Naman Kumar presented on the topic of quantum cryptography. The presentation covered basic cryptography terms and techniques like encryption, decryption, and public key cryptography. It then discussed quantum key distribution and how it uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute encryption keys. The popular BB84 protocol was explained, which uses polarized photons to generate a shared private key. Quantum cryptography offers information-theoretic security and can detect eavesdropping, but current technology limits quantum communication distances to around 50km. The presentation concluded by discussing the future potential of quantum cryptography to enable perfectly secure communication.
This document discusses quantum cryptography and its advantages over classical cryptography. It introduces the key distribution problem in classical cryptography. Quantum cryptography uses principles of quantum mechanics like quantum bits that cannot be copied and photon polarization to securely distribute keys. The document describes the BB84 protocol for quantum key distribution where Alice and Bob use different polarization bases to generate a random key and detect eavesdropping. While promising, challenges remain in scaling the technology to longer distances and developing affordable devices.
This document summarizes a seminar on quantum cryptography. It begins with an overview of cryptography and introduces quantum cryptography as a way to securely distribute encryption keys using the laws of quantum mechanics. It then covers the theoretical background of quantum cryptography, including how the Heisenberg uncertainty principle and no-cloning theorem enable secure key exchange. The document outlines the BB84 quantum key distribution protocol and discusses various attacks and vulnerabilities and how they can be addressed. It concludes by discussing the current state and future prospects of quantum cryptography technology.
This document summarizes quantum cryptography and the BB84 protocol. It discusses how quantum cryptography can securely transmit encryption keys using quantum properties like photon polarization. The BB84 protocol, developed in 1984 by Bennett and Brassard, was the first quantum cryptographic protocol and is based on generating secret keys for encryption via single photon polarization or entanglement. It ensures detection of eavesdropping during key distribution through disturbance of quantum data from listening.
This document provides an overview of quantum cryptography and key distribution. It discusses:
1) The limitations of modern public key cryptography in being vulnerable to advances in computing power and mathematics.
2) The principles of quantum cryptography including photon polarization and the Heisenberg uncertainty principle.
3) How quantum key distribution works using polarized photons to randomly generate encryption keys between two parties.
4) Real-world implementations of quantum key distribution including sifting, error correction, and privacy amplification protocols.
This document provides an introduction to quantum cryptography. It explains that quantum cryptography uses principles of quantum mechanics like quantum entanglement and the Heisenberg uncertainty principle to securely distribute encryption keys. It notes that quantum cryptography combines the concepts of one-time pads and quantum key distribution, using quantum mechanics to detect any attempts at eavesdropping. The document also briefly discusses the history of cryptography, how quantum key distribution works, advantages and disadvantages of quantum cryptography, and its future applications.
Quantum cryptography can, in principle, provide unconditional security guaranteed by the law of physics only. Here, we survey the theory and practice of the subject and highlight some recent developments.
Quantum cryptography provides a secure way to exchange encryption keys. It uses principles of quantum mechanics like photon polarization and the uncertainty principle to detect eavesdropping. The most common protocol is BB84, where Alice encodes random bits in one of two polarization bases and sends photons to Bob. Bob measures in a random basis, and they test for errors to check for eavesdropping before using the key. Quantum key distribution exploits these effects to securely generate encryption keys known only to the communicating parties. The no-cloning theorem guarantees privacy by making unauthorized copying of quantum states impossible.
Quantum cryptography provides a secure way to exchange encryption keys. It uses principles of quantum mechanics like photon polarization and the uncertainty principle to detect eavesdropping. The most common protocol is BB84, where Alice encodes random bits in one of four polarization states and Bob measures them randomly. They compare bases to detect errors from eavesdropping. If no errors, the bits form a shared encryption key known only to them. Quantum key distribution exploits these effects to securely generate encryption keys between two parties.
This document discusses quantum cryptography and its advantages over classical cryptography. It introduces the key distribution problem in classical cryptography. Quantum cryptography uses principles of quantum mechanics like quantum bits that cannot be copied and photon polarization to securely distribute keys. The document describes the BB84 protocol for quantum key distribution where Alice and Bob use different polarization bases to generate a random key and detect eavesdropping. While promising, challenges remain in scaling the technology to longer distances and developing affordable devices.
