Bob that they can
use to send quantum states (e.g. an optical fiber.)
c) Bob has the experimental facilities and expertise required to
measure quantum states using different bases.
d) Alice and Bob have a classical channel (e.g. a telephone line)
that may or may not be a secure line, it doesn’t matter.
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
The BB84 protocol is composed of the following steps: 1. Alice
starts by generating two sets of random bits A = {a1, a2, . . . an}
and B = {b1, b2, . . . bn}
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
2. Alice uses the set of random bits A to select the vector basis
with which she will prepare the initial polarization state of her
photons, according to the following criterion: Alice will read one
bit at a time from set A and, depending on her reading (either 0
or 1), she will choose the computational basis (+) or the diagonal
basis (◊) to prepare her photons. In computational terms, this
step would be more or less equivalent to variable initialization.
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
For instance, let us suppose that A = {0, 1, 0, 0, 1, 0, 1, 1, 1, 0}
and that Alice has chosen the following criterion: if 0 then use
the computational basis; if 1 then use the diagonal basis. Then,
Alice would initialize her qubits using the following list: (+, ◊, +,
+, ◊, +, ◊, ◊, ◊, +).
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
3. Now, Alice must randomly choose one vector from each basis
to prepare the polarization initial state of each photon. To do so,
Alice will use the elements of set B according to the following
function:
initial polarization state =
Y
_____]
_____[
|0Í (or |1Í) if (+,0)
|1Í( or |0Í) if (+,1)
|+Í( or |≠Í) if (◊,0)
|≠Í( or |+Í) if (◊,1)
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
4. Alice sends her qubit sequence to Bob via the quantum chan-
nel they both have access to. This step is Eve’s chance to extract
information from the quantum channel.
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
The KEY point to remember here is the following:
– Extracting information from a quantum system (e.g. a pho-
ton) makes irreversible changes in the actual information
contained in the quantum system.
– This is due to a truly exotic property of quantum mechan-
ics: measuring a quantum system is a probabilistic process
that changes the state of the quantum system.
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
Measuring a quantum system is equivalent to projecting (as in
analytical geometry) a vector onto a vector basis.
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
So, if Eve is eavesdropping, she will change the contents of any
qubits and that is the footprint that we need in order to detect
her presence!
Quantum Cryptography:
Cryptography
BB84 - Quantum Key distribution
Table: Example of the BB84 protocol in action
Alice’s bits 1 1 0 1 0 0 1 1 1 0 0 1
Alice’s bases + + ◊ + ◊ + ◊ + ◊ + ◊ ◊
Alice’s qubits |0Í |0Í |+Í |0Í |+Í |1Í |≠Í |0Í |≠Í |1Í |+Í |≠Í
Eve’s bases + ◊ + + ◊ ◊ + ◊ + + + +
Eve’s measurements |0Í |+Í |1Í |0Í |+Í |0Í |0Í |+Í |1Í |1Í |1Í |0Í
Bob’s bases ◊ + + + ◊ ◊ ◊ + + + + ◊
Bob’s measurements |+Í |0Í |1Í |0Í |+Í |≠Í |+Í |1Í |1Í |1Í |1Í |+Í
Bob’s bits 1 1 0 1 0 1 0 0 0 0 0 0
Selection • • • • • • •
Quantum Cryptography:
Business
Table of Contents
1 Thanks
2 Quantum Computation and Quantum Information
3 Mathematics for quantum cryptography
4 Cryptography
5 Business
Quantum Cryptography:
Business
IDQuantique
IDQuantique
http://www.idquantique.com/
Quantum Key Distribution Servers
Random Number Generators
Quantum Cryptography:
Business
Thanks again!
Thank you very much!
Questions?
Criptografía cuántica - fundamentos, productos y empresas

More Related Content

What's hot

Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptography
Shahzad Ahmad
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
IJCNCJournal
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
IDES Editor
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
xlyle
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
Editor IJCATR
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Tharindu Weerasinghe
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in Cryptography
CSCJournals
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
IJNSA Journal
 
Rsa
RsaRsa
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
Mazin Alwaaly
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
Information Security Awareness Group
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
IOSR Journals
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
 
Exploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's trafficExploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's traffic
Sandipan Biswas
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemIAEME Publication
 
D017433134
D017433134D017433134
D017433134
IOSR Journals
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
IJMER
 

What's hot (20)

Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptography
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
On the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in CryptographyOn the Usage of Chained Codes in Cryptography
On the Usage of Chained Codes in Cryptography
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
 
