This document discusses quantum cryptography and its advantages over traditional cryptography. It begins by introducing cryptography and its goal of maintaining confidentiality of data. It then describes how quantum cryptography uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute keys. The document reviews existing quantum cryptography protocols like BB84 and E91. It also discusses challenges in technologies for generating and detecting single photons needed for quantum cryptography. In conclusion, the document explains how quantum cryptography provides secure key distribution using physics rather than mathematics, making it more secure than other cryptographic techniques.
A brief presentation on Position-Based, Device-Independent and Post Quantum Cryptographies. Detailing Position-Based QC, defining Device-Independent QC and discussing Post Device-Independent.
A brief presentation on Position-Based, Device-Independent and Post Quantum Cryptographies. Detailing Position-Based QC, defining Device-Independent QC and discussing Post Device-Independent.
Quantum cryptography for secured communication networksIJECEIAES
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum cryptography are Shor’s algorithm and the Grover’s’s algorithm. For finding the number of integer factorization of each photon, Shor’s algorithm is used. Grover’s’s algorithm used for searching the unsorted data. Shor’s algorithm overcomes RSA algorithm by high security. By the implementation of quantum cryptography, we are securing the information from the eavesdropper and thereby preventing data in the communication channel.
PUT my all effort to make quantum cryptography easily understandable by the help of basics n videos.Its enough to give you better knowledge about quantum cryptography. Its really interesting topic ;).
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...IJNSA Journal
We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. We also provide an overview of the two most widely used commodity security protocols, IPsec and TLS. Pursuing a key exchange model, we propose how QKD could be integrated into these security applications. For such a QKD integration we propose a support layer that provides a set of common QKD services between the QKD protocol and the security applications.
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
Intrusion Detection is one of the methods of defending against these attacks. In the proposed a security protocol for homogeneous wireless sensor network; network with all nodes are of same type. Clustering is used to improve the energy efficiency. Zone-Based Cluster Protocol (ZBCA) is used for selection of cluster head which is effective in scalability and energy consumption. Single hop technique is used for
communication within normal nodes and cluster head to base station. Simulation of proposed algorithm is performed in MATLAB. Sleep Deprivation Attack has been analyzed where attacker changes the environmental values by an artificial event. Attacker produces an event in environment due to which nodes have to sense the environment more than once in the same round that increase the power consumption of
the node. This interrupt reduces the network life time as nodes are not allowed to go in sleep mode and they are not able to perform their function of data collection and reporting to Cluster head and Base Station properly. Proposed protocol identifies this attack and prevents it from happening by solating the attacker node.
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...ijwmn
A selective forwarding attack in mobile wireless sensor networks is an attack that selectively drops or delivers event packets as the compromised node moves. In such an attack, it is difficult to detect the compromised node compared with the selective forwarding attack occurring in the wireless sensor network
because all sensor nodes move. In order to detect selective forwarding attacks in mobile wireless sensor networks, a fog computing-based system for a selective forwarding detection scheme has been proposed. However, since the proposed detection scheme uses a single path, the energy consumption of the sensor node for route discovery when the sensor node moves is large. To solve this problem, this paper uses fuzzy
logic to determine the number of multi-paths needed to improve the energy efficiency of sensor networks. Experimental results show that the energy efficiency of the sensor network is improved by 9.5737% compared with that of the existing scheme after 200 seconds when using the proposed scheme
Quantum cryptography for secured communication networksIJECEIAES
Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum cryptography are Shor’s algorithm and the Grover’s’s algorithm. For finding the number of integer factorization of each photon, Shor’s algorithm is used. Grover’s’s algorithm used for searching the unsorted data. Shor’s algorithm overcomes RSA algorithm by high security. By the implementation of quantum cryptography, we are securing the information from the eavesdropper and thereby preventing data in the communication channel.
PUT my all effort to make quantum cryptography easily understandable by the help of basics n videos.Its enough to give you better knowledge about quantum cryptography. Its really interesting topic ;).
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...IJNSA Journal
We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. We also provide an overview of the two most widely used commodity security protocols, IPsec and TLS. Pursuing a key exchange model, we propose how QKD could be integrated into these security applications. For such a QKD integration we propose a support layer that provides a set of common QKD services between the QKD protocol and the security applications.
