Naman Kumar presented on the topic of quantum cryptography. The presentation covered basic cryptography terms and techniques like encryption, decryption, and public key cryptography. It then discussed quantum key distribution and how it uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute encryption keys. The popular BB84 protocol was explained, which uses photon polarization to randomly generate and securely transmit encryption keys. Quantum cryptography provides unhackable secure communication up to 50km but has high setup costs. It could allow for perfectly secure transactions and communications in the future.
The role of quantum cryptography in today's world and how it was used in the 2003 fifa world cup and the advances quantum cryptography is making in providing security and showing that how it is next step in the security world.
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. Currently used popular public-key encryption and signature schemes can be broken by quantum adversaries. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. For example, it is impossible to copy data encoded in a quantum state and the very act of reading data encoded in a quantum state changes the state. This is used to detect eavesdropping in quantum key distribution.
A brief presentation on Position-Based, Device-Independent and Post Quantum Cryptographies. Detailing Position-Based QC, defining Device-Independent QC and discussing Post Device-Independent.
With the introduction of quantum computing on the horizon, computer security organizations are stepping up research and development to defend against a new kind of computer power. Quantum computers pose a very real threat to the global information technology infrastructure of today. Many security implementations in use based on the difficulty for modern-day computers to perform large integer factorization. Utilizing a specialized algorithm such as mathematician Peter Shor’s, a quantum computer can compute large integer factoring in polynomial time versus classical computing’s sub-exponential time. This theoretical exponential increase in computing speed has prompted computer security experts around the world to begin preparing by devising new and improved cryptography methods. If the proper measures are not in place by the time full-scale quantum computers produced, the world’s governments and major enterprises could suffer from security breaches and the loss of massive amounts of encrypted data
Apresentação sobre Criptografia baseada em reticulados (lattices), realizada no contexto da disciplina de Post-Quantum Cryptography do PPGCC da UFSC.
Versão odp: http://coenc.td.utfpr.edu.br/~giron/presentations/aula_lattice.odp
The role of quantum cryptography in today's world and how it was used in the 2003 fifa world cup and the advances quantum cryptography is making in providing security and showing that how it is next step in the security world.
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. Currently used popular public-key encryption and signature schemes can be broken by quantum adversaries. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. For example, it is impossible to copy data encoded in a quantum state and the very act of reading data encoded in a quantum state changes the state. This is used to detect eavesdropping in quantum key distribution.
A brief presentation on Position-Based, Device-Independent and Post Quantum Cryptographies. Detailing Position-Based QC, defining Device-Independent QC and discussing Post Device-Independent.
With the introduction of quantum computing on the horizon, computer security organizations are stepping up research and development to defend against a new kind of computer power. Quantum computers pose a very real threat to the global information technology infrastructure of today. Many security implementations in use based on the difficulty for modern-day computers to perform large integer factorization. Utilizing a specialized algorithm such as mathematician Peter Shor’s, a quantum computer can compute large integer factoring in polynomial time versus classical computing’s sub-exponential time. This theoretical exponential increase in computing speed has prompted computer security experts around the world to begin preparing by devising new and improved cryptography methods. If the proper measures are not in place by the time full-scale quantum computers produced, the world’s governments and major enterprises could suffer from security breaches and the loss of massive amounts of encrypted data
Apresentação sobre Criptografia baseada em reticulados (lattices), realizada no contexto da disciplina de Post-Quantum Cryptography do PPGCC da UFSC.
Versão odp: http://coenc.td.utfpr.edu.br/~giron/presentations/aula_lattice.odp
Intelligent Placement of Datacenters for Internet ServicesMaria Stylianou
Course: Execution Environments for Distributed Computing 6th Presentation (10-15min):
Intelligent Placement of Datacenters for Internet Services
Source: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5961695
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. Currently used popular public-key encryption and signature schemes can be broken by quantum adversaries. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical communication. For example, it is impossible to copy data encoded in a quantum state and the very act of reading data encoded in a quantum state changes the state. This is used to detect eavesdropping in quantum key distribution.
Quantum cryptography can, in principle, provide unconditional security guaranteed by the law of physics only. Here, we survey the theory and practice of the subject and highlight some recent developments.
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows two
parties to produce a shared random bit string known only to them. These random bits can be used as a key
to encrypt and decrypt messages. The most important and unique property of quantum cryptography is the
ability of the two communicating users to detect the presence of any third party trying to gain knowledge of
the key. It is based on fundamental aspects of quantum mechanics. By using quantum entanglement or
quantum super positions and transmitting information in quantum states, a communication system can be
implemented which detects eavesdropping. Quantum cryptography is used to produce and distribute a key,
not to transmit any message data. This key along with certain encryption algorithm, is used to encrypt (and
decrypt) a message, which can then be transmitted over a standard communication channel. This paper
concentrates on comparison between classical and quantum cryptography as well as survey on various
quantum key distribution protocols used to generate and distribute the key among communicating parties.
