SlideShare a Scribd company logo
QUANTUM CRYPTOGRAPHY
A
Seminar Presentation
On
SEMINAR
COORDINATOR:
Mr. Manas Singhal
(Assistant Professor)
SEMINAR GUIDE:
Mrs.SHUCHITA SEXANA
(Assistant Professor)
PRESENTED BY:
NAMAN KUMAR
(1208231100)
EC 3rd Year
Section: J
MIT(MORADABAD)
1
CONTENT
 Basic terms
 What is cryptography?
 The process
 Advantages and Limitations of cryptography
 RSA Crypto Scheme
 OTP (One Time Pad)
 Public Key Cryptography
 QKD (Quantum Key Distribution)
 What is quantum cryptography?
 Polarization of light
 Heisenberg’s Uncertainty Principle
 Element of quantum theory
 Qubits
 Quantum communication
 BB84 Protocol
 Advantages and Disadvantages of Quantum cryptography
 Future aspect
 Conclusion
 Refrences1
1
BASIC TERMS
 Plain Text -Plain text is a pure sequence of character codes.
Basically its is original message.
 Encryption Algorithm – It is the process of encoding
messages or information in such a way that only authorized
parties can read it.
 Cipher Text -Cipher text is also known as encrypted or
encoded information. Its is the combination of key and plain
text.
 Decryption Algorithm – It is reverse process of encryption.
 Eavesdropping- It is secretly listening to the private
conversation of others without their consent.
2
WHAT IS CRYPTOGRAPHY?
 Cryptography (derived from the Greek words kryptos and
graphein meaning hidden writing) is the science of codes and
ciphers.
 Cryptography is the art of encoding and decoding messages of
secure communications.
 Cryptography is of increasing importance in our technological
age using broadcast, network communications, Internet ,e-mail
etc.
3
4
 Encrypted messages can sometimes be broken by
cryptanalysis, also called code-breaking, although modern
cryptograph techniques are virtually unbreakable.
Fig.1-Block diagram of cryptography
eavesdropping
1 5
THE PROCESS
Fig. 2- Process of cryptography
A
-A
1 6
ADVANTAGES OF CRYPTOGRAPHY
 It hides the message and your privacy is safe.
 Only the person who have the key would be able to
read the desired message.
LIMITATIONS
 Key can be hacked easily.
 Not efficient.
1 7
RSA CRYPTOGRAPHY
 RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman.
 RSA consist a single key.
It provide more security but still it can be hacked.
It take lot of time to generate and regenerate the code.
1 8
OTP (ONE TIME PAD)
 One-time pad (OTP) is an encryption technique that cannot be
cracked if used correctly.
Fig.3- Example of one time pad
1 9
 Here the problem raises how to get the key to the decrypting
party safely or how to keep both keys secure.
 One-time pads have sometimes been used when the both
parties started out at the same physical location and then
separated, each with knowledge of the keys in the one-time
pad.
 The key used in a one-time pad is called a secret key.
 Ideally destroy the key after use, to make your data to more
secure.
 Key distribution problem led to the invention of public
key cryptography.
1 10
PUBLIC KEY CRYPTOGRAPHY
 Public-key cryptography, also known as asymmetric
cryptography.
 Requires two separate key, one of which is secret (or private)
and one of which is public.
 It has better speed and less complicated then RSA and one time
pad .
 But still there is a problem that is , it can also be hacked.
1 11
QUANTUM KEY DISTRIBUTION
 Quantum key distribution (QKD) uses quantum mechanics
to guarantee secure communication.
 Quantum Key Distribution tell us all attempts of
eavesdropping.
 Quantum key distribution is only used to produce and
distribute a key, not to transmit any message data
 It enables two parties to produce a shared random bit string
known only to them, which can be used as a key for
encryption and decryption.
1 12
It is more secure then others schemes.
There is a problem that the finest optical fiber have limit
of 50 km.
1 13
WHAT IS QUANTUM CRYPTOGRAPHY ?
 Although the field of cryptography is ancient, but it is not
static. Quantum cryptography is a relatively new concept in
cryptography.
 Basically quantum cryptography is combination of OTP and
QKD.
 Quantum cryptography is based on two important
