SlideShare a Scribd company logo
101010000111100……..
New Dawn of Security in
Telecommunications: Quantum
Cryptography
Presented By: Mayssaa El Rifai
Bhagyashri Arun Darunkar
University of Oklahoma, Tulsa
101010000111100……..
Introduction: Need for secure
communication
Wide spread
availability of
information through
Internet
Keeping data safe
from an unintended
user
Mobility of data
because of cloud
Protecting privacy on
the Internet cloud
Global corporates with
multiple locations
Communicating
confidential data over
optical network
Secure communication
between data servers
Email and workplace
application data
security
Dependence of World’s
economy on
‘Information’
The growth in
information is
relentless -Moore’s
Law
Volume of
information from the
beginning until 2003
is generated in just
two days now*
*Ref: —Milner, Newsweek, Oct. 10, 2011
2
101010000111100……..
Timeline of Secure Communication
Ancient
methods Mathematical cryptography
• Symmetric
• Asymmetric
Quantum
Cryptography
introduced
• Weisner 1970
Quantum key
distribution
•BB84
•Three-stage protocol
Quantum data
Communication
3
101010000111100……..
Why Quantum Cryptography?
• Quantum Cryptography was first proposed in 1970
• The first protocol in quantum cryptography was proposed in a paper published in
1984 by Bennett and Brassard (BB84)
• The basics of the quantum cryptography rest on two main principles
The Heisenberg uncertainty principle
The no-cloning theorem
4
101010000111100……..
Protocols
The BB’84 protocol
The Three-stage protocol
The Three-stage protocol
using four variables
The Single-stage protocol
5
101010000111100……..
Limitations of BB’84
6
Single photon
requirement
Data rateDistance
Limitations
Solution
USE MULTI-PHOTON TOLERANT QUANTUM SECURE PROTOCOL
101010000111100……..
The Three-stage Protocol:
Idea
ALICE BOB
ALICE BOB
Information
Information
Information
Information
7
101010000111100……..
The Three-Stage Protocol: Science
Proposed by Dr. Kak in 2006
X
UA
X
UB
8
101010000111100……..
The Single-stage protocol
Alice and Bob make use of this shared information to form new key by using concept of
braiding
ALICE BOBInformation
Information
Variation in Dr. Kak’s protocol, proposed by James Thomas
Assumption Prerequisite
9
101010000111100……..
Summary
10
Current Cryptography protocols are based on mathematical assumptions and
can be broken with quantum computers
Quantum cryptographic techniques are associated with many limitations
Multi-photon tolerant protocols present a better candidate for future
quantum communication system
101010000111100……..
Thank You
Any Questions?
11
101010000111100……..
Contact Details
Bhagyashri Darunkar Email: Bhagyashri@ou.edu
Mayssaa El Rifai Email: mayssaa@ou.edu
12

More Related Content

Similar to New Dawn of Security in Telecommunications: Quantum Cryptography

AUTOMATIC DOOR LOCK SYSTEM
AUTOMATIC DOOR LOCK SYSTEMAUTOMATIC DOOR LOCK SYSTEM
AUTOMATIC DOOR LOCK SYSTEM
Angie Miller
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyAmmar Rahman
 
BME 307 - HEALTH MANAGEMENT INFORMATION SYSTEM - Computer Networks -F. Sukums...
BME 307 - HEALTH MANAGEMENT INFORMATION SYSTEM - Computer Networks -F. Sukums...BME 307 - HEALTH MANAGEMENT INFORMATION SYSTEM - Computer Networks -F. Sukums...
BME 307 - HEALTH MANAGEMENT INFORMATION SYSTEM - Computer Networks -F. Sukums...
edwardlowassa1
 
Copy of saitejabaddam07
Copy of saitejabaddam07Copy of saitejabaddam07
Copy of saitejabaddam07
Saitheja Reddy
 
Information Technology its components.pptx
Information Technology its components.pptxInformation Technology its components.pptx
Information Technology its components.pptx
DrIrfanulHaqAkhoon
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computing
Balakumar232
 
