SlideShare a Scribd company logo
1 of 22
QUANTUM SECURED
--------------------------------
-------
BLOCKCHAIN
Presented By:-Ravi Sahal
INTRODUCTION
• Blockchain is a distributed database which is
cryptographically protected against malicious modifications.
• Rely on digital signatures, which are vulnerable to attacks by
means of quantum computers.
• Cryptographic hash functions are used in preparing new
blocks.
• Here we propose a possible solution to the quantum-era
blockchain challenge and report an experimental realization
of a quantum-safe blockchain platform that utilizes quantum
key distribution across an urban fiber network for information-
theoretically secure authentication.
Paper Name Publication House
and year
Description
1. Quantum-secured
blockchain
IEEE
2018
A possible solution to the
quantum-era blockchain
challenge and report an
experimental realization of a
quantum-safe blockchain
platform that utilizes quantum
key distribution across an urban
fibre network
2. Quantum Blockchain Using
Entanglement in Time
RESEARCH GATE
2017
Brief description of quantum
blockchain using entanglement
is given and used.
Literature Survey
“Blocks” on the blockchain are made up of digital pieces of information. Specifically, they have three parts:
1. Blocks store information about transactions, say the date, time, and dollar amount of your most recent
purchase from Amazon.
2. Instead of using your actual name, your purchase is recorded without any identifying information using a unique
“digital signature,” sort of like a username.
3. Each block stores a unique code called a “hash” that allows us to tell it apart from every other block. Let’s say
you made your splurge purchase on Amazon, but while it’s in transit, you decide you just can’t resist and need
a second one. Even though the details of your new transaction would look nearly identical to your earlier
purchase, we can still tell the blocks apart because of their unique codes.
Working of Blockchain
Information Stored In Blockchain…
• After a block has been added to the end of the blockchain, it is very difficult to go back and alter
the contents of the block. That’s because each block contains its own hash, along with the hash
of the block before it. Hash codes are created by a math function that turns digital information
into a string of numbers and letters. If that information is edited in any way, the hash code
changes as well.
• In order to change a single block, then, a hacker would need to change every single block after it
blockchain. Recalculating all those hashes would take an enormous and improbable amount of
computing power. In other words, once a block is added to the blockchain it becomes very
edit and impossible to delete.
Blockchain Security
Application Of Blockchain
Limitations of Blockchain
Quantum Computation
Rather than store information using bits
represented by 0s or 1s as conventional
digital computers do, quantum computers
use quantum bits, or qubits, to encode
information as 0s, 1s, or both at the same
time. This superposition of states-along
with the other quantum mechanical
phenomena of entanglement and
tunnelling-enables quantum computers to
manipulate enormous combinations of
states at once.
Application Of Quantum Computers
Working of Blockchain
How Quantum Computers Attack Blockchain
• Quantum Computers now-a-days are majorly used by trained professional hackers For
preforming some unwise deeds.
• Using Quantum Computers they directly attack the Blockchain Database, This is mainly
performed by stealing the encrypted private Key.
• For Example if we consider a Client and a Server. The Server upon connection sends a
public key to the client to transport the encrypted data. The client sends the encrypted
data to the Server, which the Server decrypts using its Private Key.
• The hacker tries millions of different combination of keys to try to Encrypt the data
and then can access the data and make changes to It on his will.
• A possible attack scenario is as follows: a malicious
party equipped with a quantum computer works o-line
to forge the database.
• It changes one of the past transaction records to its
benefit and performs a search for a variant of other
transactions within the same block such that its hash
remains the same, to make the forged version appear
legitimate.
• Once the search is successful, it hacks into all or some
of the network nodes and substitutes the legitimate
database by its forged version.
How Quantum Computers Attack Blockchain
Quantum
Securing
Algorithms
For Blockchains
RSA
ECC
NTR
U
RSA algorithm (Rivest-Shamir-Adleman)
• The RSA algorithm is the basis of a cryptosystem -- a suite of
cryptographic algorithms that are used for specific security services or
purposes -- which enables public key encryption and is widely used to
secure sensitive data, particularly when it is being sent over an
insecure network such as the internet.
• The public and private key generation algorithm is the most complex part of
RSA cryptography. This combination of key is available with the Server to
decrypt the Data.
Elliptical curve cryptography (ECC) is a public key encryption technique based
on elliptic curve theory that can be used to create faster, smaller, and more efficient
cryptographic keys. ECC generates keys through the properties of the elliptic curve
equation instead of the traditional method of generation as the product of very
large prime numbers. The technology can be used in conjunction with most public
key encryption methods, such as RSA, and Diffie-Hellman. According to some
researchers, ECC can yield a level of security with a 164-bit key that other systems
require a 1,024-bit key to achieve. Because ECC helps to establish equivalent security
with lower computing power and battery resource usage, it is becoming widely used
for mobile applications.
ECC ALGORITHM
• RSA and ECC are vulnerable to quantum computing attacks and the availability of practical quantum
computers is approaching faster than previously believed. Organizations interested in maintaining their
current embedded cryptographic choices but want to immediately future-proof against quantum
attacks are embracing our Quantum Safe Hybrid (QSH) approach.
• NTRU is a lattice-based public key cryptosystem and the most thoroughly researched and widely
NTRU ALGORITHM
• It is one of the most Concerning Issues of the 21st Century, and there has been a lot of research
going On at the moment on how to stop quantum computing from being used for evil purposes.
• One of the possible solutions is by using NTRU algorithm.
• Lets consider if in an any ongoing blockchain transaction data is being shared between the client
and the Server and a hacker is attempting to attack the database. But he would not succeed in
doing so because only a quantum computer can stop a quantum computer. While the transaction
of data in Blockchain is going on two quantum atoms entangle with each other causing them to
have all the similar features which cannot be altered.
• Thus if any hacker tries to modify the entanglement, the transaction between will destroy
themselves and
Thus the data will be safe and within the blockchain.
Quantum Secured Blockchain
• At the end of the day, the threat of quantum computing reduces to an economic
Viable quantum computers will initially be very expensive and have limited
only governments will be able to afford them and will only have enough capacity
most valuable secrets of other nation states.
• Gradually this capability will trickle down to organized criminals, but again they
the capacity able to attack the most lucrative targets (e.g. falsifying financial
blackmailing large companies or selling their sensitive data to the highest
time quantum computing is generally available (if ever), hopefully the old,
algorithms will have all but disappeared.
The Post-Quantum World
CONCLUSION
• we have developed a blockchain protocol with information-
theoretically secure authentication based on a network in
which each pair of nodes is connected by a QKD link.
• A crucial advantage of our blockchain protocol is its ability to
maintain transparency and integrity of transactions against
attacks with quantum algorithms. Our results therefore open
up possibilities for realizing scalable quantum-safe blockchain
platforms. If realized, such a blockchain platform can limit
economic and social risks from imminent breakthroughs in
quantum computation technology.
REFERENCES
• L. Gyongyosi, S. Imre, and H.V. Nguyen, IEEE Commun. Surv. Tut. (2018).
• B. Marr, How Blockchain Technology Could Change The World, Forbes, May 27, 2018.
• P. Franco, Understanding Bitcoin: Cryptography, Engineering and Economics.
• https://iopscience.iop.org/article/10.1088/2058-9565/aabc6b
• https://phys.org/news/2018-06-quantum-key-blockchain.html