Rsa
RsaRsa
Rsa
 
Information and data security public key cryptography and rsa
Information and data security public key cryptography and rsaInformation and data security public key cryptography and rsa
Information and data security public key cryptography and rsa
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Exploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's trafficExploiting tls to disrupt privacy of web application's traffic
Exploiting tls to disrupt privacy of web application's traffic
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
D017433134
D017433134D017433134
D017433134
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 

Similar to Criptografía cuántica - fundamentos, productos y empresas

Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
RonSteinfeld1
 
B03250609
B03250609B03250609
B03250609
theijes
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
Akshay Shelake
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
Andrew Manoske
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
gitrahekno
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
ijcsa
 
Quantum computation a review
Quantum computation a reviewQuantum computation a review
Quantum computation a review
Editor Jacotech
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
IJNSA Journal
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
StHack
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
Milos Dunjic
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
Minahilnuman1
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
IJNSA Journal
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
XequeMateShannon
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 

Similar to Criptografía cuántica - fundamentos, productos y empresas (20)

Quantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdfQuantum_Safe_Crypto_Overview_v3.pdf
Quantum_Safe_Crypto_Overview_v3.pdf
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
B03250609
B03250609B03250609
B03250609
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Quantum computation a review
Quantum computation a reviewQuantum computation a review
Quantum computation a review
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 

More from Software Guru

Hola Mundo del Internet de las Cosas
Hola Mundo del Internet de las CosasHola Mundo del Internet de las Cosas
Hola Mundo del Internet de las Cosas
Software Guru
 
Estructuras de datos avanzadas: Casos de uso reales
Estructuras de datos avanzadas: Casos de uso realesEstructuras de datos avanzadas: Casos de uso reales
Estructuras de datos avanzadas: Casos de uso reales
Software Guru
 
Building bias-aware environments
Building bias-aware environmentsBuilding bias-aware environments
Building bias-aware environments
Software Guru
 
El secreto para ser un desarrollador Senior
El secreto para ser un desarrollador SeniorEl secreto para ser un desarrollador Senior
El secreto para ser un desarrollador Senior
Software Guru
 
Cómo encontrar el trabajo remoto ideal
Cómo encontrar el trabajo remoto idealCómo encontrar el trabajo remoto ideal
Cómo encontrar el trabajo remoto ideal
Software Guru
 
Automatizando ideas con Apache Airflow
Automatizando ideas con Apache AirflowAutomatizando ideas con Apache Airflow
Automatizando ideas con Apache Airflow
Software Guru
 
How thick data can improve big data analysis for business:
How thick data can improve big data analysis for business:How thick data can improve big data analysis for business:
How thick data can improve big data analysis for business:
Software Guru
 
Introducción al machine learning
Introducción al machine learningIntroducción al machine learning
Introducción al machine learning
Software Guru
 
Democratizando el uso de CoDi
Democratizando el uso de CoDiDemocratizando el uso de CoDi
Democratizando el uso de CoDi
Software Guru
 
Gestionando la felicidad de los equipos con Management 3.0
Gestionando la felicidad de los equipos con Management 3.0Gestionando la felicidad de los equipos con Management 3.0
Gestionando la felicidad de los equipos con Management 3.0
Software Guru
 
Taller: Creación de Componentes Web re-usables con StencilJS
Taller: Creación de Componentes Web re-usables con StencilJSTaller: Creación de Componentes Web re-usables con StencilJS
Taller: Creación de Componentes Web re-usables con StencilJS
Software Guru
 
El camino del full stack developer (o como hacemos en SERTI para que no solo ...
El camino del full stack developer (o como hacemos en SERTI para que no solo ...El camino del full stack developer (o como hacemos en SERTI para que no solo ...
El camino del full stack developer (o como hacemos en SERTI para que no solo ...
Software Guru
 
¿Qué significa ser un programador en Bitso?
¿Qué significa ser un programador en Bitso?¿Qué significa ser un programador en Bitso?
¿Qué significa ser un programador en Bitso?
Software Guru
 
Colaboración efectiva entre desarrolladores del cliente y tu equipo.
Colaboración efectiva entre desarrolladores del cliente y tu equipo.Colaboración efectiva entre desarrolladores del cliente y tu equipo.
Colaboración efectiva entre desarrolladores del cliente y tu equipo.
Software Guru
 
