SlideShare a Scribd company logo
QUANTUM CRYPTOGRAPHY
A
Seminar Presentation
On
SEMINAR
COORDINATOR:
Mr. Manas Singhal
(Assistant Professor)
SEMINAR GUIDE:
Mrs.SHUCHITA SEXANA
(Assistant Professor)
PRESENTED BY:
NAMAN KUMAR
(1208231100)
EC 3rd Year
Section: J
MIT(MORADABAD)
1
CONTENT
 Basic terms
 What is cryptography?
 The process
 Advantages and Limitations of cryptography
 RSA Crypto Scheme
 OTP (One Time Pad)
 Public Key Cryptography
 QKD (Quantum Key Distribution)
 What is quantum cryptography?
 Polarization of light
 Heisenberg’s Uncertainty Principle
 Element of quantum theory
 Qubits
 Quantum communication
 BB84 Protocol
 Advantages and Disadvantages of Quantum cryptography
 Future aspect
 Conclusion
 Refrences
1
1
BASIC TERMS
 Plain Text -Plain text is a pure sequence of character codes.
Basically its is original message.
 Encryption Algorithm – It is the process of encoding
messages or information in such a way that only authorized
parties can read it.
 Cipher Text -Cipher text is also known as encrypted or
encoded information. Its is the combination of key and plain
text.
 Decryption Algorithm – It is reverse process of encryption.
 Eavesdropping- It is secretly listening to the private
conversation of others without their consent.
2
WHAT IS CRYPTOGRAPHY?
 Cryptography (derived from the Greek words kryptos and
graphein meaning hidden writing) is the science of codes and
ciphers.
 Cryptography is the art of encoding and decoding messages of
secure communications.
 Cryptography is of increasing importance in our technological
age using broadcast, network communications, Internet ,e-mail
etc.
3
4
 Encrypted messages can sometimes be broken by
cryptanalysis, also called code-breaking, although modern
cryptograph techniques are virtually unbreakable.
Fig.1-Block diagram of cryptography
eavesdropping
1 5
THE PROCESS
Fig. 2- Process of cryptography
A
-A
1 6
ADVANTAGES OF CRYPTOGRAPHY
 It hides the message and your privacy is safe.
 Only the person who have the key would be able to
read the desired message.
LIMITATIONS
 Key can be hacked easily.
 Not efficient.
1 7
RSA CRYPTOGRAPHY
 RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman.
 RSA consist a single key.
It provide more security but still it can be hacked.
It take lot of time to generate and regenerate the code.
1 8
OTP (ONE TIME PAD)
 One-time pad (OTP) is an encryption technique that cannot be
cracked if used correctly.
Fig.3- Example of one time pad
1 9
 Here the problem raises how to get the key to the decrypting
party safely or how to keep both keys secure.
 One-time pads have sometimes been used when the both
parties started out at the same physical location and then
separated, each with knowledge of the keys in the one-time
pad.
 The key used in a one-time pad is called a secret key.
 Ideally destroy the key after use, to make your data to more
secure.
 Key distribution problem led to the invention of public
key cryptography.
1 10
PUBLIC KEY CRYPTOGRAPHY
 Public-key cryptography, also known as asymmetric
cryptography.
 Requires two separate key, one of which is secret (or private)
and one of which is public.
 It has better speed and less complicated then RSA and one time
pad .
 But still there is a problem that is , it can also be hacked.
1 11
QUANTUM KEY DISTRIBUTION
 Quantum key distribution (QKD) uses quantum mechanics
to guarantee secure communication.
 Quantum Key Distribution tell us all attempts of
eavesdropping.
 Quantum key distribution is only used to produce and
distribute a key, not to transmit any message data
 It enables two parties to produce a shared random bit string
known only to them, which can be used as a key for
encryption and decryption.
1 12
It is more secure then others schemes.
There is a problem that the finest optical fiber have limit
of 50 km.
1 13
WHAT IS QUANTUM CRYPTOGRAPHY ?
 Although the field of cryptography is ancient, but it is not
static. Quantum cryptography is a relatively new concept in
cryptography.
 Basically quantum cryptography is combination of OTP and
QKD.
 Quantum cryptography is based on two important