More Related Content

What's hot

Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Edureka!
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain TechnologyNasir Bhutta
 
Blockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and consBlockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and consJerin Sebastian
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewRamesh Nagappan
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Edureka!
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key DistributionShahrikh Khan
 
Presentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart HomePresentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart HomeASADULLAHPRANTO
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum CryptographySwasat Dutta
 
Blockchain
BlockchainBlockchain
BlockchainSai Nath
 
Block chain technology
Block chain technology Block chain technology
Block chain technology RajeshJade
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology Niuversity
 
Les grands principes de la Blockchain
Les grands principes de la BlockchainLes grands principes de la Blockchain
Les grands principes de la BlockchainAlain EJZYN
 
How does a blockchain work?
How does a blockchain work?How does a blockchain work?
How does a blockchain work?Deloitte UK
 

What's hot (20)

Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
Blockchain Technology | Blockchain Explained | Blockchain Tutorial | Blockcha...
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain Technology
 
Blockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and consBlockchain, working [blockchain vs bitcoin] pros and cons
Blockchain, working [blockchain vs bitcoin] pros and cons
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Bitcoin - the Basics
Bitcoin - the BasicsBitcoin - the Basics
Bitcoin - the Basics
 
All about Bitcoins!
All about Bitcoins!All about Bitcoins!
All about Bitcoins!
 
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
Blockchain Explained | Blockchain Simplified | Blockchain Technology | Blockc...
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
The blockchain game
The blockchain gameThe blockchain game
The blockchain game
 
nano computing- basics
nano computing- basicsnano computing- basics
nano computing- basics
 
Presentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart HomePresentation on Implementing Blockchain (IOTA) Technology into Smart Home
Presentation on Implementing Blockchain (IOTA) Technology into Smart Home
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Blockchain
BlockchainBlockchain
Blockchain
 
Block chain technology
Block chain technology Block chain technology
Block chain technology
 
An Introduction to Blockchain Technology
An Introduction to Blockchain Technology An Introduction to Blockchain Technology
An Introduction to Blockchain Technology
 
Les grands principes de la Blockchain
Les grands principes de la BlockchainLes grands principes de la Blockchain
Les grands principes de la Blockchain
 
How does a blockchain work?
How does a blockchain work?How does a blockchain work?
How does a blockchain work?
 