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...MyNOG
In this presentation we will review how already available quantum technology can help improve well known security mechanisms and protocols. Next we will explore how close (or far away) a quantum internet is and if it will even be fully quantum.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
How to hack cryptographic protocols with Formal MethodsOfer Rivlin, CISSP
Presented at OWASP AppSec-IL conference, 2018
Video at: https://youtu.be/3G5U8HhfJlI
https://appsecisrael2018.sched.com/event/Fvqr/how-to-hack-cryptographic-protocols-with-formal-methods
The design of even the smallest security protocols is prone to vulnerabilities. For example, the security protocols of federation & connected cars networks are extremely complex. I explore the use of formal methods for automating validation and hacking cryptographic protocols
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it was noted that quantum computers could break public key cryptosystems based on number theory. Actually, the progress of research in this field allows the implementation of QKD outside of laboratories. Efforts are made to exploit this technology in the existing communication networks and to improve the performance and reliability of the implemented technologies. Some research is in progress for the integration of QKD with the protocols in different layers of OSI model. The examples of such research effort are the integration of QKD in point-to-point protocol (PPP) OSI layer 2 and the integration of QKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technology for enhancing the security of modern computing applications on the internet. In this paper, we present a
novel extension of the TLS protocol based on QKD. We introduce a scheme for integrating Quantum Cryptography in this protocol. Our approach improves the security of the process of authentication and data encryption. Also, we describe an example to illustrate the feasibility of our scheme’s implementation.
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
2. CONTENT
Basic terms
What is cryptography?
The process
Advantages and Limitations of cryptography
RSA Crypto Scheme
OTP (One Time Pad)
Public Key Cryptography
QKD (Quantum Key Distribution)
What is quantum cryptography?
Polarization of light
Heisenberg’s Uncertainty Principle
Element of quantum theory
Qubits
Quantum communication
BB84 Protocol
Advantages and Disadvantages of Quantum cryptography
Future aspect
Conclusion
Refrences1
1
3. BASIC TERMS
Plain Text -Plain text is a pure sequence of character codes.
Basically its is original message.
Encryption Algorithm – It is the process of encoding
messages or information in such a way that only authorized
parties can read it.
Cipher Text -Cipher text is also known as encrypted or
encoded information. Its is the combination of key and plain
text.
Decryption Algorithm – It is reverse process of encryption.
Eavesdropping- It is secretly listening to the private
conversation of others without their consent.
2
4. WHAT IS CRYPTOGRAPHY?
Cryptography (derived from the Greek words kryptos and
graphein meaning hidden writing) is the science of codes and
ciphers.
Cryptography is the art of encoding and decoding messages of
secure communications.
Cryptography is of increasing importance in our technological
age using broadcast, network communications, Internet ,e-mail
etc.
3
4
5. Encrypted messages can sometimes be broken by
cryptanalysis, also called code-breaking, although modern
cryptograph techniques are virtually unbreakable.
Fig.1-Block diagram of cryptography
eavesdropping
1 5
7. ADVANTAGES OF CRYPTOGRAPHY
It hides the message and your privacy is safe.
Only the person who have the key would be able to
read the desired message.
LIMITATIONS
Key can be hacked easily.
Not efficient.
1 7
8. RSA CRYPTOGRAPHY
RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman.
RSA consist a single key.
It provide more security but still it can be hacked.
It take lot of time to generate and regenerate the code.
1 8
9. OTP (ONE TIME PAD)
One-time pad (OTP) is an encryption technique that cannot be
cracked if used correctly.
Fig.3- Example of one time pad
1 9
10. Here the problem raises how to get the key to the decrypting
party safely or how to keep both keys secure.
One-time pads have sometimes been used when the both
parties started out at the same physical location and then
separated, each with knowledge of the keys in the one-time
pad.
The key used in a one-time pad is called a secret key.
Ideally destroy the key after use, to make your data to more
secure.
Key distribution problem led to the invention of public
key cryptography.
1 10
11. PUBLIC KEY CRYPTOGRAPHY
Public-key cryptography, also known as asymmetric
cryptography.
Requires two separate key, one of which is secret (or private)
and one of which is public.
It has better speed and less complicated then RSA and one time
pad .
But still there is a problem that is , it can also be hacked.
1 11
12. QUANTUM KEY DISTRIBUTION
Quantum key distribution (QKD) uses quantum mechanics
to guarantee secure communication.
Quantum Key Distribution tell us all attempts of
eavesdropping.