Pruebas de integración con Docker en Azure DevOps
Pruebas de integración con Docker en Azure DevOpsPruebas de integración con Docker en Azure DevOps
Pruebas de integración con Docker en Azure DevOps
Software Guru
 
Elixir + Elm: Usando lenguajes funcionales en servicios productivos
Elixir + Elm: Usando lenguajes funcionales en servicios productivosElixir + Elm: Usando lenguajes funcionales en servicios productivos
Elixir + Elm: Usando lenguajes funcionales en servicios productivos
Software Guru
 
Así publicamos las apps de Spotify sin stress
Así publicamos las apps de Spotify sin stressAsí publicamos las apps de Spotify sin stress
Así publicamos las apps de Spotify sin stress
Software Guru
 
Achieving Your Goals: 5 Tips to successfully achieve your goals
Achieving Your Goals: 5 Tips to successfully achieve your goalsAchieving Your Goals: 5 Tips to successfully achieve your goals
Achieving Your Goals: 5 Tips to successfully achieve your goals
Software Guru
 
Acciones de comunidades tech en tiempos del Covid19
Acciones de comunidades tech en tiempos del Covid19Acciones de comunidades tech en tiempos del Covid19
Acciones de comunidades tech en tiempos del Covid19
Software Guru
 
De lo operativo a lo estratégico: un modelo de management de diseño
De lo operativo a lo estratégico: un modelo de management de diseñoDe lo operativo a lo estratégico: un modelo de management de diseño
De lo operativo a lo estratégico: un modelo de management de diseño
Software Guru
 

More from Software Guru (20)

Hola Mundo del Internet de las Cosas
Hola Mundo del Internet de las CosasHola Mundo del Internet de las Cosas
Hola Mundo del Internet de las Cosas
 
Estructuras de datos avanzadas: Casos de uso reales
Estructuras de datos avanzadas: Casos de uso realesEstructuras de datos avanzadas: Casos de uso reales
Estructuras de datos avanzadas: Casos de uso reales
 
Building bias-aware environments
Building bias-aware environmentsBuilding bias-aware environments
Building bias-aware environments
 
El secreto para ser un desarrollador Senior
El secreto para ser un desarrollador SeniorEl secreto para ser un desarrollador Senior
El secreto para ser un desarrollador Senior
 
Cómo encontrar el trabajo remoto ideal
Cómo encontrar el trabajo remoto idealCómo encontrar el trabajo remoto ideal
Cómo encontrar el trabajo remoto ideal
 
Automatizando ideas con Apache Airflow
Automatizando ideas con Apache AirflowAutomatizando ideas con Apache Airflow
Automatizando ideas con Apache Airflow
 
How thick data can improve big data analysis for business:
How thick data can improve big data analysis for business:How thick data can improve big data analysis for business:
How thick data can improve big data analysis for business:
 
Introducción al machine learning
Introducción al machine learningIntroducción al machine learning
Introducción al machine learning
 
Democratizando el uso de CoDi
Democratizando el uso de CoDiDemocratizando el uso de CoDi
Democratizando el uso de CoDi
 
Gestionando la felicidad de los equipos con Management 3.0
Gestionando la felicidad de los equipos con Management 3.0Gestionando la felicidad de los equipos con Management 3.0
Gestionando la felicidad de los equipos con Management 3.0
 
Taller: Creación de Componentes Web re-usables con StencilJS
Taller: Creación de Componentes Web re-usables con StencilJSTaller: Creación de Componentes Web re-usables con StencilJS
Taller: Creación de Componentes Web re-usables con StencilJS
 
El camino del full stack developer (o como hacemos en SERTI para que no solo ...
El camino del full stack developer (o como hacemos en SERTI para que no solo ...El camino del full stack developer (o como hacemos en SERTI para que no solo ...
El camino del full stack developer (o como hacemos en SERTI para que no solo ...
 
¿Qué significa ser un programador en Bitso?
¿Qué significa ser un programador en Bitso?¿Qué significa ser un programador en Bitso?
¿Qué significa ser un programador en Bitso?
 
Colaboración efectiva entre desarrolladores del cliente y tu equipo.
Colaboración efectiva entre desarrolladores del cliente y tu equipo.Colaboración efectiva entre desarrolladores del cliente y tu equipo.
Colaboración efectiva entre desarrolladores del cliente y tu equipo.
 