Blockchain and Banking
Blockchain and BankingBlockchain and Banking
Blockchain and Banking
 
Nano computing
Nano computingNano computing
Nano computing
 

Similar to Quantum Secured Blockchain

Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsAmir Rafati
 
Fundamentals of Block chain Technology
Fundamentals of Block chain TechnologyFundamentals of Block chain Technology
Fundamentals of Block chain TechnologySubham Preetam
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technologyMd. Syful Azam
 
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...Zeeve
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksAhmed Banafa
 
Blockchain - Things you need to know
Blockchain - Things you need to knowBlockchain - Things you need to know
Blockchain - Things you need to knowNAAPBOOKS
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfBlockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfadinugroho751867
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engDavid Vangulick
 
Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder  Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder Ali Al-Sherbaz
 
How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?Blockchain Council
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)Jae-Yun Kim
 

Similar to Quantum Secured Blockchain (20)

Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency Regulations
 
Fundamentals of Block chain Technology
Fundamentals of Block chain TechnologyFundamentals of Block chain Technology
Fundamentals of Block chain Technology
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
Journey to Blockchain Scalability: A Close Look at Complete Scaling Solutions...
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdfInitVerse Blockchain - 5 minutes to understand the blockchain.pdf
InitVerse Blockchain - 5 minutes to understand the blockchain.pdf
 
BlockChain.pptx
BlockChain.pptxBlockChain.pptx
BlockChain.pptx
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
Blockchain - Things you need to know
Blockchain - Things you need to knowBlockchain - Things you need to know
Blockchain - Things you need to know
 
Blockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdfBlockchain Fundamental_KIPMI_2022.02.26.pdf
Blockchain Fundamental_KIPMI_2022.02.26.pdf
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Blockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v engBlockchain general presentation nov 2017 v eng
Blockchain general presentation nov 2017 v eng
 
Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder  Blockchain: No Thunder No Wonder
Blockchain: No Thunder No Wonder
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Block chain technology
Block chain technology Block chain technology
Block chain technology
 
How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?How Blockchain Can Be Used In Supply Chain Management & How It Works?
How Blockchain Can Be Used In Supply Chain Management & How It Works?
 
Blockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for DummiesBlockchain and Cryptocurrency for Dummies
Blockchain and Cryptocurrency for Dummies
 
Decipher openseminar (1)
Decipher openseminar (1)Decipher openseminar (1)
Decipher openseminar (1)
 
module-1.pptx
module-1.pptxmodule-1.pptx
module-1.pptx
 
Blockchain
BlockchainBlockchain
Blockchain
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Quantum Secured Blockchain