principles –
a) Polarization of light.
b) Heisenberg’s uncertainty principle.
1 14
POLARIZATION OF LIGHT
 Polarized light waves are light waves in which the
vibrations occur in a single plane.
 The process of transforming unpolarized
light into polarized light is known as polarization.
 Symbols:-
Horizontal polarizations→
Vertical polarization - ↑
45° polarization - ↗
135° polarization - ↖
Fig.4- Polarization of light
1 15
HEISENBERG’S UNCERTANITY PRINCIPLE
 According to the principle two interrelated properties
cannot be measured individually without affecting the
other.
 The principle is that you cannot partition the photon
into two halves without affect it value.
 So if someone tries to detect the state of photons being
send over to the receiver the error can be detected.
1 16
ELEMENT OF QUANTAM CRYPTOGRAPHY
 Light waves are propagated as discrete quanta called photons.
 Photons are massless but they have energy, momentum and
angular momentum which is called spin.
 Spin carries the polarization.
 If on its way we put a polarization filter a photon may pass
through it or may not.
 We can use a detector to check of a photon that has passed
through a filter
1 17
QUBITS
 A quantum bit or qubit is a unit of quantum information.
 Qubits are not like to simple bits because they have equal
possibility.
 Exists as a ‘0’, a ‘1’ or simultaneously as a superposition
of both ‘0’ & ‘1’ .
 Though the amount of information that can be retrieved in
a single qubit is equal to one bit, the difference lies in the
processing of information.
1 18
QUANTUM COMMUNICATION
Here the message is send through the public network where as
key send is through quantum channel.
Fig.5- Quantum communication
1 19
BB84 PROTOCOL
 BB84 was the first security protocol implementing Quantum
Key Distribution.
 It uses the idea of photon polarization.
 The key consists of bits that will be transmitted as photons.
 Each bit is encoded with a random polarization basis!
 First thing is matter in it that is secure connection.
 After that the connection is secure and no need to distribution
of key again and again,
1 20
Table 1 -Comparing measurements
Alice’s Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s Bit 0 0 0 1 1
The bits allow Alice and
Bob to secure the channel
for key distribution.
× + × +
0 0 1 1
Table 2- Basis value
1 21
Table 3- Getting the final key basis
As long as no errors
and/or eavesdropping
have occurred. Alice
and Bob have now made
sure that the channel is
secure.
Alice’s
Bit 0 1 0 1 1
Alice’s
Basis + × × + ×
Photon
Bob’s
Basis + + × + ×
Bob’s
Bit 0 0 0 1 1
1 22
 The first prototype implementation of quantum
cryptography was built at IBM(International Business
Machine) on 1989.
Fig.6- First prototype
1 23
ADVANTAGES OF QUANTUM
CRYPTOGRAPHY
 Advantages of Quantum cryptography is un-hackable.
 Simple to use.
DISADVANTAGES
 Quantum cryptography the signal is currently limited to approx.
50 km.
 Setup is expensive.
1 24
FUTURE ASPECT
 Find the another path for key distribution because of the
limitation of quantum cable.
 Make it more secure , so that in future also it can’t be
hacked.
1 25
CONCLUSION
 Quantum cryptography is a major achievement in security
engineering.
 It secure our data transmission as it is never before.
 Easy to understand and easy to use.
 As it gets implemented, it will allow perfectly secure bank
transactions, secret discussions for government officials, and
well-guarded trade secrets for industry.
1 26
REFRENCES
 Miss. Payal P. Kilor, Mr.Pravin.D.Soni” Quantum Cryptography:
Realizing next generation information security”ISSN 2319 – 4847,Volume
3, Issue 2, February 2014 pp. 286-289.
 Simmon, G. J. ,“Symmetric and asymmetric encryption”, ISSN 2319 –
4847,Volume 3, Issue 2, February 2014. pp. 305-330.
 Avanindra Kumar Lal, Anju Rani, Dr. Shalini Sharma” The New
Approach of Quantum Cryptography in Network Security” ISSN 2250-
2459, Volume 3, Special Issue 2, January 2013 pp.122-126.
 G. Ananda Rao a, Muduganti Rathan Reddy” A note on Quantum
Cryptography”, ISSN : 0975-3397 Vol. 4 No. 09 Sep 2012 pp. 1540-1544
1 27
THANK YOU
1 28