Nerd Available.pdf
Nerd Available.pdfNerd Available.pdf
Nerd Available.pdf
ShaikhBilal24
 
Final ppt wireless
Final ppt wirelessFinal ppt wireless
Final ppt wireless
Prachi Patki
 
office communication
office communicationoffice communication
office communication
Utkarsh Bisht
 
Introduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdfIntroduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdf
EIHEducation
 
MIS_Session05.pptx
MIS_Session05.pptxMIS_Session05.pptx
MIS_Session05.pptx
AfricaRealInformatic
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
Uc Man
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
Uc Man
 
The three safety measures that are critical to WLANS are as below..pdf
The three safety measures that are critical to WLANS are as below..pdfThe three safety measures that are critical to WLANS are as below..pdf
The three safety measures that are critical to WLANS are as below..pdf
annamalaiagencies
 
Cryptography
CryptographyCryptography
Cryptography
Arjun Shukla
 
Introduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdfIntroduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdf
EIHEducation
 
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSSURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
ijasuc
 
presentation Optic fiver cable
presentation Optic fiver cablepresentation Optic fiver cable
presentation Optic fiver cable
zakariasowrav
 
Introduction to Quantum Networking.pdf
Introduction to Quantum Networking.pdfIntroduction to Quantum Networking.pdf
Introduction to Quantum Networking.pdf
EIHEducation
 

Similar to New Dawn of Security in Telecommunications: Quantum Cryptography (20)

AUTOMATIC DOOR LOCK SYSTEM
AUTOMATIC DOOR LOCK SYSTEMAUTOMATIC DOOR LOCK SYSTEM
AUTOMATIC DOOR LOCK SYSTEM
 
Introduction of Computer Networking Technoloy
Introduction of Computer Networking TechnoloyIntroduction of Computer Networking Technoloy
Introduction of Computer Networking Technoloy
 
BME 307 - HEALTH MANAGEMENT INFORMATION SYSTEM - Computer Networks -F. Sukums...
BME 307 - HEALTH MANAGEMENT INFORMATION SYSTEM - Computer Networks -F. Sukums...BME 307 - HEALTH MANAGEMENT INFORMATION SYSTEM - Computer Networks -F. Sukums...
BME 307 - HEALTH MANAGEMENT INFORMATION SYSTEM - Computer Networks -F. Sukums...
 
Copy of saitejabaddam07
Copy of saitejabaddam07Copy of saitejabaddam07
Copy of saitejabaddam07
 
Information Technology its components.pptx
Information Technology its components.pptxInformation Technology its components.pptx
Information Technology its components.pptx
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computing
 
Nerd Available.pdf
Nerd Available.pdfNerd Available.pdf
Nerd Available.pdf
 
Final ppt wireless
Final ppt wirelessFinal ppt wireless
Final ppt wireless
 
office communication
office communicationoffice communication
office communication
 
Introduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdfIntroduction to Quantum Networking 1.pdf
Introduction to Quantum Networking 1.pdf
 
MIS_Session05.pptx
MIS_Session05.pptxMIS_Session05.pptx
MIS_Session05.pptx
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
Encryption & interception of communication
Encryption & interception of communicationEncryption & interception of communication
Encryption & interception of communication
 
The three safety measures that are critical to WLANS are as below..pdf
The three safety measures that are critical to WLANS are as below..pdfThe three safety measures that are critical to WLANS are as below..pdf
The three safety measures that are critical to WLANS are as below..pdf
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdfIntroduction to Quantum Networking 2.pdf
Introduction to Quantum Networking 2.pdf
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSSURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
 
presentation Optic fiver cable
presentation Optic fiver cablepresentation Optic fiver cable
presentation Optic fiver cable
 
Introduction to Quantum Networking.pdf
Introduction to Quantum Networking.pdfIntroduction to Quantum Networking.pdf
Introduction to Quantum Networking.pdf
 

More from Society of Women Engineers

Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2
Society of Women Engineers
 
Opening keynote
Opening keynoteOpening keynote
Moonshot rodriguez slides
Moonshot rodriguez slidesMoonshot rodriguez slides
Moonshot rodriguez slides
Society of Women Engineers
 