principles –
a) Polarization of light.
b) Heisenberg’s uncertainty principle.
1 14
POLARIZATION OF LIGHT
 Polarized light waves are light waves in which the
vibrations occur in a single plane.
 The process of transforming unpolarized
light into polarized light is known as polarization.
 Symbols:-
Horizontal polarizations→
Vertical polarization - ↑
45° polarization - ↗
135° polarization - ↖
Fig.4- Polarization of light
1 15
HEISENBERG’S UNCERTANITY PRINCIPLE
 According to the principle two interrelated properties
cannot be measured individually without affecting the
other.
 The principle is that you cannot partition the photon
into two halves without affect it value.
 So if someone tries to detect the state of photons being
send over to the receiver the error can be detected.
1 16
ELEMENT OF QUANTAM CRYPTOGRAPHY
 Light waves are propagated as discrete quanta called photons.
 Photons are massless but they have energy, momentum and
angular momentum which is called spin.
 Spin carries the polarization.
 If on its way we put a polarization filter a photon may pass
through it or may not.
 We can use a detector to check of a photon that has passed
through a filter
1 17
QUBITS
 A quantum bit or qubit is a unit of quantum information.
 Qubits are not like to simple bits because they have equal
possibility.
 Exists as a ‘0’, a ‘1’ or simultaneously as a superposition
of both ‘0’ & ‘1’ .
 Though the amount of information that can be retrieved in
a single qubit is equal to one bit, the difference lies in the
processing of information.
1 18
QUANTUM COMMUNICATION
Here the message is send through the public network where as
key send is through quantum channel.
Fig.5- Quantum communication
1 19
BB84 PROTOCOL
 BB84 was the first security protocol implementing Quantum
Key Distribution.
 It uses the idea of photon polarization.
 The key consists of bits that will be transmitted as photons.
 Each bit is encoded with a random polarization basis!
 First thing is matter in it that is secure connection.
 After that the connection is secure and no need to distribution
of key again and again,
1 20
Table 1 -Comparing measurements
Alice’s Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s Bit 0 0 0 1 1
The bits allow Alice and
Bob to secure the channel
for key distribution.
× + × +
0 0 1 1
Table 2- Basis value
1 21
Table 3- Getting the final key basis
As long as no errors
and/or eavesdropping
have occurred. Alice
and Bob have now made
sure that the channel is
secure.
Alice’s
Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s
Bit 0 0 0 1 1
1 22
 The first prototype implementation of quantum
cryptography was built at IBM(International Business
Machine) on 1989.
Fig.6- First prototype
1 23
ADVANTAGES OF QUANTUM
CRYPTOGRAPHY
 Advantages of Quantum cryptography is un-hackable.
 Simple to use.
DISADVANTAGES
 Quantum cryptography the signal is currently limited to approx.
50 km.
 Setup is expensive.
1 24
FUTURE ASPECT
 Find the another path for key distribution because of the
limitation of quantum cable.
 Make it more secure , so that in future also it can’t be
hacked.
1 25
CONCLUSION
 Quantum cryptography is a major achievement in security
engineering.
 It secure our data transmission as it is never before.
 Easy to understand and easy to use.
 As it gets implemented, it will allow perfectly secure bank
transactions, secret discussions for government officials, and
well-guarded trade secrets for industry.
1 26
REFRENCES
 Miss. Payal P. Kilor, Mr.Pravin.D.Soni” Quantum Cryptography:
Realizing next generation information security”ISSN 2319 – 4847,Volume
3, Issue 2, February 2014 pp. 286-289.
 Simmon, G. J. ,“Symmetric and asymmetric encryption”, ISSN 2319 –
4847,Volume 3, Issue 2, February 2014. pp. 305-330.
 Avanindra Kumar Lal, Anju Rani, Dr. Shalini Sharma” The New
Approach of Quantum Cryptography in Network Security” ISSN 2250-
2459, Volume 3, Special Issue 2, January 2013 pp.122-126.
 G. Ananda Rao a, Muduganti Rathan Reddy” A note on Quantum
Cryptography”, ISSN : 0975-3397 Vol. 4 No. 09 Sep 2012 pp. 1540-1544
1 27
THANK YOU
1 28