More Related Content

Similar to namanquantumcryptography-150820161809-lva1-app6892.pdf

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
Swasat Dutta
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
ADVA
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
RohanTakke
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
Kamal Diwakar
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
ijcsa
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
sahilnarvekar
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
MyNOG
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
IOSR Journals
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
Minahilnuman1
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Nishant Bhardwaj
 
1914 1917
1914 19171914 1917
1914 1917
Editor IJARCET
 
1914 1917
1914 19171914 1917
1914 1917
Editor IJARCET
 
B03250609
B03250609B03250609
B03250609
theijes
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
CSNP
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 
How to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsHow to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal Methods
Ofer Rivlin, CISSP
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IJNSA Journal
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
AlexWang212277
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 

Similar to namanquantumcryptography-150820161809-lva1-app6892.pdf (20)

Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
How to Quantum-Secure Optical Networks
 How to Quantum-Secure Optical Networks How to Quantum-Secure Optical Networks
How to Quantum-Secure Optical Networks
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
Exploring Quantum Engineering for Networking by Melchior Aelmans, Juniper Net...
 
Deniable Encryption Key
Deniable Encryption KeyDeniable Encryption Key
Deniable Encryption Key
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Report.pdf
Report.pdfReport.pdf
Report.pdf
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
1914 1917
1914 19171914 1917
1914 1917
 
1914 1917
1914 19171914 1917
1914 1917
 
B03250609
B03250609B03250609
B03250609
 
Emily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum CryptographyEmily Stamm - Post-Quantum Cryptography
Emily Stamm - Post-Quantum Cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
How to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal MethodsHow to hack cryptographic protocols with Formal Methods
How to hack cryptographic protocols with Formal Methods
 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 

