Your SlideShare is downloading.
×

×

Saving this for later?
Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.

Text the download link to your phone

Standard text messaging rates apply

Like this presentation? Why not share!

- Quantam cryptogrphy ppt (1) by deepu427 5468 views
- Quantum cryptography by Priya Winsome 2604 views
- Quantum Cryptography by Asert Seminar 2401 views
- Quantum Cryptography by Bise Mond 3679 views
- Quantum Cryptography by pixiejen 986 views
- The security of quantum cryptography by wtyru1989 1308 views
- Quantum cryptography by Himanshu Shekhar 486 views
- Quantum computer ppt by Nisarg Bhagavanta... 10978 views
- Quantum Computers by Deepti.B 8114 views
- Quantum cryptography a modern crypt... by Kamal Diwakar 541 views
- Introduction to Quantum Cryptography by Darwin Gosal 655 views
- Quantum Cryptography and Possible A... by Arinto Murdopo 1422 views

Like this? Share it with your network
Share

No Downloads

Total Views

3,426

On Slideshare

0

From Embeds

0

Number of Embeds

0

Shares

0

Downloads

408

Comments

0

Likes

4

No embeds

No notes for slide

- 1. Quantum Cryptography Presented By Sukhdeep Kaur Roll No. 5266 BCA Final
- 2. Quantum Cryptography
- 3. INTRODUCTION Quantum cryptography , or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages
- 4. FLOW OF SEMINAR HISTORY APPROACHES INFORMATION RECONCILATION PRIVACY AMPLIFICATION ADVANTAGES ATTACKS FUTURE SCOPE (PROSPECTS) QUANTUM CRYPTOGRAPHY RESEARCH GROUP COMPANIES WITH RESEARCH PROGRAM
- 5. TERMS PHOTON :--It is the elementry particle responsible for electromagnetic phenomena.It is the carrier of electromagnetic radiations. QUANTUM ENTANGLEMENT :--It is a physical resource like energy.It can be measured,transformed and purified.
- 6. HISTORY In the early 1970 Stephen Wiesner , firstly introduced the concept of quantum conjugate coding in New York. His seminal paper titled &quot;Conjugate Coding&quot; was rejected by IEEE Information Theory but was eventually published in 1983 in SIGACT News (15:1 pp. 78-88, 1983). A decade later, Charles H. Bennett , of the IBM Thomas J. Watson Research Center , and Gilles Brassard , of the Université de Montréal, proposed a method for secure communication based on Wiesner’s “conjugate observables”. In 1990, Artur Ekert , then a Ph.D. student of Oxford University , developed a different approach to quantum cryptography known as quantum entanglement.
- 7. APPROACHES Quantum cryptographic follows two type of Quantum cryptographic protocol. Polarized photons Entangled photons
- 8. INFORMATION RECONCILATION Information reconciliation is a form of error correction carried out between Alice and Bob's keys,(to ensure both keys are identical). It is conducted over the public channel. It is vital to minimise the information sent about each key( as this can be read by Eve). A common protocol used is cascade protocol , proposed in 1994
- 9. PRIVACY AMPLIFICATION Privacy Amplification is a method for reducing (and effectively eliminating) Eve's partial information about Alice and Bob's key. This partial information could have been gained both by eavesdropping on the quantum channel during key transmission (thus introducing detectable errors), and on the public channel during information reconciliation (where it is assumed Eve gains all possible parity information). Privacy amplification uses Alice and Bob's key to produce a new, shorter key, in such a way that Eve has only negligible information about the new key.
- 10. ADVANTAGES IT MAKES POSSIBLE TO PERFORM A 2-ION OPERATION ON IONS THAT ARE NOT CLOSE TO ONE ANOTHER. IT INCREASES THE COMPUTER’S ERROR THRESHOLD WHICH MEANS COMPUTERS WOULD BE EASIER TO MAKE. STATE OF AN ION CAN BE STORED FOR A LONG TIME. THIS PROCESS IS RELIABLE AND THE STATE THAT HAS BEEN TELEPORTED IS AVAILABLE FOR ANOTHER ROUND OF INFORMATION PROCESSING.
- 11. ATTACKS In Quantum Cryptography, traditional man-in-the-middle attacks are impossible due to the Observer Effect . If Alice and Bob are using an entangled photon system, then it is virtually impossible to hijack these, because creating three entangled photons would decrease the strength of each photon to such a degree that it would be easily detected.
- 12. FUTURE SCOPE (PROSPECTS) The experiments suggests transmission to satellites is possible, due to the lower atmospheric density at higher altitudes. The current commercial systems are aimed mainly at governments and corporations with high security requirements. Factors preventing wide adoption of quantum cryptography outside high security areas include the cost of equipment, and the lack of a demonstrated threat to existing key exchange protocols.
- 13. QUANTUM CRYPTOGRAPHY RESEARCH GROUP Experimental Quantum Cryptography with Entangled Photons NIST Quantum Information Networks
- 14. COMPANIES WITH RESEARCH PROGRAM Toshiba HP IBM Mitsubishi NEC NTT
- 15. Thank you

Be the first to comment