This document summarizes a seminar on quantum cryptography. It begins with an overview of cryptography and introduces quantum cryptography as a way to securely distribute encryption keys using the laws of quantum mechanics. It then covers the theoretical background of quantum cryptography, including how the Heisenberg uncertainty principle and no-cloning theorem enable secure key exchange. The document outlines the BB84 quantum key distribution protocol and discusses various attacks and vulnerabilities and how they can be addressed. It concludes by discussing the current state and future prospects of quantum cryptography technology.
This document summarizes quantum cryptography and the BB84 protocol. It discusses how quantum cryptography can securely transmit encryption keys using quantum properties like photon polarization. The BB84 protocol, developed in 1984 by Bennett and Brassard, was the first quantum cryptographic protocol and is based on generating secret keys for encryption via single photon polarization or entanglement. It ensures detection of eavesdropping during key distribution through disturbance of quantum data from listening.
This document provides an overview of quantum cryptography and key distribution. It discusses:
1) The limitations of modern public key cryptography in being vulnerable to advances in computing power and mathematics.
2) The principles of quantum cryptography including photon polarization and the Heisenberg uncertainty principle.
3) How quantum key distribution works using polarized photons to randomly generate encryption keys between two parties.
4) Real-world implementations of quantum key distribution including sifting, error correction, and privacy amplification protocols.
This document provides an introduction to quantum cryptography. It explains that quantum cryptography uses principles of quantum mechanics like quantum entanglement and the Heisenberg uncertainty principle to securely distribute encryption keys. It notes that quantum cryptography combines the concepts of one-time pads and quantum key distribution, using quantum mechanics to detect any attempts at eavesdropping. The document also briefly discusses the history of cryptography, how quantum key distribution works, advantages and disadvantages of quantum cryptography, and its future applications.
Quantum cryptography can, in principle, provide unconditional security guaranteed by the law of physics only. Here, we survey the theory and practice of the subject and highlight some recent developments.
Quantum cryptography provides a secure way to exchange encryption keys. It uses principles of quantum mechanics like photon polarization and the uncertainty principle to detect eavesdropping. The most common protocol is BB84, where Alice encodes random bits in one of two polarization bases and sends photons to Bob. Bob measures in a random basis, and they test for errors to check for eavesdropping before using the key. Quantum key distribution exploits these effects to securely generate encryption keys known only to the communicating parties. The no-cloning theorem guarantees privacy by making unauthorized copying of quantum states impossible.
Quantum cryptography provides a secure way to exchange encryption keys. It uses principles of quantum mechanics like photon polarization and the uncertainty principle to detect eavesdropping. The most common protocol is BB84, where Alice encodes random bits in one of four polarization states and Bob measures them randomly. They compare bases to detect errors from eavesdropping. If no errors, the bits form a shared encryption key known only to them. Quantum key distribution exploits these effects to securely generate encryption keys between two parties.
Helmut Griesser from ADVA Optical Networking discusses quantum-safe cryptography and quantum key distribution. He explains that quantum computers pose a threat to current public key encryption algorithms. Quantum key distribution provides absolute security by using quantum properties, but has limitations such as decreasing key rates with distance. Post-quantum or quantum-safe cryptography relies on unproven computational assumptions rather than physical properties. The best approach may be to combine diverse key exchange mechanisms like post-quantum, quantum key distribution, and classic public key encryption to strengthen security.
Quantum cryptography a modern cryptographic securityKamal Diwakar
This document provides an overview of quantum cryptography. It begins with introductions to traditional cryptography and quantum cryptography. Quantum cryptography relies on principles of quantum mechanics like the Heisenberg uncertainty principle and photon polarization to securely distribute keys. It explains that quantum key distribution is needed because secure key distribution is not possible with traditional communications, but is possible using quantum communications. The document then discusses why quantum cryptography is needed, what problem quantum key distribution solves, and that deploying quantum key distribution systems is not complex. It also outlines two types of quantum cryptography - position-based and post-quantum cryptography. Finally, it provides an example of an existing quantum network and concludes that quantum cryptography could be the first application of quantum mechanics at the single particle level
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
This document summarizes and compares several quantum key distribution protocols:
- BB84 protocol was the first protocol proposed in 1984 by Bennett and Brassard, using photon polarization in two bases to randomly encode bits.
- BBM92 protocol is a modified version using only two states instead of four.
- SARG04 protocol was proposed in 2004 and is more secure than BB84 in the presence of photon number splitting attacks.