Pruebas de integración con Docker en Azure DevOps
Pruebas de integración con Docker en Azure DevOpsPruebas de integración con Docker en Azure DevOps
Pruebas de integración con Docker en Azure DevOps
 
Elixir + Elm: Usando lenguajes funcionales en servicios productivos
Elixir + Elm: Usando lenguajes funcionales en servicios productivosElixir + Elm: Usando lenguajes funcionales en servicios productivos
Elixir + Elm: Usando lenguajes funcionales en servicios productivos
 
Así publicamos las apps de Spotify sin stress
Así publicamos las apps de Spotify sin stressAsí publicamos las apps de Spotify sin stress
Así publicamos las apps de Spotify sin stress
 
Achieving Your Goals: 5 Tips to successfully achieve your goals
Achieving Your Goals: 5 Tips to successfully achieve your goalsAchieving Your Goals: 5 Tips to successfully achieve your goals
Achieving Your Goals: 5 Tips to successfully achieve your goals
 
Acciones de comunidades tech en tiempos del Covid19
Acciones de comunidades tech en tiempos del Covid19Acciones de comunidades tech en tiempos del Covid19
Acciones de comunidades tech en tiempos del Covid19
 
De lo operativo a lo estratégico: un modelo de management de diseño
De lo operativo a lo estratégico: un modelo de management de diseñoDe lo operativo a lo estratégico: un modelo de management de diseño
De lo operativo a lo estratégico: un modelo de management de diseño
 

Recently uploaded

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Criptografía cuántica - fundamentos, productos y empresas