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
Intrusion Detection is one of the methods of defending against these attacks. In the proposed a security protocol for homogeneous wireless sensor network; network with all nodes are of same type. Clustering is used to improve the energy efficiency. Zone-Based Cluster Protocol (ZBCA) is used for selection of cluster head which is effective in scalability and energy consumption. Single hop technique is used for
communication within normal nodes and cluster head to base station. Simulation of proposed algorithm is performed in MATLAB. Sleep Deprivation Attack has been analyzed where attacker changes the environmental values by an artificial event. Attacker produces an event in environment due to which nodes have to sense the environment more than once in the same round that increase the power consumption of
the node. This interrupt reduces the network life time as nodes are not allowed to go in sleep mode and they are not able to perform their function of data collection and reporting to Cluster head and Base Station properly. Proposed protocol identifies this attack and prevents it from happening by solating the attacker node.
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...ijwmn
A selective forwarding attack in mobile wireless sensor networks is an attack that selectively drops or delivers event packets as the compromised node moves. In such an attack, it is difficult to detect the compromised node compared with the selective forwarding attack occurring in the wireless sensor network
because all sensor nodes move. In order to detect selective forwarding attacks in mobile wireless sensor networks, a fog computing-based system for a selective forwarding detection scheme has been proposed. However, since the proposed detection scheme uses a single path, the energy consumption of the sensor node for route discovery when the sensor node moves is large. To solve this problem, this paper uses fuzzy
logic to determine the number of multi-paths needed to improve the energy efficiency of sensor networks. Experimental results show that the energy efficiency of the sensor network is improved by 9.5737% compared with that of the existing scheme after 200 seconds when using the proposed scheme
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows two
parties to produce a shared random bit string known only to them. These random bits can be used as a key
to encrypt and decrypt messages. The most important and unique property of quantum cryptography is the
ability of the two communicating users to detect the presence of any third party trying to gain knowledge of
the key. It is based on fundamental aspects of quantum mechanics. By using quantum entanglement or
quantum super positions and transmitting information in quantum states, a communication system can be
implemented which detects eavesdropping. Quantum cryptography is used to produce and distribute a key,
not to transmit any message data. This key along with certain encryption algorithm, is used to encrypt (and
decrypt) a message, which can then be transmitted over a standard communication channel. This paper
concentrates on comparison between classical and quantum cryptography as well as survey on various
quantum key distribution protocols used to generate and distribute the key among communicating parties.
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts are made to improve the performance and
reliability of the implemented technologies. But despite this big progress, several challenges remain. For example the task of how to test the devices of QKD did not yet receive enough attention. These apparatuses become heterogeneous, complex and so demand a big verification effort. In this paper we propose to study quantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISM
tool, we analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropper's information gain on the key derived from the implementation of this protocol. We show that this property is affected by the parameters of the eavesdropper’s power and the quantum channel.
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers unconditionally secure communication. Now, the progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years. Efforts are made to improve the performance and reliability of the implemented technologies. But several challenges remain despite this big progress. The task of how to test the apparatuses of QKD For example did not yet receive enough attention. These devises become complex and demand a big verification effort. In this paper we are interested in an approach based on the technique of probabilistic model checking for studying quantum information. Precisely, we use the PRISM tool to analyze the security of BB84 protocol and we are focused on the specific security property
of eavesdropping detection. We show that this property is affected by the parameters of quantum channel and the power of eavesdropper.
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it was noted that quantum computers could break public key cryptosystems based on number theory. Actually, the progress of research in this field allows the implementation of QKD outside of laboratories. Efforts are made to exploit this technology in the existing communication networks and to improve the performance and reliability of the implemented technologies. Some research is in progress for the integration of QKD with the protocols in different layers of OSI model. The examples of such research effort are the integration of QKD in point-to-point protocol (PPP) OSI layer 2 and the integration of QKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technology for enhancing the security of modern computing applications on the internet. In this paper, we present a
novel extension of the TLS protocol based on QKD. We introduce a scheme for integrating Quantum Cryptography in this protocol. Our approach improves the security of the process of authentication and data encryption. Also, we describe an example to illustrate the feasibility of our scheme’s implementation.