Quantum key distribution is only used to produce and
distribute a key, not to transmit any message data
It enables two parties to produce a shared random bit string
known only to them, which can be used as a key for
encryption and decryption.
1 12
13. It is more secure then others schemes.
There is a problem that the finest optical fiber have limit
of 50 km.
1 13
14. WHAT IS QUANTUM CRYPTOGRAPHY ?
Although the field of cryptography is ancient, but it is not
static. Quantum cryptography is a relatively new concept in
cryptography.
Basically quantum cryptography is combination of OTP and
QKD.
Quantum cryptography is based on two important
principles –
a) Polarization of light.
b) Heisenberg’s uncertainty principle.
1 14
15. POLARIZATION OF LIGHT
Polarized light waves are light waves in which the
vibrations occur in a single plane.
The process of transforming unpolarized
light into polarized light is known as polarization.
Symbols:-
Horizontal polarizations→
Vertical polarization - ↑
45° polarization - ↗
135° polarization - ↖
Fig.4- Polarization of light
1 15
16. HEISENBERG’S UNCERTANITY PRINCIPLE
According to the principle two interrelated properties
cannot be measured individually without affecting the
other.
The principle is that you cannot partition the photon
into two halves without affect it value.
So if someone tries to detect the state of photons being
send over to the receiver the error can be detected.
1 16
17. ELEMENT OF QUANTAM CRYPTOGRAPHY
Light waves are propagated as discrete quanta called photons.
Photons are massless but they have energy, momentum and
angular momentum which is called spin.
Spin carries the polarization.
If on its way we put a polarization filter a photon may pass
through it or may not.
We can use a detector to check of a photon that has passed
through a filter
1 17
18. QUBITS
A quantum bit or qubit is a unit of quantum information.
Qubits are not like to simple bits because they have equal
possibility.
Exists as a ‘0’, a ‘1’ or simultaneously as a superposition
of both ‘0’ & ‘1’ .
Though the amount of information that can be retrieved in
a single qubit is equal to one bit, the difference lies in the
processing of information.
1 18
19. QUANTUM COMMUNICATION
Here the message is send through the public network where as
key send is through quantum channel.
Fig.5- Quantum communication
1 19
20. BB84 PROTOCOL
BB84 was the first security protocol implementing Quantum
Key Distribution.
It uses the idea of photon polarization.
The key consists of bits that will be transmitted as photons.
Each bit is encoded with a random polarization basis!
First thing is matter in it that is secure connection.
After that the connection is secure and no need to distribution
of key again and again,
1 20
21. Table 1 -Comparing measurements
Alice’s Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s Bit 0 0 0 1 1
The bits allow Alice and
Bob to secure the channel
for key distribution.
× + × +
0 0 1 1
Table 2- Basis value
1 21
22. Table 3- Getting the final key basis
As long as no errors
and/or eavesdropping
have occurred. Alice
and Bob have now made
sure that the channel is
secure.
Alice’s
Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s
Bit 0 0 0 1 1
1 22
23. The first prototype implementation of quantum
cryptography was built at IBM(International Business
Machine) on 1989.
Fig.6- First prototype
1 23
24. ADVANTAGES OF QUANTUM
CRYPTOGRAPHY
Advantages of Quantum cryptography is un-hackable.
Simple to use.
DISADVANTAGES
Quantum cryptography the signal is currently limited to approx.
50 km.
Setup is expensive.
1 24
25. FUTURE ASPECT
Find the another path for key distribution because of the
limitation of quantum cable.
Make it more secure , so that in future also it can’t be
hacked.
1 25
26. CONCLUSION
Quantum cryptography is a major achievement in security
engineering.
It secure our data transmission as it is never before.
Easy to understand and easy to use.
As it gets implemented, it will allow perfectly secure bank
transactions, secret discussions for government officials, and
well-guarded trade secrets for industry.
1 26
27. REFRENCES
Miss. Payal P. Kilor, Mr.Pravin.D.Soni” Quantum Cryptography:
Realizing next generation information security”ISSN 2319 – 4847,Volume
3, Issue 2, February 2014 pp. 286-289.
Simmon, G. J. ,“Symmetric and asymmetric encryption”, ISSN 2319 –
4847,Volume 3, Issue 2, February 2014. pp. 305-330.
Avanindra Kumar Lal, Anju Rani, Dr. Shalini Sharma” The New
Approach of Quantum Cryptography in Network Security” ISSN 2250-
2459, Volume 3, Special Issue 2, January 2013 pp.122-126.
G. Ananda Rao a, Muduganti Rathan Reddy” A note on Quantum
Cryptography”, ISSN : 0975-3397 Vol. 4 No. 09 Sep 2012 pp. 1540-1544
1 27