- E91 protocol proposed in 1992 uses quantum entanglement of photon pairs, making it more secure than protocols based on Heisenberg's uncertainty principle.
- COW protocol from 2004 is experimentally simple and resistant to various attacks when using weak coherent pulses.
- DPS protocol encodes bits
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...MyNOG
In this presentation we will review how already available quantum technology can help improve well known security mechanisms and protocols. Next we will explore how close (or far away) a quantum internet is and if it will even be fully quantum.
This document summarizes a research paper on deniable encryption. The paper proposes a receiver-deniable public key encryption scheme with the following properties:
1) It is a one-move scheme that does not require any pre-encryption communication between the sender and receiver.
2) It does not require any pre-shared secrets between parties.
3) It provides strong deniability equivalent to factoring a large composite number.
4) It has no decryption errors.
5) It significantly improves bandwidth efficiency compared to previous schemes.
The proposed scheme uses a mediated RSA infrastructure and relies on oblivious transfer between the receiver and security mediator to enable deniability for the receiver.
This document provides an overview of an Nt1310 Unit 6 Powerpoint presentation with the following key points:
1. The setup phase takes in a security parameter and selects a bilinear group with generator b. It selects attributes, exponents, and generates public and master keys.
2. The key generation phase takes a set of attributes as input and produces a secret key equivalent to those attributes. It selects a random number and calculates the key.
3. The encryption phase is not described in detail in this excerpt.
Quantum computing has the potential to revolutionize many fields including cryptography. Quantum computing can solve mathematical problems that current cryptography relies on, like factoring large numbers, much faster than classical computers. This would make current encryption methods vulnerable to attacks. Researchers are developing new quantum-resistant cryptography methods and quantum key distribution to secure communication as quantum computing advances.
Quantum cryptography uses principles of quantum mechanics to securely distribute encryption keys between two parties. It allows Alice and Bob to detect if an eavesdropper (Eve) is trying to intercept the key during transmission. Eve's attempt to measure the quantum states used to transmit the key would introduce detectable errors. The document discusses the history and principles of quantum cryptography, including types like discrete and continuous variable QKD. It also covers desirable attributes like confidentiality and rapid key delivery, providing an example of how quantum key distribution works between Alice and Bob.
This document discusses quantum cryptography and its advantages over traditional cryptography. It begins by introducing cryptography and its goal of maintaining confidentiality of data. It then describes how quantum cryptography uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute keys. The document reviews existing quantum cryptography protocols like BB84 and E91. It also discusses challenges in technologies for generating and detecting single photons needed for quantum cryptography. In conclusion, the document explains how quantum cryptography provides secure key distribution using physics rather than mathematics, making it more secure than other cryptographic techniques.
This document discusses quantum cryptography and its advantages over traditional cryptography. It begins by introducing cryptography and its goal of maintaining confidentiality of data. It then describes how quantum cryptography uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute keys. The document reviews existing quantum cryptography protocols like BB84 and E91. It also discusses challenges in technologies for generating and detecting single photons needed for quantum cryptography. In conclusion, the document explains how quantum cryptography provides secure key distribution using physics rather than mathematics, making it more secure than other cryptographic techniques.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This document provides an introduction to post-quantum cryptography. It discusses how quantum computers could break current public key cryptography and outlines several approaches to post-quantum cryptography, including lattice-based, code-based, multivariate, hash-based, and isogeny-based cryptography. It summarizes the National Institute of Standards and Technology's post-quantum cryptography standardization project and competition, which is evaluating these approaches.
Quantum cryptography uses principles of quantum mechanics to guarantee secure communication. It allows two parties to generate a shared random key that can be used to encrypt and decrypt messages. There are two main approaches - using polarized photons or entangled photons. Information reconciliation and privacy amplification protocols are used to ensure the keys between the two parties are identical and an eavesdropper gains no information. While traditional man-in-the-middle attacks are impossible, future work aims to increase transmission distances including to satellites. Several research groups and companies are conducting research on quantum cryptography.
How to hack cryptographic protocols with Formal MethodsOfer Rivlin, CISSP
The document discusses using formal methods and model checking to analyze the security of cryptographic protocols. It presents a mutual authentication protocol as an example. Model checking involves defining a system as a finite-state machine model and then exhaustively checking all possible behaviors against security properties to identify vulnerabilities. The document demonstrates analyzing the example protocol using the AVISPA and Tamarin Prover tools, finding an attack on the original protocol but not on an updated version. It also discusses more advanced techniques like model learning and comparing learned models to specifications.