More Related Content

What's hot

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Swasat Dutta
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
skadyan1
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum CryptographyBise Mond
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Shyam Mohan
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
Shahrikh Khan
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)deepu427
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
Shahrikh Khan
 
quantum cryptography
quantum cryptographyquantum cryptography
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
NARESHGOTMAL
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
Ruwan Ranganath
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
Kalluri Madhuri
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Martins Okoi
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Samy Shehata
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
Daniel938043
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
Akshay Shelake
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
Ramesh Nagappan
 
Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based Cryptography
Alexandre Augusto Giron
 

What's hot (20)

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Cryptopresentationfinal
CryptopresentationfinalCryptopresentationfinal
Cryptopresentationfinal
 
Quantum Cryptography
Quantum  CryptographyQuantum  Cryptography
Quantum Cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Key Distribution
Quantum Key DistributionQuantum Key Distribution
Quantum Key Distribution
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Seminar Report on Quantum Key Distribution
Seminar Report on Quantum Key DistributionSeminar Report on Quantum Key Distribution
Seminar Report on Quantum Key Distribution
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Quantum Cryptography presentation
Quantum Cryptography presentationQuantum Cryptography presentation
Quantum Cryptography presentation
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
 
Post Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical OverviewPost Quantum Cryptography: Technical Overview
Post Quantum Cryptography: Technical Overview
 
Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based Cryptography
 

Viewers also liked

Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
Arinto Murdopo
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
Omar Shehab
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
Karthik Mohan
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
Kalluri Madhuri
 
Retail Voice Portal
Retail Voice PortalRetail Voice Portal
Retail Voice PortalSeanHart1766
 
IB Physics Polarisation flippingphysics by Nothingnerdy
IB Physics Polarisation flippingphysics by NothingnerdyIB Physics Polarisation flippingphysics by Nothingnerdy
IB Physics Polarisation flippingphysics by Nothingnerdy
Nothingnerdy
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet Services
Maria Stylianou
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
IEEEP Karachi
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Build Lightmap system
Build Lightmap systemBuild Lightmap system
Build Lightmap system
Jaesik Hwang
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
Shyam Mohan
 
Eg 203310v010000m
Eg 203310v010000mEg 203310v010000m
Eg 203310v010000m
CAA Sudan
 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptography
spreedniels
 

Viewers also liked (16)

Quantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slideQuantum Cryptography and Possible Attacks-slide
Quantum Cryptography and Possible Attacks-slide
 
Quantum Cryptography 101
Quantum Cryptography 101Quantum Cryptography 101
Quantum Cryptography 101
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Quantum Cryptography abstract
Quantum Cryptography abstractQuantum Cryptography abstract
Quantum Cryptography abstract
 
Retail Voice Portal
Retail Voice PortalRetail Voice Portal
Retail Voice Portal
 
IB Physics Polarisation flippingphysics by Nothingnerdy
IB Physics Polarisation flippingphysics by NothingnerdyIB Physics Polarisation flippingphysics by Nothingnerdy
IB Physics Polarisation flippingphysics by Nothingnerdy
 
Intelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet ServicesIntelligent Placement of Datacenters for Internet Services
Intelligent Placement of Datacenters for Internet Services
 
Computer Science Final Project
Computer Science Final ProjectComputer Science Final Project
Computer Science Final Project
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Build Lightmap system
Build Lightmap systemBuild Lightmap system
Build Lightmap system
 
Quantum Cryptography - Seminar report
Quantum Cryptography - Seminar reportQuantum Cryptography - Seminar report
Quantum Cryptography - Seminar report
 
abledit Solutions
abledit Solutionsabledit Solutions
abledit Solutions
 
Eg 203310v010000m
Eg 203310v010000mEg 203310v010000m
Eg 203310v010000m
 
Post-Quantum Cryptography
 Post-Quantum Cryptography Post-Quantum Cryptography
Post-Quantum Cryptography
 

Similar to Naman quantum cryptography

Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
XequeMateShannon
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
sasasas14
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
ADVA
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
RohanTakke
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
ijcsa
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
MyNOG
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
IOSR Journals
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
Minahilnuman1
 
B03250609
B03250609B03250609
B03250609
theijes
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
CSNP
 
How to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsHow to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal Methods
Ofer Rivlin, CISSP
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IJNSA Journal
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
AlexWang212277
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
IJMER
 

Similar to Naman quantum cryptography (20)

Ad26188191
Ad26188191Ad26188191
Ad26188191
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
quantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdfquantumcryptography-180425230158.pdf
quantumcryptography-180425230158.pdf
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
B03250609
B03250609B03250609
B03250609
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
How to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsHow to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal Methods
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Three Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum CryptographyThree Party Authenticated Key Distribution using Quantum Cryptography
Three Party Authenticated Key Distribution using Quantum Cryptography
 