Secure quantum key distribution (QKD) promises a revolutionizing in optical applications such as encryption, and imaging. However, their implementation in real-world scenarios continues to be challenged. The goal of this work is to verify the presence of photon number splitting (PNS) attack in quantum cryptography system based on BB84 protocol and to obtain a maximum secure key length as possible. This was realized through randomly interleaving decoy states with mean photon numbers of 5.38, 1.588, and 0.48 between the signal states with mean photon numbers of 2.69, 0.794, and 0.24. Experiment results show that a maximum secure key length obtained from our system, which ignores eavesdropping cases, is 125 with 20% decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
The Security of Practical Quantum Key DistributionXequeMateShannon
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on the eavesdropper's power.
The first two sections provide a concise up-to-date review of QKD, biased toward the practical side. The rest of the paper presents the essential theoretical tools that have been developed to assess the security of the main experimental platforms (discrete variables, continuous variables and distributed-phase-reference protocols).
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Wireless channel-based ciphering key generation: effect of aging and treatmentIJECEIAES
Key generation for data cryptography is vital in wireless communications secu- rity. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the ran- domness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this pa- per, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is de- veloped which decreases the correlation between keys generated at consecutive coherence times. When compared to the conventional method, the randomness improvement is significant at each time interval. The simulation results show that the proposed method improves the randomness of the encrypting keys.
PHYSICAL LAYER SECURITY OF OPTICAL NETWORKS.pdfadeel paracha
Abstract
The physical layer of an optical network may be attacked in numerous ways, such as by jamming, assaults on the physical infrastructure, eavesdropping, and interception. As the requirement for network capacity develops, the physical layer of the optical network must be kept secure. In this overview article, specialists look at security problems in optical networks and discuss a variety of novel approaches to defending optical networks. In the first section of this study, researchers discuss a variety of security issues that might harm the optical layer of an optical network. These weaknesses include jamming, physical infrastructure assaults, eavesdropping, and interception. Enhanced optical network security has gained a lot of interest in the sectors described above. Real-time signal processing is essential in order to apply security measures at the physical layer without slowing down the pace of optical communications. The key advantages of optical processing for optical layer security include rapid reaction, wide-band operation, resilience to electromagnetic fields, compact size, and low latency. In the second part of this research, we look into optical steganography, optical encryption, optical code-division multiple access (CDMA) secrecy, self-healing, survivable optical rings, anti-jamming, and optical CDMA confidentiality.
I. Introduction
Introduction Optical communication systems are employed in many different fields, including business, the military, and personal communication. Optical networks are unusual in that their data speeds are greater than 40 GB/s, and this figure will only increase as time goes on. Physical layer security measures have to function in real time, which is not achievable with standard electronic computing. Side-channel assaults are less likely to emerge in optical communication networks because optical components don’t leave electromagnetic traces. With optical encryption, communications may be encrypted fast and with minimum latency (at speeds not attainable with standard electrical implementations) (at rates not possible with conventional electrical implementations). In addition to data encryption, optical steganography may be used to obscure the flow of data over an open transmission channel.
II. Threats and defenses in optical networks at the optical layer
There are many different forms of optical networks, from local area networks to the backbone networks of the Internet. Each network may tackle a particular threat type in a different manner. Researchers investigate the optical layer to examine whether there are any threats to privacy, availability, authentication, and secrecy (Skorin-Kapov, 2016).
A. Confidentiality
Even though optical networks don’t have an electromagnetic signature, an attacker may nonetheless listen in on them by physically tapping into the optical fiber or by pretending as a lawful subscriber and listening to residual crosstalk from an adjacent channel. It is not hard to tap an
Quantum Entanglement - Cryptography and CommunicationYi-Hsueh Tsai
1. Introduction 2. Quantum Entanglement 3. Quantum Cryptography - Quantum Key Distribution 4. Physical Limit for E2E Time Delay - Speed of Light 5. Shorten E2E Delay - Faster-Than-Light Communication 6. Conclusions
To improve communication security, quantum cryptography could be considered. 2. To shorten E2E delay, technology regarding Faster-ThanLight (FTL) communication is required.