  • 2. INTRODUCTION • Blockchain is a distributed database which is cryptographically protected against malicious modifications. • Rely on digital signatures, which are vulnerable to attacks by means of quantum computers. • Cryptographic hash functions are used in preparing new blocks. • Here we propose a possible solution to the quantum-era blockchain challenge and report an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fiber network for information- theoretically secure authentication.
  • 3. Paper Name Publication House and year Description 1. Quantum-secured blockchain IEEE 2018 A possible solution to the quantum-era blockchain challenge and report an experimental realization of a quantum-safe blockchain platform that utilizes quantum key distribution across an urban fibre network 2. Quantum Blockchain Using Entanglement in Time RESEARCH GATE 2017 Brief description of quantum blockchain using entanglement is given and used. Literature Survey
  • 4. “Blocks” on the blockchain are made up of digital pieces of information. Specifically, they have three parts: 1. Blocks store information about transactions, say the date, time, and dollar amount of your most recent purchase from Amazon. 2. Instead of using your actual name, your purchase is recorded without any identifying information using a unique “digital signature,” sort of like a username. 3. Each block stores a unique code called a “hash” that allows us to tell it apart from every other block. Let’s say you made your splurge purchase on Amazon, but while it’s in transit, you decide you just can’t resist and need a second one. Even though the details of your new transaction would look nearly identical to your earlier purchase, we can still tell the blocks apart because of their unique codes. Working of Blockchain
  • 5. Information Stored In Blockchain…
  • 6. • After a block has been added to the end of the blockchain, it is very difficult to go back and alter the contents of the block. That’s because each block contains its own hash, along with the hash of the block before it. Hash codes are created by a math function that turns digital information into a string of numbers and letters. If that information is edited in any way, the hash code changes as well. • In order to change a single block, then, a hacker would need to change every single block after it blockchain. Recalculating all those hashes would take an enormous and improbable amount of computing power. In other words, once a block is added to the blockchain it becomes very edit and impossible to delete. Blockchain Security
  • 9. Quantum Computation Rather than store information using bits represented by 0s or 1s as conventional digital computers do, quantum computers use quantum bits, or qubits, to encode information as 0s, 1s, or both at the same time. This superposition of states-along with the other quantum mechanical phenomena of entanglement and tunnelling-enables quantum computers to manipulate enormous combinations of states at once.
  • 12. How Quantum Computers Attack Blockchain • Quantum Computers now-a-days are majorly used by trained professional hackers For preforming some unwise deeds. • Using Quantum Computers they directly attack the Blockchain Database, This is mainly performed by stealing the encrypted private Key. • For Example if we consider a Client and a Server. The Server upon connection sends a public key to the client to transport the encrypted data. The client sends the encrypted data to the Server, which the Server decrypts using its Private Key. • The hacker tries millions of different combination of keys to try to Encrypt the data and then can access the data and make changes to It on his will.
  • 13. • A possible attack scenario is as follows: a malicious party equipped with a quantum computer works o-line to forge the database. • It changes one of the past transaction records to its benefit and performs a search for a variant of other transactions within the same block such that its hash remains the same, to make the forged version appear legitimate. • Once the search is successful, it hacks into all or some of the network nodes and substitutes the legitimate database by its forged version. How Quantum Computers Attack Blockchain
  • 15. RSA algorithm (Rivest-Shamir-Adleman) • The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network such as the internet. • The public and private key generation algorithm is the most complex part of RSA cryptography. This combination of key is available with the Server to decrypt the Data.
  • 16. Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers. The technology can be used in conjunction with most public key encryption methods, such as RSA, and Diffie-Hellman. According to some researchers, ECC can yield a level of security with a 164-bit key that other systems require a 1,024-bit key to achieve. Because ECC helps to establish equivalent security with lower computing power and battery resource usage, it is becoming widely used for mobile applications. ECC ALGORITHM
  • 17. • RSA and ECC are vulnerable to quantum computing attacks and the availability of practical quantum computers is approaching faster than previously believed. Organizations interested in maintaining their current embedded cryptographic choices but want to immediately future-proof against quantum attacks are embracing our Quantum Safe Hybrid (QSH) approach. • NTRU is a lattice-based public key cryptosystem and the most thoroughly researched and widely NTRU ALGORITHM
  • 18. • It is one of the most Concerning Issues of the 21st Century, and there has been a lot of research going On at the moment on how to stop quantum computing from being used for evil purposes. • One of the possible solutions is by using NTRU algorithm. • Lets consider if in an any ongoing blockchain transaction data is being shared between the client and the Server and a hacker is attempting to attack the database. But he would not succeed in doing so because only a quantum computer can stop a quantum computer. While the transaction of data in Blockchain is going on two quantum atoms entangle with each other causing them to have all the similar features which cannot be altered. • Thus if any hacker tries to modify the entanglement, the transaction between will destroy themselves and Thus the data will be safe and within the blockchain. Quantum Secured Blockchain
  • 19. • At the end of the day, the threat of quantum computing reduces to an economic Viable quantum computers will initially be very expensive and have limited only governments will be able to afford them and will only have enough capacity most valuable secrets of other nation states. • Gradually this capability will trickle down to organized criminals, but again they the capacity able to attack the most lucrative targets (e.g. falsifying financial blackmailing large companies or selling their sensitive data to the highest time quantum computing is generally available (if ever), hopefully the old, algorithms will have all but disappeared. The Post-Quantum World
  • 20. CONCLUSION • we have developed a blockchain protocol with information- theoretically secure authentication based on a network in which each pair of nodes is connected by a QKD link. • A crucial advantage of our blockchain protocol is its ability to maintain transparency and integrity of transactions against attacks with quantum algorithms. Our results therefore open up possibilities for realizing scalable quantum-safe blockchain platforms. If realized, such a blockchain platform can limit economic and social risks from imminent breakthroughs in quantum computation technology.
  • 21. REFERENCES • L. Gyongyosi, S. Imre, and H.V. Nguyen, IEEE Commun. Surv. Tut. (2018). • B. Marr, How Blockchain Technology Could Change The World, Forbes, May 27, 2018. • P. Franco, Understanding Bitcoin: Cryptography, Engineering and Economics. • https://iopscience.iop.org/article/10.1088/2058-9565/aabc6b • https://phys.org/news/2018-06-quantum-key-blockchain.html

Editor's Notes

  1. Quantum-secured blockchain E.O. Kiktenko, N.O. Pozhar, M.N. Anufriev, A.S. Trushechkin, R.R. Yunusov, Y.V. Kurochkin, A.I. Lvovsky, A.K. Fedorov (Submitted on 25 May 2017 (v1), last revised 3 Jun 2018 (this version, v3))