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it was noted that quantum computers could break public key cryptosystems based on number theory. Actually, the progress of research in this field allows the implementation of QKD outside of laboratories. Efforts are made to exploit this technology in the existing communication networks and to improve the performance and reliability of the implemented technologies. Some research is in progress for the integration of QKD with the protocols in different layers of OSI model. The examples of such research effort are the integration of QKD in point-to-point protocol (PPP) OSI layer 2 and the integration of QKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technology for enhancing the security of modern computing applications on the internet. In this paper, we present a
novel extension of the TLS protocol based on QKD. We introduce a scheme for integrating Quantum Cryptography in this protocol. Our approach improves the security of the process of authentication and data encryption. Also, we describe an example to illustrate the feasibility of our scheme’s implementation.
Alex WANG - What is the most effective cryptosystem for public-key encryption?AlexWang212277
The document discusses several cryptosystems used for public-key encryption, including RSA, Diffie-Hellman key exchange, and elliptic curve cryptography. It provides background on necessary mathematical concepts like modular arithmetic, primes, and discrete logarithms. The author analyzes the security, efficiency, and ability to withstand large adversaries of each cryptosystem to determine the most effective for public-key encryption.
The document describes a thesis submitted by Amogh Mahapatra and Rajballav Dash for their Bachelor of Technology degree. It examines using the Hill cipher technique and self-repetitive matrices for data encryption and decryption. Specifically, it proposes an innovation to the conventional Hill cipher method using the concept of self-repetitive matrices. This approach is mathematically derived and implemented to simulate a communication channel with compression techniques. The method aims to address issues with inverting the Hill cipher's multiplicative matrix by using periodically repeating matrices.
Helmut Griesser from ADVA Optical Networking discusses quantum-safe cryptography and quantum key distribution. He explains that quantum computers pose a threat to current public key encryption algorithms. Quantum key distribution provides absolute security by using quantum properties, but has limitations such as decreasing key rates with distance. Post-quantum or quantum-safe cryptography relies on unproven computational assumptions rather than physical properties. The best approach may be to combine diverse key exchange mechanisms like post-quantum, quantum key distribution, and classic public key encryption to strengthen security.
Quantum cryptography a modern cryptographic securityKamal Diwakar
This document provides an overview of quantum cryptography. It begins with introductions to traditional cryptography and quantum cryptography. Quantum cryptography relies on principles of quantum mechanics like the Heisenberg uncertainty principle and photon polarization to securely distribute keys. It explains that quantum key distribution is needed because secure key distribution is not possible with traditional communications, but is possible using quantum communications. The document then discusses why quantum cryptography is needed, what problem quantum key distribution solves, and that deploying quantum key distribution systems is not complex. It also outlines two types of quantum cryptography - position-based and post-quantum cryptography. Finally, it provides an example of an existing quantum network and concludes that quantum cryptography could be the first application of quantum mechanics at the single particle level
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
This document summarizes and compares several quantum key distribution protocols:
- BB84 protocol was the first protocol proposed in 1984 by Bennett and Brassard, using photon polarization in two bases to randomly encode bits.
- BBM92 protocol is a modified version using only two states instead of four.
- SARG04 protocol was proposed in 2004 and is more secure than BB84 in the presence of photon number splitting attacks.
- E91 protocol proposed in 1992 uses quantum entanglement of photon pairs, making it more secure than protocols based on Heisenberg's uncertainty principle.
- COW protocol from 2004 is experimentally simple and resistant to various attacks when using weak coherent pulses.
- DPS protocol encodes bits
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...MyNOG
In this presentation we will review how already available quantum technology can help improve well known security mechanisms and protocols. Next we will explore how close (or far away) a quantum internet is and if it will even be fully quantum.
This document summarizes a research paper on deniable encryption. The paper proposes a receiver-deniable public key encryption scheme with the following properties:
1) It is a one-move scheme that does not require any pre-encryption communication between the sender and receiver.
2) It does not require any pre-shared secrets between parties.
3) It provides strong deniability equivalent to factoring a large composite number.
4) It has no decryption errors.
5) It significantly improves bandwidth efficiency compared to previous schemes.