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...ijcisjournal
This paper presents a new encryption scheme called Compact Coding that encodes information in time, phase, and intensity domains, simultaneously. While these approaches have previously been used one at a time, the proposed scheme brings to bear for the first time their strengths simultaneously leading to an increase in the secure information transfer rate. The proposed scheme is applicable to both optical fibers and free space optics, and can be considered as an alternative to polarization coding. This paper applies the proposed compact coding scheme to multi-photon tolerant quantum protocols in order to produce quantum-level security during information transfer. We present the structure of the proposed coding scheme in a multi-photon environment and address its operation.
Quantum cryptography is a method of using properties of quantum mechanics to secure information using encryption. When data is secured or transmitted using quantum cryptography it cannot be hacked. Computers using quantum cryptography rely on the principles of physics, rather than the more traditional mathematical forms of cryptography.
Building a quantum internet is a key ambition for many countries around the world, such a breakthrough will give them competitive advantage in a promising disruptive technology, and opens a new world of innovations and unlimited possibilities.
Electrically small antennas: The art of miniaturizationEditor IJARCET
We are living in the technological era, were we preferred to have the portable devices rather than unmovable devices. We are isolating our self rom the wires and we are becoming the habitual of wireless world what makes the device portable? I guess physical dimensions (mechanical) of that particular device, but along with this the electrical dimension is of the device is also of great importance. Reducing the physical dimension of the antenna would result in the small antenna but not electrically small antenna. We have different definition for the electrically small antenna but the one which is most appropriate is, where k is the wave number and is equal to and a is the radius of the imaginary sphere circumscribing the maximum dimension of the antenna. As the present day electronic devices progress to diminish in size, technocrats have become increasingly concentrated on electrically small antenna (ESA) designs to reduce the size of the antenna in the overall electronics system. Researchers in many fields, including RF and Microwave, biomedical technology and national intelligence, can benefit from electrically small antennas as long as the performance of the designed ESA meets the system requirement.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
1. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1914
www.ijarcet.org
STUDY OF QUANTUM CRYPTOGRAPHY
Swapnika* Rajani bala Kavita
SES, BPSMV SES,BPSMV SES,BPSMV
Khanpur kalan, Sonepat Khanpur kalan , Sonepat khanpur kalan,sonepat
Abstract-The concept of quantum cryptography involves the quantum physics by which two parties can establish a
secure key exchange. The security in such system is defined by the laws of quantum physics. Quantum cryptography
holds its root from Steven weisner’s conjugate coding. The basics of quantum cryptography is based on two principles
of mechanics namely, Heisenberg’s uncertainty principle and photo polarization law. The uncertainty law says that
the quantum of any state cannot be determined by without disturbing the particular system whereas the law of photo
polarization says that the unknown qubits can never be guessed by traffic analysis or another kind of passive attack.
This paper presents the current scenario of quantum cryptography, its implementation and its future use.
Keywords – Cryptography, photon, quantum, Heisenberg uncertainty principle, polarization of light
I. INTRODUCTION
Cryptography [1] is a technique of encrypting and decrypting the message so as to maintain the confidentiality of the data.
The usage of cryptography is not new in the digital world. The cryptography is in use since historical times. Julius Caesar
used Cryptography and gave the world “Caesar Cipher “.For effective, we chop – off the message into small chunks and
then encrypt the messages by an encrypting algorithm and are sent via a communication medium to the receiver’s side.
Further, he receiver side decrypts the message by using the counterpart of the encryption algorithm and receives the
message. But at times the messages get hacked by an intruder during the communication phase or by an attacker
challenging the encryption algorithm. Based on attacks, the algorithms and techniques are always changed and a new and
more secure and sophisticated cryptographic algorithm are sought-after. It has been observed that most of the time either
the adversary ruptures the connection to get message or attacks the algorithm. For secret key communication, the two
users who wish to establish communication should meet to exchange key or either use a secure courier service, both of
which is absolutely impractical.
Hence, in quantum cryptographic we present a more reliable and secure communication which has amalgamation of
quantum physics and cryptography. Hence a more complex and sophisticated approach to encryption and decryption. The
quantum cryptography defines a light as a beam of neglible weight charged particles known as photons.