Recently uploaded

How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 

namanquantumcryptography-150820161809-lva1-app6892.pdf

  • 1. QUANTUM CRYPTOGRAPHY A Seminar Presentation On SEMINAR COORDINATOR: Mr. Manas Singhal (Assistant Professor) SEMINAR GUIDE: Mrs.SHUCHITA SEXANA (Assistant Professor) PRESENTED BY: NAMAN KUMAR (1208231100) EC 3rd Year Section: J MIT(MORADABAD) 1
  • 2. CONTENT  Basic terms  What is cryptography?  The process  Advantages and Limitations of cryptography  RSA Crypto Scheme  OTP (One Time Pad)  Public Key Cryptography  QKD (Quantum Key Distribution)  What is quantum cryptography?  Polarization of light  Heisenberg’s Uncertainty Principle  Element of quantum theory  Qubits  Quantum communication  BB84 Protocol  Advantages and Disadvantages of Quantum cryptography  Future aspect  Conclusion  Refrences 1 1
  • 3. BASIC TERMS  Plain Text -Plain text is a pure sequence of character codes. Basically its is original message.  Encryption Algorithm – It is the process of encoding messages or information in such a way that only authorized parties can read it.  Cipher Text -Cipher text is also known as encrypted or encoded information. Its is the combination of key and plain text.  Decryption Algorithm – It is reverse process of encryption.  Eavesdropping- It is secretly listening to the private conversation of others without their consent. 2
  • 4. WHAT IS CRYPTOGRAPHY?  Cryptography (derived from the Greek words kryptos and graphein meaning hidden writing) is the science of codes and ciphers.  Cryptography is the art of encoding and decoding messages of secure communications.  Cryptography is of increasing importance in our technological age using broadcast, network communications, Internet ,e-mail etc. 3 4
  • 5.  Encrypted messages can sometimes be broken by cryptanalysis, also called code-breaking, although modern cryptograph techniques are virtually unbreakable. Fig.1-Block diagram of cryptography eavesdropping 1 5
  • 6. THE PROCESS Fig. 2- Process of cryptography A -A 1 6
  • 7. ADVANTAGES OF CRYPTOGRAPHY  It hides the message and your privacy is safe.  Only the person who have the key would be able to read the desired message. LIMITATIONS  Key can be hacked easily.  Not efficient. 1 7
  • 8. RSA CRYPTOGRAPHY  RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman.  RSA consist a single key. It provide more security but still it can be hacked. It take lot of time to generate and regenerate the code. 1 8
  • 9. OTP (ONE TIME PAD)  One-time pad (OTP) is an encryption technique that cannot be cracked if used correctly. Fig.3- Example of one time pad 1 9
  • 10.  Here the problem raises how to get the key to the decrypting party safely or how to keep both keys secure.  One-time pads have sometimes been used when the both parties started out at the same physical location and then separated, each with knowledge of the keys in the one-time pad.  The key used in a one-time pad is called a secret key.  Ideally destroy the key after use, to make your data to more secure.  Key distribution problem led to the invention of public key cryptography. 1 10
  • 11. PUBLIC KEY CRYPTOGRAPHY  Public-key cryptography, also known as asymmetric cryptography.  Requires two separate key, one of which is secret (or private) and one of which is public.  It has better speed and less complicated then RSA and one time pad .  But still there is a problem that is , it can also be hacked. 1 11
  • 12. QUANTUM KEY DISTRIBUTION  Quantum key distribution (QKD) uses quantum mechanics to guarantee secure communication.  Quantum Key Distribution tell us all attempts of eavesdropping.  Quantum key distribution is only used to produce and distribute a key, not to transmit any message data  It enables two parties to produce a shared random bit string known only to them, which can be used as a key for encryption and decryption. 1 12
  • 13. It is more secure then others schemes. There is a problem that the finest optical fiber have limit of 50 km. 1 13
  • 14. WHAT IS QUANTUM CRYPTOGRAPHY ?  Although the field of cryptography is ancient, but it is not static. Quantum cryptography is a relatively new concept in cryptography.  Basically quantum cryptography is combination of OTP and QKD.  Quantum cryptography is based on two important principles – a) Polarization of light. b) Heisenberg’s uncertainty principle. 1 14
  • 15. POLARIZATION OF LIGHT  Polarized light waves are light waves in which the vibrations occur in a single plane.  The process of transforming unpolarized light into polarized light is known as polarization.  Symbols:- Horizontal polarizations→ Vertical polarization - ↑ 45° polarization - ↗ 135° polarization - ↖ Fig.4- Polarization of light 1 15
  • 16. HEISENBERG’S UNCERTANITY PRINCIPLE  According to the principle two interrelated properties cannot be measured individually without affecting the other.  The principle is that you cannot partition the photon into two halves without affect it value.  So if someone tries to detect the state of photons being send over to the receiver the error can be detected. 1 16
  • 17. ELEMENT OF QUANTAM CRYPTOGRAPHY  Light waves are propagated as discrete quanta called photons.  Photons are massless but they have energy, momentum and angular momentum which is called spin.  Spin carries the polarization.  If on its way we put a polarization filter a photon may pass through it or may not.  We can use a detector to check of a photon that has passed through a filter 1 17
  • 18. QUBITS  A quantum bit or qubit is a unit of quantum information.  Qubits are not like to simple bits because they have equal possibility.  Exists as a ‘0’, a ‘1’ or simultaneously as a superposition of both ‘0’ & ‘1’ .  Though the amount of information that can be retrieved in a single qubit is equal to one bit, the difference lies in the processing of information. 1 18
  • 19. QUANTUM COMMUNICATION Here the message is send through the public network where as key send is through quantum channel. Fig.5- Quantum communication 1 19
  • 20. BB84 PROTOCOL  BB84 was the first security protocol implementing Quantum Key Distribution.  It uses the idea of photon polarization.  The key consists of bits that will be transmitted as photons.  Each bit is encoded with a random polarization basis!  First thing is matter in it that is secure connection.  After that the connection is secure and no need to distribution of key again and again, 1 20
  • 21. Table 1 -Comparing measurements Alice’s Bit 0 1 0 1 1 Alice’s Basis + × × + × Photon Bob’s Basis + + × + × Bob’s Bit 0 0 0 1 1 The bits allow Alice and Bob to secure the channel for key distribution. × + × + 0 0 1 1 Table 2- Basis value 1 21
  • 22. Table 3- Getting the final key basis As long as no errors and/or eavesdropping have occurred. Alice and Bob have now made sure that the channel is secure. Alice’s Bit 0 1 0 1 1 Alice’s Basis + × × + × Photon Bob’s Basis + + × + × Bob’s Bit 0 0 0 1 1 1 22
  • 23.  The first prototype implementation of quantum cryptography was built at IBM(International Business Machine) on 1989. Fig.6- First prototype 1 23
  • 24. ADVANTAGES OF QUANTUM CRYPTOGRAPHY  Advantages of Quantum cryptography is un-hackable.  Simple to use. DISADVANTAGES  Quantum cryptography the signal is currently limited to approx. 50 km.  Setup is expensive. 1 24
  • 25. FUTURE ASPECT  Find the another path for key distribution because of the limitation of quantum cable.  Make it more secure , so that in future also it can’t be hacked. 1 25
  • 26. CONCLUSION  Quantum cryptography is a major achievement in security engineering.  It secure our data transmission as it is never before.  Easy to understand and easy to use.  As it gets implemented, it will allow perfectly secure bank transactions, secret discussions for government officials, and well-guarded trade secrets for industry. 1 26
  • 27. REFRENCES  Miss. Payal P. Kilor, Mr.Pravin.D.Soni” Quantum Cryptography: Realizing next generation information security”ISSN 2319 – 4847,Volume 3, Issue 2, February 2014 pp. 286-289.  Simmon, G. J. ,“Symmetric and asymmetric encryption”, ISSN 2319 – 4847,Volume 3, Issue 2, February 2014. pp. 305-330.  Avanindra Kumar Lal, Anju Rani, Dr. Shalini Sharma” The New Approach of Quantum Cryptography in Network Security” ISSN 2250- 2459, Volume 3, Special Issue 2, January 2013 pp.122-126.  G. Ananda Rao a, Muduganti Rathan Reddy” A note on Quantum Cryptography”, ISSN : 0975-3397 Vol. 4 No. 09 Sep 2012 pp. 1540-1544 1 27