The proposed scheme uses a mediated RSA infrastructure and relies on oblivious transfer between the receiver and security mediator to enable deniability for the receiver.
This document provides an overview of an Nt1310 Unit 6 Powerpoint presentation with the following key points:
1. The setup phase takes in a security parameter and selects a bilinear group with generator b. It selects attributes, exponents, and generates public and master keys.
2. The key generation phase takes a set of attributes as input and produces a secret key equivalent to those attributes. It selects a random number and calculates the key.
3. The encryption phase is not described in detail in this excerpt.
Quantum computing has the potential to revolutionize many fields including cryptography. Quantum computing can solve mathematical problems that current cryptography relies on, like factoring large numbers, much faster than classical computers. This would make current encryption methods vulnerable to attacks. Researchers are developing new quantum-resistant cryptography methods and quantum key distribution to secure communication as quantum computing advances.
Quantum cryptography uses principles of quantum mechanics to securely distribute encryption keys between two parties. It allows Alice and Bob to detect if an eavesdropper (Eve) is trying to intercept the key during transmission. Eve's attempt to measure the quantum states used to transmit the key would introduce detectable errors. The document discusses the history and principles of quantum cryptography, including types like discrete and continuous variable QKD. It also covers desirable attributes like confidentiality and rapid key delivery, providing an example of how quantum key distribution works between Alice and Bob.
This document discusses quantum cryptography and its advantages over traditional cryptography. It begins by introducing cryptography and its goal of maintaining confidentiality of data. It then describes how quantum cryptography uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute keys. The document reviews existing quantum cryptography protocols like BB84 and E91. It also discusses challenges in technologies for generating and detecting single photons needed for quantum cryptography. In conclusion, the document explains how quantum cryptography provides secure key distribution using physics rather than mathematics, making it more secure than other cryptographic techniques.
This document discusses quantum cryptography and its advantages over traditional cryptography. It begins by introducing cryptography and its goal of maintaining confidentiality of data. It then describes how quantum cryptography uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute keys. The document reviews existing quantum cryptography protocols like BB84 and E91. It also discusses challenges in technologies for generating and detecting single photons needed for quantum cryptography. In conclusion, the document explains how quantum cryptography provides secure key distribution using physics rather than mathematics, making it more secure than other cryptographic techniques.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This document provides an introduction to post-quantum cryptography. It discusses how quantum computers could break current public key cryptography and outlines several approaches to post-quantum cryptography, including lattice-based, code-based, multivariate, hash-based, and isogeny-based cryptography. It summarizes the National Institute of Standards and Technology's post-quantum cryptography standardization project and competition, which is evaluating these approaches.
Quantum cryptography uses principles of quantum mechanics to guarantee secure communication. It allows two parties to generate a shared random key that can be used to encrypt and decrypt messages. There are two main approaches - using polarized photons or entangled photons. Information reconciliation and privacy amplification protocols are used to ensure the keys between the two parties are identical and an eavesdropper gains no information. While traditional man-in-the-middle attacks are impossible, future work aims to increase transmission distances including to satellites. Several research groups and companies are conducting research on quantum cryptography.
How to hack cryptographic protocols with Formal MethodsOfer Rivlin, CISSP
The document discusses using formal methods and model checking to analyze the security of cryptographic protocols. It presents a mutual authentication protocol as an example. Model checking involves defining a system as a finite-state machine model and then exhaustively checking all possible behaviors against security properties to identify vulnerabilities. The document demonstrates analyzing the example protocol using the AVISPA and Tamarin Prover tools, finding an attack on the original protocol but not on an updated version. It also discusses more advanced techniques like model learning and comparing learned models to specifications.
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it was noted that quantum computers could break public key cryptosystems based on number theory. Actually, the progress of research in this field allows the implementation of QKD outside of laboratories. Efforts are made to exploit this technology in the existing communication networks and to improve the performance and reliability of the implemented technologies. Some research is in progress for the integration of QKD with the protocols in different layers of OSI model. The examples of such research effort are the integration of QKD in point-to-point protocol (PPP) OSI layer 2 and the integration of QKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technology for enhancing the security of modern computing applications on the internet. In this paper, we present a
novel extension of the TLS protocol based on QKD. We introduce a scheme for integrating Quantum Cryptography in this protocol. Our approach improves the security of the process of authentication and data encryption. Also, we describe an example to illustrate the feasibility of our scheme’s implementation.