The photons differ from each there in terms of orientation. The entangled pairs [8] can be defined as the pairs of photons
which are generated by particular reactions. The entanglement of the photons lays an effect on their randomness. For
example- consider 2 beam of lights B1 and B2. When B1 is measured with a polarization filter only one half of the
photons pass the filter. Whether a particular photon will pasta filter or not is completely based on its randomness. But
when B2 is measured with the polarization filter consisting of entangled companions of B1 and also the filter oriented at
an angle of 90 degrees so that when B1 will pass the filter then B2 will also do it and also if B1 will not pass so shall not
B2. this figure shows a polarized light.
The whole concept of quantum cryptography lies in uncertainty principle states that there are certain pairs of a special
physical properties which are related in a way that while estimating one property simultaneously another property cannot
be observed whereas in polarization of photons direction of measurement lays an important effect on further
measurements. In quantum key distribution we use quantum mechanics for secure communication. In this scenario, both
the users generate a common bit string which is used as the key for encryption and decryption. Also, in quantum
cryptography, the presence of an adversary can also be detected very easily
Quantum cryptography imparts a secure key distribution and is not meant for transmission of any messages. The
quantum cryptography’s security model uses physics rather than mathematics; hence it is quite secure from other
cryptographic techniques. Because of its reliable and strong cryptographic mechanism, mow-a-days, it has been used in
business communities and for international secret groups. It was first experimented in the year 1989 over a distance of 32
cm but today it is securely transmitted over miles with the help of optical fibers.
He QC works as follows:-
a) Firstly. A set of photons swath different and random orientations are sent to the receiver as possible key for
encryption and decryption process.
b) This stream of photons is then converted to generate a stream of bits.
c) If any, intruder receives this key, then it is of no use to him as it this only a stream off random bits.
d) On receiving the key, the process of encryption and decryption can be started.
e) After encrypting the message with such key, the message can be sent over telephone electronic mail or even a
regular mail.
2. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1915
www.ijarcet.org
Figure 1: showing vertically and horizontally polarized light
II. CONVENTIONAL WORK IN QC
A. BB84 ENCODING SCHEME
BB84 scheme uses the two pairs of state in which both the photons are orthogonal to each other and the two pairs should
be conjugate to each other. Such types of pairs can be
Rectilinear basis of vertical and horizontal of 0 and 90 degrees.
Diagonal basis of 45 and 135 degrees.
Circular basis of left and right handed.
Since all these pairs are also conjugate to each other hence any two of them can be used... hence in this the quantum
information can be stored in non orthogonal states.
B. B92 ENCODING SCHEME
It holds its roots from BB84 encoding scheme. It uses two states of BB84, i.e., 0 and 45 are used and represented by 0
and 1. Then these non orthogonal bits are encoded by the sender in such a manner that not even a single bit can be
determined with absolute certaininty.
It was developed in the year 1992 by Charles Bennett.
C. EKERT ENCODING SCHEME
Developed in the year 1992by Arthur ekert, which takes advantage of the entanglement of photons. In this a photon is
divided into two by laser and then one half of the photon is kept with the sender while the other half is sent as key to
receiver from sender.
3. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1916
www.ijarcet.org
III. QUANTUM CRYPTOGRAPHY TECHNOLOGIES
Quantum technologies secure key distribution by two phenomenons- the device for creation of photons and then their
detection. A photon gun is considered as the most ideal source for the creation single photon, but its practical
implementation is not yet possible. Certain attempts have been done by researchers to produce the photons either by a
light emitting p-n junction or with the help of a carbon atom. In light emitting p-n junction they try to produce single
photons as per the demand but in carbon they replace it by nitrogen which then creates a hole and then further an
excitation by the laser a photon is developed . But none of these technologies can be used for quantum cryptography as
they are not much secure. A most common way is to decrease the intensity of the laser beam so that there should be only
one emission allowed per pulse but these beams presents more than one photons and further these photons proves out to
be hazardous as they extra photon can be used by the adversary. Just like the creation, detection of a single photon is also
difficult.