Recently uploaded

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 

Recently uploaded (20)

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 

Naman quantum cryptography

  • 1. QUANTUM CRYPTOGRAPHY A Seminar Presentation On SEMINAR COORDINATOR: Mr. Manas Singhal (Assistant Professor) SEMINAR GUIDE: Mrs.SHUCHITA SEXANA (Assistant Professor) PRESENTED BY: NAMAN KUMAR (1208231100) EC 3rd Year Section: J MIT(MORADABAD) 1
  • 2. CONTENT  Basic terms  What is cryptography?  The process  Advantages and Limitations of cryptography  RSA Crypto Scheme  OTP (One Time Pad)  Public Key Cryptography  QKD (Quantum Key Distribution)  What is quantum cryptography?  Polarization of light  Heisenberg’s Uncertainty Principle  Element of quantum theory  Qubits  Quantum communication  BB84 Protocol  Advantages and Disadvantages of Quantum cryptography  Future aspect  Conclusion  Refrences1 1
  • 3. BASIC TERMS  Plain Text -Plain text is a pure sequence of character codes. Basically its is original message.  Encryption Algorithm – It is the process of encoding messages or information in such a way that only authorized parties can read it.  Cipher Text -Cipher text is also known as encrypted or encoded information. Its is the combination of key and plain text.  Decryption Algorithm – It is reverse process of encryption.  Eavesdropping- It is secretly listening to the private conversation of others without their consent. 2
  • 4. WHAT IS CRYPTOGRAPHY?  Cryptography (derived from the Greek words kryptos and graphein meaning hidden writing) is the science of codes and ciphers.  Cryptography is the art of encoding and decoding messages of secure communications.  Cryptography is of increasing importance in our technological age using broadcast, network communications, Internet ,e-mail etc. 3 4
  • 5.  Encrypted messages can sometimes be broken by cryptanalysis, also called code-breaking, although modern cryptograph techniques are virtually unbreakable. Fig.1-Block diagram of cryptography eavesdropping 1 5
  • 6. THE PROCESS Fig. 2- Process of cryptography A -A 1 6
  • 7. ADVANTAGES OF CRYPTOGRAPHY  It hides the message and your privacy is safe.  Only the person who have the key would be able to read the desired message. LIMITATIONS  Key can be hacked easily.  Not efficient. 1 7
  • 8. RSA CRYPTOGRAPHY  RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman.  RSA consist a single key. It provide more security but still it can be hacked. It take lot of time to generate and regenerate the code. 1 8
  • 9. OTP (ONE TIME PAD)  One-time pad (OTP) is an encryption technique that cannot be cracked if used correctly. Fig.3- Example of one time pad 1 9
  • 10.  Here the problem raises how to get the key to the decrypting party safely or how to keep both keys secure.  One-time pads have sometimes been used when the both parties started out at the same physical location and then separated, each with knowledge of the keys in the one-time pad.  The key used in a one-time pad is called a secret key.  Ideally destroy the key after use, to make your data to more secure.  Key distribution problem led to the invention of public key cryptography. 1 10
  • 11. PUBLIC KEY CRYPTOGRAPHY  Public-key cryptography, also known as asymmetric cryptography.  Requires two separate key, one of which is secret (or private) and one of which is public.  It has better speed and less complicated then RSA and one time pad .  But still there is a problem that is , it can also be hacked. 1 11
  • 12. QUANTUM KEY DISTRIBUTION  Quantum key distribution (QKD) uses quantum mechanics to guarantee secure communication.  Quantum Key Distribution tell us all attempts of eavesdropping.  Quantum key distribution is only used to produce and distribute a key, not to transmit any message data  It enables two parties to produce a shared random bit string known only to them, which can be used as a key for encryption and decryption. 1 12
  • 13. It is more secure then others schemes. There is a problem that the finest optical fiber have limit of 50 km. 1 13
  • 14. WHAT IS QUANTUM CRYPTOGRAPHY ?  Although the field of cryptography is ancient, but it is not static. Quantum cryptography is a relatively new concept in cryptography.  Basically quantum cryptography is combination of OTP and QKD.  Quantum cryptography is based on two important principles – a) Polarization of light. b) Heisenberg’s uncertainty principle. 1 14