Alex WANG - What is the most effective cryptosystem for public-key encryption?AlexWang212277
The document discusses several cryptosystems used for public-key encryption, including RSA, Diffie-Hellman key exchange, and elliptic curve cryptography. It provides background on necessary mathematical concepts like modular arithmetic, primes, and discrete logarithms. The author analyzes the security, efficiency, and ability to withstand large adversaries of each cryptosystem to determine the most effective for public-key encryption.
The document describes a thesis submitted by Amogh Mahapatra and Rajballav Dash for their Bachelor of Technology degree. It examines using the Hill cipher technique and self-repetitive matrices for data encryption and decryption. Specifically, it proposes an innovation to the conventional Hill cipher method using the concept of self-repetitive matrices. This approach is mathematically derived and implemented to simulate a communication channel with compression techniques. The method aims to address issues with inverting the Hill cipher's multiplicative matrix by using periodically repeating matrices.
Similar to namanquantumcryptography-150820161809-lva1-app6892.pdf (20)
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
2. CONTENT
Basic terms
What is cryptography?
The process
Advantages and Limitations of cryptography
RSA Crypto Scheme
OTP (One Time Pad)
Public Key Cryptography
QKD (Quantum Key Distribution)
What is quantum cryptography?
Polarization of light
Heisenberg’s Uncertainty Principle
Element of quantum theory
Qubits
Quantum communication
BB84 Protocol
Advantages and Disadvantages of Quantum cryptography
Future aspect
Conclusion
Refrences
1
1
3. BASIC TERMS
Plain Text -Plain text is a pure sequence of character codes.
Basically its is original message.
Encryption Algorithm – It is the process of encoding
messages or information in such a way that only authorized
parties can read it.
Cipher Text -Cipher text is also known as encrypted or
encoded information. Its is the combination of key and plain
text.
Decryption Algorithm – It is reverse process of encryption.
Eavesdropping- It is secretly listening to the private
conversation of others without their consent.
2
4. WHAT IS CRYPTOGRAPHY?
Cryptography (derived from the Greek words kryptos and
graphein meaning hidden writing) is the science of codes and
ciphers.
Cryptography is the art of encoding and decoding messages of
secure communications.
Cryptography is of increasing importance in our technological
age using broadcast, network communications, Internet ,e-mail
etc.
3
4
5. Encrypted messages can sometimes be broken by
cryptanalysis, also called code-breaking, although modern
cryptograph techniques are virtually unbreakable.
Fig.1-Block diagram of cryptography
eavesdropping
1 5
7. ADVANTAGES OF CRYPTOGRAPHY
It hides the message and your privacy is safe.
Only the person who have the key would be able to
read the desired message.
LIMITATIONS
Key can be hacked easily.
Not efficient.
1 7
8. RSA CRYPTOGRAPHY
RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman.
RSA consist a single key.
It provide more security but still it can be hacked.
It take lot of time to generate and regenerate the code.
1 8
9. OTP (ONE TIME PAD)
One-time pad (OTP) is an encryption technique that cannot be
cracked if used correctly.
Fig.3- Example of one time pad
1 9
10. Here the problem raises how to get the key to the decrypting
party safely or how to keep both keys secure.
One-time pads have sometimes been used when the both
parties started out at the same physical location and then
separated, each with knowledge of the keys in the one-time
pad.
The key used in a one-time pad is called a secret key.
Ideally destroy the key after use, to make your data to more
secure.
Key distribution problem led to the invention of public
key cryptography.
1 10
11. PUBLIC KEY CRYPTOGRAPHY
Public-key cryptography, also known as asymmetric
cryptography.
Requires two separate key, one of which is secret (or private)
and one of which is public.
It has better speed and less complicated then RSA and one time
pad .
But still there is a problem that is , it can also be hacked.
1 11
12. QUANTUM KEY DISTRIBUTION
Quantum key distribution (QKD) uses quantum mechanics
to guarantee secure communication.
Quantum Key Distribution tell us all attempts of
eavesdropping.
Quantum key distribution is only used to produce and
distribute a key, not to transmit any message data
It enables two parties to produce a shared random bit string
known only to them, which can be used as a key for
encryption and decryption.
1 12
13. It is more secure then others schemes.
There is a problem that the finest optical fiber have limit
of 50 km.