Figure 2 Quantum Cryptography
The common practice is to use avalanche photodiodes. Such devices operate in Geiger mode. In this mode the voltage is
higher than the breakdown voltage of the diode and hence a photon absorbs the energy, gets excited and then causes the
avalanche (electrical). Now to detect another photon, the device should stabiles the current and then device should be set
in reset mode which is on other hand is very time consuming. Also silicon’s wavelength detection is best at 800
nanometers and hence, lays no impact or is totally immune to the rays of wavelength 1100 nanometers and above. In
telecommunication, Germanium (Ge) or indium-gallium-arsenide (InGaAs) is used as detectors but these are less
efficient to be use with quantum cryptography.
IV PROPOSED METHODOLGY
Cryptography is a technique which can not only be installed for correct ans secure communication but also for safe key
distribution. In this paper we presented a technique for such a safe key distribution techniques
V PROPOSED OUTCOME
Quantum cryptography secures the communication system by the implementation of laws of physics and not much of
mathematical computation is required. The parameters and the devices used in this technique are not fictions and hence
can be implemented in the real world.
VI CONCLUSIONS
Cryptography has always been an area of research and refinement. More and more tasks and more and more techniques
always improve this field. The inclusion of physics in this field has given a new definition to the cryptography. In this
paper we explained that how can a key be safely exchanged or distributed to both the entities of the communications.
4. ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1917
www.ijarcet.org
VII REFRENCES
[1] C.-H. F. Fung, K. Tamaki, and H.-K. Lo, "Performance
Of two quantum key- distribution Protocols," Phys. Rev. A
vol. 73, 2006.
[2] C. Elliott, D. Pearson, and G. Troxel, "Quantum
Cryptography in practice," Karlsruhe, Germany:
Proceedings of the 2003 conference on Applications,
Technologies, architectures, and protocols for computer
Communications 2003...
[3] H.-K. Lo, H. F. Chau, and M. Ardehali, "Efficient
Quantum Key Distribution Scheme and a Proof of Its
Unconditional Security," Journal of
[4] Homer, Iliad 6.213, transl. Ian Johnston (in
English), Malaspina University-College,
Nanaimo, BC, Canada (2000).
[5] Charles Anthon, The first six books of
Homer’s Iliad with English notes, critical &
Explanatory, a metrical index, & Homeric
Glossary, Harper & Brothers, New York, p. 396
(1875).
[6]Old Spartan Factsat
http://www.geocities.com/Athens/Aegean/7849/s
pfacts.html.
[7] D.R. Stinson, Cryptography, Theory and
Practice, CRC Press, Inc., Boca Raton, p. 4
(1995).
[8] T.P. Leary, Cryptology in the 15th and 16th
Century, Cryptologia 20, No. 3, pp. 223-242
(July 1996).
[9] E.A. Poe, the Gold Bug, in Tales of Mystery
And Imagination, Wordsworth Editions Ltd.,
Ware, pp. 1-46 (1993).
[10] A.C. Doyle, the Adventure of the Dancing
Men, in The Annotated Sherlock Holmes, Vol. 2,
ed. W.S. Baring-Gould, Wings Books, New
Jersey, pp. 527-545 (1992).
[11] G.S. Vernam, Cipher Printing Telegraph Systems for
Secret Wire and Radio Telegraphic Communications, J.
AIEE 45, pp. 109-115 (1926). cryptology vol. 18, pp. 133 -
165 200
[12] C. H. Bennett and G. Brassard, “Quantum
Cryptography: Public Key Distribution and Coin Tossing”,
In Proceedings of IEEE International Conference on
Computers Systems and Signal Processing, Bangalore,
India, pp. 175-179, December 1984.
[13] D. Mayers,“Unconditional security in quantum
cryptography”, Journal of the ACM, Vol. 48, No. 3,
pp.351-406, May 2001.
[14] P. Shor, J. Priskill, “Simple Proof of Security of the
BB84 Quantum Key Distribution Protocol”, Physical
Review Letters, Vol. 85, pp. 441 - 444, 2000.
[15] P. Shor. “Polynomial-Time Algorithms for Prime
Factorization and Discrete Logarithms”. Proc. of the 35th
Annual Symposium on Foundations of Computer Science
(FOCS), IEEE Computer Society Press, 124-134,Nov.
1994.