  • 1.
  • 2. Quantum Cryptography: Quantum cryptography: foundations, products and companies Salvador E. Venegas-Andraca Tecnol´ogico de Monterrey, Escuela de Ingenier´ıa y Ciencias Qualtop, SA de CV Software Gur´u Virtual Conference 2017 24 May 2017
  • 3. Quantum Cryptography: Thanks Table of Contents 1 Thanks 2 Quantum Computation and Quantum Information 3 Mathematics for quantum cryptography 4 Cryptography 5 Business
  • 4. Quantum Cryptography: Thanks My warmest thanks to Software Gur´u CONACyT - Fronteras de la Ciencia and SNI Tecnol´ogico de Monterrey Qualtop
  • 5. Quantum Cryptography: Quantum Computation and Quantum Information Table of Contents 1 Thanks 2 Quantum Computation and Quantum Information 3 Mathematics for quantum cryptography 4 Cryptography 5 Business
  • 6. Quantum Cryptography: Quantum Computation and Quantum Information Quantum computation and quantum information Quantum computation and quantum information are scientific and engineering disciplines devoted to the development of i) Quantum algorithms. ii) Quantum information processing protocols and devices.
  • 7. Quantum Cryptography: Quantum Computation and Quantum Information Quantum computation and quantum information Some key results in quantum computation and quantum infor- mation include the discovery of Quantum teleportation, which consists of transmitting quantum information (originally contained in a qubit) via a quantum channel. Quantum dense coding, which allows sending two classical bits using only one qubit. quantum cryptography, which allows coding using quantum systems.
  • 8. Quantum Cryptography: Quantum Computation and Quantum Information Quantum Cryptography Quantum cryptography is a robust field of science and engineer- ing that has evolved in an emergent high-tech market with com- panies capable of delivering off-the-shelf products. Quantum cryptography protocols can be categorized into Quantum key distribution protocols (QKD). Quantum secret sharing protocols (QSS). Quantum secure direct communication protocols (QSDC). Deterministic secure quantum communication protocols (DSQC).
  • 9. Quantum Cryptography: Quantum Computation and Quantum Information Quantum Cryptography Let us now provide a succinct introduction to some fundamental concepts of quantum computation needed to formally describe quantum cryptography protocols.
  • 10. Quantum Cryptography: Mathematics for quantum cryptography Table of Contents 1 Thanks 2 Quantum Computation and Quantum Information 3 Mathematics for quantum cryptography 4 Cryptography 5 Business
  • 11. Quantum Cryptography: Mathematics for quantum cryptography A question: what is quantum computation? Quantum Computation = Quantum Mechanics + Computer Science Quantum Mechanics: a set of physical laws that describe the behaviour of atomic and subatomic phenomena. Computer science: branch of mathematics divided into automata theory, computability theory and complexity theory.
  • 12. Quantum Cryptography: Mathematics for quantum cryptography A question: what is quantum computation? Quantum computation, one of the most recent joint ventures be- tween physics and computer science, may be defined as follows: Quantum Computation is a multidisciplinary field focused on the development of computers and algorithms, i.e. hardware and software, based on the quantum mechanical properties of Nature.
  • 13. Quantum Cryptography: Mathematics for quantum cryptography Bits and Qubits In classical computation, information is stored and manipulated in the form of bits. The mathematical structure of a classical bit is rather simple: it suffices to define two logical values, traditionally labelled as {0, 1} (i.e. a classical bit lives in a scalar space) and to relate those values to two different and mutually exclusive outcomes of a classical measurement.
  • 14. Quantum Cryptography: Mathematics for quantum cryptography Bits and Qubits In quantum computation, information is stored, manipulated and measured in the form of qubits (= quantum bit). A qubit is a physical entity described by the laws of quantum mechanics.
  • 15. Quantum Cryptography: Mathematics for quantum cryptography Bits and Qubits Remember: – R2, the two-dimensional space studied in elementary school. Elements of R2, denoted by ˛x, are vectors. – Any vector ˛x = (a, b) can be written as a linear combination of a basis, e.g. ˛x = (a, b) = ˛x = (a, b) = aˆı + bˆä
  • 16. Quantum Cryptography: Mathematics for quantum cryptography Bits and Qubits In quantum computation, we use the following notation for denoting vectors: ˛x = |xÍ So, ˛x = aˆı + bˆä … |xÍ = a|iÍ + b|jÍ
  • 17. Quantum Cryptography: Mathematics for quantum cryptography Bits and Qubits A qubit is a unit vector in a two-dimensional complex space |ÂÍ œ C2
  • 18. Quantum Cryptography: Mathematics for quantum cryptography Bits and Qubits A qubit |ÂÍ may be written in general form as |ÂÍ = –|pÍ + —|qÍ where –, — œ C, |–|2 +|—|2 = 1 and {|pÍ, |qÍ} is an arbitrary basis spanning C2. Note that a most important consequence of the vectorial nature of a qubit is the possibility of writing it as a linear combination of elements of any basis.
  • 19. Quantum Cryptography: Mathematics for quantum cryptography The choice of {|pÍ, |qÍ} is often the orthonormal basis {|0Í, |1Í} known as the computational basis.
  • 20. Quantum Cryptography: Mathematics for quantum cryptography In addition to the computational basis {|0Í, |1Í}, it is customary in quantum cryptography protocols to use the diagonal basis {|+Í, |≠Í}
  • 21. Quantum Cryptography: Cryptography Table of Contents 1 Thanks 2 Quantum Computation and Quantum Information 3 Mathematics for quantum cryptography 4 Cryptography 5 Business
  • 22. Quantum Cryptography: Cryptography Intro to cryptography Cryptography is the branch of science and engineering devoted to the design and implementation of techniques for secure com- munication, under the assumption that a third party is interested in reading our messages.
  • 23. Quantum Cryptography: Cryptography Symmetric/Asymmetric key cryptosystems Modern cryptography has two types of encryption: symmetric key and asymmetric key cryptosystems. Let us briefly describe each type.