  • 15. POLARIZATION OF LIGHT  Polarized light waves are light waves in which the vibrations occur in a single plane.  The process of transforming unpolarized light into polarized light is known as polarization.  Symbols:- Horizontal polarizations→ Vertical polarization - ↑ 45° polarization - ↗ 135° polarization - ↖ Fig.4- Polarization of light 1 15
  • 16. HEISENBERG’S UNCERTANITY PRINCIPLE  According to the principle two interrelated properties cannot be measured individually without affecting the other.  The principle is that you cannot partition the photon into two halves without affect it value.  So if someone tries to detect the state of photons being send over to the receiver the error can be detected. 1 16
  • 17. ELEMENT OF QUANTAM CRYPTOGRAPHY  Light waves are propagated as discrete quanta called photons.  Photons are massless but they have energy, momentum and angular momentum which is called spin.  Spin carries the polarization.  If on its way we put a polarization filter a photon may pass through it or may not.  We can use a detector to check of a photon that has passed through a filter 1 17
  • 18. QUBITS  A quantum bit or qubit is a unit of quantum information.  Qubits are not like to simple bits because they have equal possibility.  Exists as a ‘0’, a ‘1’ or simultaneously as a superposition of both ‘0’ & ‘1’ .  Though the amount of information that can be retrieved in a single qubit is equal to one bit, the difference lies in the processing of information. 1 18
  • 19. QUANTUM COMMUNICATION Here the message is send through the public network where as key send is through quantum channel. Fig.5- Quantum communication 1 19
  • 20. BB84 PROTOCOL  BB84 was the first security protocol implementing Quantum Key Distribution.  It uses the idea of photon polarization.  The key consists of bits that will be transmitted as photons.  Each bit is encoded with a random polarization basis!  First thing is matter in it that is secure connection.  After that the connection is secure and no need to distribution of key again and again, 1 20
  • 21. Table 1 -Comparing measurements Alice’s Bit 0 1 0 1 1 Alice’s Basis + × × + × Photon Bob’s Basis + + × + × Bob’s Bit 0 0 0 1 1 The bits allow Alice and Bob to secure the channel for key distribution. × + × + 0 0 1 1 Table 2- Basis value 1 21
  • 22. Table 3- Getting the final key basis As long as no errors and/or eavesdropping have occurred. Alice and Bob have now made sure that the channel is secure. Alice’s Bit 0 1 0 1 1 Alice’s Basis + × × + × Photon Bob’s Basis + + × + × Bob’s Bit 0 0 0 1 1 1 22
  • 23.  The first prototype implementation of quantum cryptography was built at IBM(International Business Machine) on 1989. Fig.6- First prototype 1 23
  • 24. ADVANTAGES OF QUANTUM CRYPTOGRAPHY  Advantages of Quantum cryptography is un-hackable.  Simple to use. DISADVANTAGES  Quantum cryptography the signal is currently limited to approx. 50 km.  Setup is expensive. 1 24
  • 25. FUTURE ASPECT  Find the another path for key distribution because of the limitation of quantum cable.  Make it more secure , so that in future also it can’t be hacked. 1 25
  • 26. CONCLUSION  Quantum cryptography is a major achievement in security engineering.  It secure our data transmission as it is never before.  Easy to understand and easy to use.  As it gets implemented, it will allow perfectly secure bank transactions, secret discussions for government officials, and well-guarded trade secrets for industry. 1 26
  • 27. REFRENCES  Miss. Payal P. Kilor, Mr.Pravin.D.Soni” Quantum Cryptography: Realizing next generation information security”ISSN 2319 – 4847,Volume 3, Issue 2, February 2014 pp. 286-289.  Simmon, G. J. ,“Symmetric and asymmetric encryption”, ISSN 2319 – 4847,Volume 3, Issue 2, February 2014. pp. 305-330.  Avanindra Kumar Lal, Anju Rani, Dr. Shalini Sharma” The New Approach of Quantum Cryptography in Network Security” ISSN 2250- 2459, Volume 3, Special Issue 2, January 2013 pp.122-126.  G. Ananda Rao a, Muduganti Rathan Reddy” A note on Quantum Cryptography”, ISSN : 0975-3397 Vol. 4 No. 09 Sep 2012 pp. 1540-1544 1 27