Moonshot fetch slides
Moonshot fetch slidesMoonshot fetch slides
Moonshot fetch slides
Society of Women Engineers
 
H ivs ai_wehr_slides
H ivs ai_wehr_slidesH ivs ai_wehr_slides
H ivs ai_wehr_slides
Society of Women Engineers
 
H ivs ai_faust_slides
H ivs ai_faust_slidesH ivs ai_faust_slides
H ivs ai_faust_slides
Society of Women Engineers
 
H ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slidesH ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slides
Society of Women Engineers
 
Closing keynote
Closing keynoteClosing keynote
Ball d 8
Ball d 8Ball d 8
Ball d 7
Ball d 7Ball d 7
Ball d 6
Ball d 6Ball d 6
Ball d 4
Ball d 4Ball d 4
How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations
Society of Women Engineers
 
How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team
Society of Women Engineers
 
Using SWE to Complement your Career
Using SWE to Complement your Career Using SWE to Complement your Career
Using SWE to Complement your Career
Society of Women Engineers
 
How to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE LeaderHow to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE Leader
Society of Women Engineers
 
18 cd 32
18 cd 3218 cd 32
How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!
Society of Women Engineers
 
The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)
Society of Women Engineers
 
Beyond Disruption
Beyond Disruption Beyond Disruption
Beyond Disruption
Society of Women Engineers
 

More from Society of Women Engineers (20)

Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2Schneider electric overview laurie addisonlavelle_2
Schneider electric overview laurie addisonlavelle_2
 
Opening keynote
Opening keynoteOpening keynote
Opening keynote
 
Moonshot rodriguez slides
Moonshot rodriguez slidesMoonshot rodriguez slides
Moonshot rodriguez slides
 
Moonshot fetch slides
Moonshot fetch slidesMoonshot fetch slides
Moonshot fetch slides
 
H ivs ai_wehr_slides
H ivs ai_wehr_slidesH ivs ai_wehr_slides
H ivs ai_wehr_slides
 
H ivs ai_faust_slides
H ivs ai_faust_slidesH ivs ai_faust_slides
H ivs ai_faust_slides
 
H ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slidesH ivs ai_bestelmeyer_slides
H ivs ai_bestelmeyer_slides
 
Closing keynote
Closing keynoteClosing keynote
Closing keynote
 
Ball d 8
Ball d 8Ball d 8
Ball d 8
 
Ball d 7
Ball d 7Ball d 7
Ball d 7
 
Ball d 6
Ball d 6Ball d 6
Ball d 6
 
Ball d 4
Ball d 4Ball d 4
Ball d 4
 
How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations How to Develop Your Section's Corporate Relations
How to Develop Your Section's Corporate Relations
 
How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team How to Find Your Section's Next Officer Team
How to Find Your Section's Next Officer Team
 
Using SWE to Complement your Career
Using SWE to Complement your Career Using SWE to Complement your Career
Using SWE to Complement your Career
 
How to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE LeaderHow to Have a Difficult Conversation with an Underperforming SWE Leader
How to Have a Difficult Conversation with an Underperforming SWE Leader
 
18 cd 32
18 cd 3218 cd 32
18 cd 32
 
How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!How to Get the Most out of your LCC Coach!
How to Get the Most out of your LCC Coach!
 
The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)The Mars Ice Challenge (RASC-AL)
The Mars Ice Challenge (RASC-AL)
 
Beyond Disruption
Beyond Disruption Beyond Disruption
Beyond Disruption
 

Recently uploaded

Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 

Recently uploaded (20)

Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 

New Dawn of Security in Telecommunications: Quantum Cryptography

Editor's Notes

  1. To overcome the limitations associated with single photons in BB84, a three stage protocol was proposed in 2006 by Dr Kak. The orthogonal state X can be any of the pure states 0 or 1 or a superposition of those. The secret transform used are real values and commutative for every angle. The function description of the protocol is as shown in diagram here Alice applies her unitary transform on first leg and send it to Bob. Bob applied his transform and send it to Alice then Alice will remove her transform and when Bob removes his transform, he has the information.