  • 24. Quantum Cryptography: Cryptography Symmetric key cryptosystems Symmetric key cryptosystems, also known as private key cryptosystems, are encryption algorithms that use a single key for both encryption and decryption of the ciphertext. In this field, algorithms for encryption and decryption are known while the key must remain private, i.e. secret.
  • 25. Quantum Cryptography: Cryptography Asymmetric key cryptosystems Asymmetric key cryptosystems use two keys: a public key and a private key, the public key is used for encryption and the private key for decryption. These cryptosystems work under the rationale of a safe with two keys: the key to lock the safe is known by everybody but the key for opening is available to only one person.
  • 26. Quantum Cryptography: Cryptography Private key cryptosystems Private key cryptosystems can be very powerful. For example, The cryptosystem known as the one-time pad can be proved to be perfectly secured as long as the key is truly random, the length of the key is equal to the size of the message and the key is only used once. Other private key cryptosystems include the Data Encryp- tion Standard (DES) and the Advanced Encryption Stan- dard.
  • 27. Quantum Cryptography: Cryptography Key distribution One of the most sensible issues with private key cryptosystems is safe key distribution, i.e., the process of establishing a private key between two users who cannot use a perfectly secure communication channel. The issue is the fact that, if the channel used to distribute a private key is governed by the laws of classical physics, then in principle any (classical) key can be passively eavesdropped, i.e. without users becoming aware of this vulnerability.
  • 28. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution In 1984, Charles Bennett and Gilles Brassard proposed a quan- tum key distribution protocol known as BB84. The key idea of BB84 is to produce a key by encoding bits in qubits that are taken from a set composed by the union of the computational and diagonal bases, i.e., a set of four non-orthogonal quantum states.
  • 29. Quantum Cryptography: Cryptography BB84 Quantum Key distribution Let us suppose the following setting: - Alice and Bob want to create a key for encoding a message. - The key, to be shared by Alice and Bob, must be random and secret. - There is a third character: Eve, an eavesdropper. - The conflict in this story is: Alice and Bob’s key need their key to be secret and Eve will do anything in her power to reveal at least some portions of the key.
  • 30. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution - The purpose of BB84 is to produce a key, i.e. actual encoded data transmission is not part of the BB84. - Hereinafter, we assume that: a) Alice has access to a source of individual photons, the exper- imental equipment and expertise to manipulate the polarization of her photons, and a source of random bits. b) There is a channel available to Alice and Bob that they can use to send quantum states (e.g. an optical fiber.) c) Bob has the experimental facilities and expertise required to measure quantum states using different bases. d) Alice and Bob have a classical channel (e.g. a telephone line) that may or may not be a secure line, it doesn’t matter.
  • 31. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution The BB84 protocol is composed of the following steps: 1. Alice starts by generating two sets of random bits A = {a1, a2, . . . an} and B = {b1, b2, . . . bn}
  • 32. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution 2. Alice uses the set of random bits A to select the vector basis with which she will prepare the initial polarization state of her photons, according to the following criterion: Alice will read one bit at a time from set A and, depending on her reading (either 0 or 1), she will choose the computational basis (+) or the diagonal basis (◊) to prepare her photons. In computational terms, this step would be more or less equivalent to variable initialization.
  • 33. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution For instance, let us suppose that A = {0, 1, 0, 0, 1, 0, 1, 1, 1, 0} and that Alice has chosen the following criterion: if 0 then use the computational basis; if 1 then use the diagonal basis. Then, Alice would initialize her qubits using the following list: (+, ◊, +, +, ◊, +, ◊, ◊, ◊, +).
  • 34. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution 3. Now, Alice must randomly choose one vector from each basis to prepare the polarization initial state of each photon. To do so, Alice will use the elements of set B according to the following function: initial polarization state = Y _____] _____[ |0Í (or |1Í) if (+,0) |1Í( or |0Í) if (+,1) |+Í( or |≠Í) if (◊,0) |≠Í( or |+Í) if (◊,1)
  • 35. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution 4. Alice sends her qubit sequence to Bob via the quantum chan- nel they both have access to. This step is Eve’s chance to extract information from the quantum channel.
  • 36. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution The KEY point to remember here is the following: – Extracting information from a quantum system (e.g. a pho- ton) makes irreversible changes in the actual information contained in the quantum system. – This is due to a truly exotic property of quantum mechan- ics: measuring a quantum system is a probabilistic process that changes the state of the quantum system.
  • 37. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution Measuring a quantum system is equivalent to projecting (as in analytical geometry) a vector onto a vector basis.
  • 38. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution So, if Eve is eavesdropping, she will change the contents of any qubits and that is the footprint that we need in order to detect her presence!
  • 39. Quantum Cryptography: Cryptography BB84 - Quantum Key distribution Table: Example of the BB84 protocol in action Alice’s bits 1 1 0 1 0 0 1 1 1 0 0 1 Alice’s bases + + ◊ + ◊ + ◊ + ◊ + ◊ ◊ Alice’s qubits |0Í |0Í |+Í |0Í |+Í |1Í |≠Í |0Í |≠Í |1Í |+Í |≠Í Eve’s bases + ◊ + + ◊ ◊ + ◊ + + + + Eve’s measurements |0Í |+Í |1Í |0Í |+Í |0Í |0Í |+Í |1Í |1Í |1Í |0Í Bob’s bases ◊ + + + ◊ ◊ ◊ + + + + ◊ Bob’s measurements |+Í |0Í |1Í |0Í |+Í |≠Í |+Í |1Í |1Í |1Í |1Í |+Í Bob’s bits 1 1 0 1 0 1 0 0 0 0 0 0 Selection • • • • • • •
  • 40. Quantum Cryptography: Business Table of Contents 1 Thanks 2 Quantum Computation and Quantum Information 3 Mathematics for quantum cryptography 4 Cryptography 5 Business