1 13
14. WHAT IS QUANTUM CRYPTOGRAPHY ?
Although the field of cryptography is ancient, but it is not
static. Quantum cryptography is a relatively new concept in
cryptography.
Basically quantum cryptography is combination of OTP and
QKD.
Quantum cryptography is based on two important
principles –
a) Polarization of light.
b) Heisenberg’s uncertainty principle.
1 14
15. POLARIZATION OF LIGHT
Polarized light waves are light waves in which the
vibrations occur in a single plane.
The process of transforming unpolarized
light into polarized light is known as polarization.
Symbols:-
Horizontal polarizations→
Vertical polarization - ↑
45° polarization - ↗
135° polarization - ↖
Fig.4- Polarization of light
1 15
16. HEISENBERG’S UNCERTANITY PRINCIPLE
According to the principle two interrelated properties
cannot be measured individually without affecting the
other.
The principle is that you cannot partition the photon
into two halves without affect it value.
So if someone tries to detect the state of photons being
send over to the receiver the error can be detected.
1 16
17. ELEMENT OF QUANTAM CRYPTOGRAPHY
Light waves are propagated as discrete quanta called photons.
Photons are massless but they have energy, momentum and
angular momentum which is called spin.
Spin carries the polarization.
If on its way we put a polarization filter a photon may pass
through it or may not.
We can use a detector to check of a photon that has passed
through a filter
1 17
18. QUBITS
A quantum bit or qubit is a unit of quantum information.
Qubits are not like to simple bits because they have equal
possibility.
Exists as a ‘0’, a ‘1’ or simultaneously as a superposition
of both ‘0’ & ‘1’ .
Though the amount of information that can be retrieved in
a single qubit is equal to one bit, the difference lies in the
processing of information.
1 18
19. QUANTUM COMMUNICATION
Here the message is send through the public network where as
key send is through quantum channel.
Fig.5- Quantum communication
1 19
20. BB84 PROTOCOL
BB84 was the first security protocol implementing Quantum
Key Distribution.
It uses the idea of photon polarization.
The key consists of bits that will be transmitted as photons.
Each bit is encoded with a random polarization basis!
First thing is matter in it that is secure connection.
After that the connection is secure and no need to distribution
of key again and again,
1 20
21. Table 1 -Comparing measurements
Alice’s Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s Bit 0 0 0 1 1
The bits allow Alice and
Bob to secure the channel
for key distribution.
× + × +
0 0 1 1
Table 2- Basis value
1 21
22. Table 3- Getting the final key basis
As long as no errors
and/or eavesdropping
have occurred. Alice
and Bob have now made
sure that the channel is
secure.
Alice’s
Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s
Bit 0 0 0 1 1
1 22
23. The first prototype implementation of quantum
cryptography was built at IBM(International Business
Machine) on 1989.
Fig.6- First prototype
1 23
24. ADVANTAGES OF QUANTUM
CRYPTOGRAPHY
Advantages of Quantum cryptography is un-hackable.
Simple to use.
DISADVANTAGES
Quantum cryptography the signal is currently limited to approx.
50 km.
Setup is expensive.
1 24
25. FUTURE ASPECT
Find the another path for key distribution because of the
limitation of quantum cable.
Make it more secure , so that in future also it can’t be
hacked.
1 25
26. CONCLUSION
Quantum cryptography is a major achievement in security
engineering.
It secure our data transmission as it is never before.
Easy to understand and easy to use.
As it gets implemented, it will allow perfectly secure bank
transactions, secret discussions for government officials, and
well-guarded trade secrets for industry.
1 26
27. REFRENCES
Miss. Payal P. Kilor, Mr.Pravin.D.Soni” Quantum Cryptography:
Realizing next generation information security”ISSN 2319 – 4847,Volume
3, Issue 2, February 2014 pp. 286-289.
Simmon, G. J. ,“Symmetric and asymmetric encryption”, ISSN 2319 –
4847,Volume 3, Issue 2, February 2014. pp. 305-330.
Avanindra Kumar Lal, Anju Rani, Dr. Shalini Sharma” The New
Approach of Quantum Cryptography in Network Security” ISSN 2250-
2459, Volume 3, Special Issue 2, January 2013 pp.122-126.
G. Ananda Rao a, Muduganti Rathan Reddy” A note on Quantum
Cryptography”, ISSN : 0975-3397 Vol. 4 No. 09 Sep 2012 pp. 1540-1544
1 27